Java
-
Multithreaded programming learning 11 (detailed explanation of ThreadPoolExecutor)
1、 ThreadPoolExecutor parameter description public ThreadPoolExecutor(int corePoolSize,int maximumPoolSize,long k…… -
Hash algorithm and hash code
1、 Introduce Looking at this result, the problem arises. There is clearly groudhog {number = 3} in the map. Why does …… -
HashMap, hashtable, and concurrenthashmap thread safety issues
1、 HashMap HashMap is thread unsafe. JDK 1.7 HashMap adopts the data structure of array + linked list. Under the back…… -
Java 8 completable future programming
1、 Introduction the so-called asynchronous call is actually a method that allows the operation to continue without …… -
Java generics and type erasure
1、 Concept When the Java language is in a version where generics have not yet appeared, type generalization can only …… -
Use of Java timer
1、 Concept 2、 Precautions for timer class 1. To create a timer object is to start a new thread, but the newly starte…… -
Java Native network programming
1、 Concept Since its birth, Java language has been closely linked with the network. At the Sun World Conference in 19…… -
Skip list and concurrentskiplistmap
1、 Skip list For a single linked list, even if the linked list is ordered, if you want to find a data in it, you can …… -
JDK SPI mechanism
1、 Overview We first saw the SPI mechanism in the implementation of Dubbo. Recently, we found that it is not a new th…… -
See what Web attack technologies are available
1、 Foreword HTTP protocol has the characteristics of stateless, no connection and best effort. The attacks on Web sit…… -
Multithreaded programming learning three (communication between threads)
1、 Summary 2、 Waiting / notification mechanism 1. "Wait / notify" mechanism: wait / notify mechanism. Wait causes th…… -
File IO stream of java learning
File IO stream of java learning 0x00 Preface In some normal development, it is common to let the script run to store s…… -
Interface and polymorphism in java learning
0x00 Preface In the previous articles, we talked about encapsulation and inheritance. In this article, let's talk abou…… -
Notes on java learning
Notes on java learning 0x00 Preface Continuing with the previous article, this article will write about the relevant c…… -
Filter defense XSS of Java audit
Filter defense XSS of Java audit 0x00 Preface This paper considers some small details of audit from the perspectives o…… -
Analysis of common collections 7 for Java Security
Analysis of common collections 7 for Java Security 0x00 Preface The chain explained in this article is the last CC cha…… -
Jackson chapter of java learning
Jackson chapter of java learning 0x00 Preface The content of this article is relatively simple and simple to record. 0…… -
Crawler of java learning
Crawler of java learning 0x00 Preface After summarizing the basic stage, write a reptile practice, from which you can …… -
Weblogic 2017-3248 analysis of Java Security
Weblogic 2017-3248 analysis of Java Security 0x00 Preface At the beginning, let's talk about the previous bypass metho…… -
Analysis of common collections 7 for Java Security
Analysis of common collections 7 for Java Security 0x00 Preface The chain explained in this article is the last CC cha…… -
Spring MVC common annotations for java learning
Spring MVC common annotations for java learning 0x00 Preface Continue with the previous article to record some annotat…… -
Java thread and TCP programming
thread Process is composed of threads. Multithreading can run multiple tasks at the same time. It is a necessary part…… -
Unsafe class of Java Security
Unsafe class of Java Security 0x00 Preface In fact, the use of some JNI programming and javaagent technologies in secu…… -
Multithreading in java learning
0x00 Preface In a tool development, if the tool needs to continuously perform the same action or request, using single…… -
Final and anonymous inner classes in java learning
Final and anonymous inner classes for java learning 0x00 Preface In the last few articles, I learned that the subclass…… -
Socket network programming for java learning
Socket network programming for java learning 0x00 Preface In the development of some tools, the most inseparable may b…… -
Common collections2 analysis of Java Security
Common collections2 analysis of Java Security Launch: common collections2 analysis of Java Security 0x00 Preface The u…… -
Integration of SSM framework for java learning
Integration of SSM framework for java learning 0x00 Preface The spring, spring MVC and mybatis frameworks that we lear…… -
Urldns chain for Java Security
Urldns chain for Java Security 0x00 Preface When learning Java's deserialization vulnerability, you have to learn one …… -
On the vulnerability of Weblogic T3 protocol in Java Security
On the vulnerability of Weblogic T3 protocol in Java Security The first article from the security guest: a preliminary…… -
Reflection of java learning
Reflection of java learning 0x00 Preface Today, let's briefly record some things about reflection and annotation. Refl…… -
Inheritance and abstraction of java learning
Inheritance and abstraction of java learning 0x00 Preface The three characteristics of object-oriented are encapsulati……