Java
-
JDK SPI mechanism
1、 Overview We first saw the SPI mechanism in the implementation of Dubbo. Recently, we found that it is not a new th…… -
See what Web attack technologies are available
1、 Foreword HTTP protocol has the characteristics of stateless, no connection and best effort. The attacks on Web sit…… -
Multithreaded programming learning three (communication between threads)
1、 Summary 2、 Waiting / notification mechanism 1. "Wait / notify" mechanism: wait / notify mechanism. Wait causes th…… -
Multi thread cross backup with wait / notify
1、 Mission Create 20 threads, of which 10 threads back up data to database a, the other 10 threads back up data to da…… -
Analysis of problems caused by improper use of resttemplate
background Problem phenomenon Analysis process These three problems are interrelated. The fuse is the third problem, t…… -
Common methods of stringutils tool class
Foreword: I saw that Daniel in the project team wrote code and used stringutils tool class to do string operation, so …… -
Multithreaded programming learning one (the basis of Java multithreading)
1、 Process and thread concepts Process: the execution of a program is called a process. Each process has independent …… -
Multithreaded programming learning II (concurrent access to objects and variables)
1、 Concept 2、 Synchronized synchronization method 1. The problem of non thread safety exists in the instance variabl…… -
Multithreaded programming learning 12 (reading notes)
1、 Multithreading semantics 2、 Java Memory Model 3、 Memory semantics for synchronized, volatile, and final 4、 Other -
Java reflection mechanism
1、 Concept Java reflection is a method by which a java program can load a class whose name is known only when it runs…… -
See what web authentication technologies are available
Basic certification Basic authentication (basic authentication) is an authentication method defined from http / 1.0. B…… -
Multithreading in java learning
0x00 Preface In a tool development, if the tool needs to continuously perform the same action or request, using single…… -
Final and anonymous inner classes in java learning
Final and anonymous inner classes for java learning 0x00 Preface In the last few articles, I learned that the subclass…… -
Socket network programming for java learning
Socket network programming for java learning 0x00 Preface In the development of some tools, the most inseparable may b…… -
Common collections2 analysis of Java Security
Common collections2 analysis of Java Security Launch: common collections2 analysis of Java Security 0x00 Preface The u…… -
Integration of SSM framework for java learning
Integration of SSM framework for java learning 0x00 Preface The spring, spring MVC and mybatis frameworks that we lear…… -
Urldns chain for Java Security
Urldns chain for Java Security 0x00 Preface When learning Java's deserialization vulnerability, you have to learn one …… -
On the vulnerability of Weblogic T3 protocol in Java Security
On the vulnerability of Weblogic T3 protocol in Java Security The first article from the security guest: a preliminary…… -
Reflection of java learning
Reflection of java learning 0x00 Preface Today, let's briefly record some things about reflection and annotation. Refl…… -
Inheritance and abstraction of java learning
Inheritance and abstraction of java learning 0x00 Preface The three characteristics of object-oriented are encapsulati…… -
Common collections3 analysis of Java Security
Common collections3 analysis of Java Security Article launch: common collections3 analysis of Java Security 0x00 Prefa…… -
Introduction to spring framework for java learning
Introduction to spring framework for java learning 0x00 Preface Recently, I have been studying the three frameworks of…… -
Common collections1 analysis pre knowledge of Java Security
Common collections1 analysis pre knowledge of Java Security 0x00 Preface The utilization chain of common collections, …… -
SQL injection of Java audit
SQL injection of Java audit 0x00 Preface As an introduction to Java Web audit, this article is also my first audit art…… -
Common collections1 analysis of Java Security (3)
Common collections1 analysis of Java Security (3) 0x00 Preface Continue to analyze CC chain, using the previous articl…… -
Analysis of common collections 6 for Java Security
Analysis of common collections 6 for Java Security 0x00 Preface In fact, the analysis of several chains are roughly th…… -
Interpretation of Java security’s native readObject method
Interpretation of Java security's native readObject method 0x00 Preface In the analysis of Shiro in the previous artic…… -
Analysis of Java deserialization vulnerabilities
Analysis of Java deserialization vulnerabilities Share topics within the Department and team once, and share them Dese…… -
Jdk7u21 chain analysis of Java Security
Jdk7u21 chain analysis of Java Security First article: analysis of the jdk7u21 chain of Java Security 0x00 Preface In …… -
XSS audit points of Java audit
XSS audit points of Java audit 0x00 Preface The previous article talked about a simple audit of XSS. This article can …… -
XxE of Java audit
XxE of Java audit 0x00 Preface In the past, I didn't know much about xxE vulnerabilities, but I had a preliminary unde…… -
Java agent for Java Security
Java agent for Java Security 0x00 Preface I found that many technologies will use Java agent to implement it. It is sa……