Java
-
Java 8 functional programming
1、 Function interface Why start with the function interface first? Because I think this is the entrance to java8 func…… -
Transformation of mail sending class smtpappender of log4j
During the development process, we sometimes need to send important error logs to relevant responsible persons by emai…… -
Parsing of string’s intern() method
1、 Overview In the versions before and after JDK7, there are differences in the implementation of string's intern() m…… -
Interpretation of the source code of concurrentlinkedqueue
1、 Introduction Concurrentlinkedqueue is an unbounded thread safe queue based on linked nodes. It is non blocking. It…… -
Interpretation of ThreadLocal source code
1、 Introduce public class Thread implements Runnable { /* 前面略 */ /* ThreadLocal values pertaining to thi…… -
Basic knowledge of computer network
1、 Computer network classification Local area network (LAN) is a computer communication network formed by connecting …… -
Multithreaded programming learning ten (thread pool principle)
1、 Thread pool workflow Tips: This design scheme can avoid frequent thread creation, and most work tasks will stay in…… -
Comparison of execution efficiency between ArrayList and LinkedList
1、 Concept: Generally, we all know that ArrayList * is a list derived from an array. Used as a general-purpose object…… -
Front and rear end separation demo hotel management system
model design hotel management system, mainly related to check-in, check-out and room and guest information manageme…… -
Java serialization mechanism
1、 Why serialize? 1. Generally, Java objects can exist only when the JVM is running, that is, the life cycle of these…… -
Java development history
JDK 1.0 In April 1991, The green project, led by Dr. James Gosling, began to develop a program architecture that can r…… -
Java agent for Java Security
Java agent for Java Security 0x00 Preface I found that many technologies will use Java agent to implement it. It is sa…… -
File operation vulnerability of Java audit
File operation vulnerability of Java audit 0x00 Preface This article intends to describe some file operation vulnerabi…… -
Database connection pool for java learning
Database connection pool for java learning 0x00 Preface The JDBC used earlier needs to re-establish objects every time…… -
Filter and listener in java learning
Filter and listener in java learning 0x00 Preface In some login points or function points that can only be used after …… -
Common collections1 analysis of Java Security (2)
Common collections1 analysis of Java Security (2) 0x00 Preface Continue the previous article and continue to debug the…… -
Java audit SSRF
Java audit SSRF 0x00 Preface This article will record the audit learning related content of Java SSRF. 0x01 SSRF vulne…… -
Collection of java learning
Collection of java learning 0x00 Preface In fact, the common classes in the previous article have already talked about…… -
Response of java learning
Response of java learning 0x00 Preface Continuing from the previous article, this chapter updates the response. 0x01 R…… -
Weblogic 2016-0638 analysis of Java Security
Weblogic 2016-0638 analysis of Java Security Article starting prophet: Weblogic 2016-0638 analysis of Java Security 0x…… -
Java crawling prophet forum articles
Java crawling prophet forum articles 0x00 Preface The last article wrote some crawler code. Here is a complete crawler…… -
RMI deserialization for Java Security
RMI deserialization for Java Security 0x00 Preface Before analyzing fastjson vulnerabilities, you need to understand R…… -
Java learning request
Java learning request 0x00 Preface In B / S architecture, request and response are essential. When visiting the web pa…… -
Dynamic agent for java learning
Dynamic agent for java learning 0x00 Preface In the later study of vulnerability research, we must know several knowle…… -
Introduction to mybatis framework for java learning
Introduction to mybatis framework for java learning 0x00 Preface The previous article uses JDBC to connect the databas…… -
Command execution of Java audit
Command execution of Java audit 0x00 Preface In fact, there are not many classes that can execute commands in Java, un…… -
Spring framework basics for java learning
Spring framework basics for java learning 0x00 Preface Continue the previous article and continue to update the spring…… -
Analysis of common collections 7 for Java Security
Analysis of common collections 7 for Java Security 0x00 Preface The chain explained in this article is the last CC cha…… -
Java learning JSP
Java learning JSP 0x00 Preface In fact, there is not much about JSP. Let's simply record the conceptual content of JSP…… -
Java start (basic)
data type Boolean 1 bit byte 1 byte (8 bits) short 2 bytes char 2 bytes int 4 bytes long 8 bytes The default type uses…… -
Javassist dynamic programming for Java Security
Javassist dynamic programming for Java Security 0x00 Preface Before debugging the CC2 chain, let's fill in the knowled…… -
Analysis of Shiro 550 deserialization vulnerability in Java Security
Analysis of Shiro 550 deserialization vulnerability in Java Security Starting from security guest: analysis of Shiro 5……