Java
    - 
        Java audit SSRFJava audit SSRF 0x00 Preface This article will record the audit learning related content of Java SSRF. 0x01 SSRF vulne……
- 
        Collection of java learningCollection of java learning 0x00 Preface In fact, the common classes in the previous article have already talked about……
- 
        Response of java learningResponse of java learning 0x00 Preface Continuing from the previous article, this chapter updates the response. 0x01 R……
- 
        Weblogic 2016-0638 analysis of Java SecurityWeblogic 2016-0638 analysis of Java Security Article starting prophet: Weblogic 2016-0638 analysis of Java Security 0x……
- 
        Java crawling prophet forum articlesJava crawling prophet forum articles 0x00 Preface The last article wrote some crawler code. Here is a complete crawler……
- 
        RMI deserialization for Java SecurityRMI deserialization for Java Security 0x00 Preface Before analyzing fastjson vulnerabilities, you need to understand R……
- 
        Java learning requestJava learning request 0x00 Preface In B / S architecture, request and response are essential. When visiting the web pa……
- 
        Explore Java 9 module systems and reaction flowsNew features of Java 9, Java modularization, Java reaction flow, reactive, jigsaw Modular system The Java platform mod……
- 
        Introduction to Axis2 WebService — development environment construction and concept understandingOn the concept of web service, there are various explanations on the Internet, but it is not easy to understand. It ca……
- 
        A Java recursive programFirst of all, I searched some interview questions to do, including one: enter an integer and find the sum of each numb……
- 
        What does the equals method compare in Java?We know that whenever we create a new class, if the parent class is not specified, it inherits the object class by def……
- 
        Two ways of configuring virtual hosts in Tomcat1. Virtual host configuration based on host name Suppose there is hello. Com in the root folder under Tomcat and wenba……
- 
        Hibernate operation: could not get next sequence value;Error message: [2017-09-28 18:51:38,854]-[org.hibernate.util.JDBCExceptionReporter:101] ERROR - Numeric Overflow org.s……
- 
        java. lang.IllegalAccessError: tried to access field org. slf4j. impl. StaticLoggerBinder. SINGLETON from class org. slf4j. LoggerFactoryError record: Java lang.IllegalAccessError: tried to access field org. slf4j. impl. StaticLoggerBinder. SINGLETON from……
- 
        #PriorityQueue of Java queue seriesIn the previous article, I used a diagram to sort out the relationship between various queues in Java. Here is the Pri……
- 
        How to make the JDK version switch as smooth as silkI use Java 8 at work, but I have two versions of JDK installed on my personal computer: openjdk8 and openjdk11. There ……
- 
        Probe into integer caused by an integer interview questionInterview questions: 1. It's mentioned in the title. It's jdk1 5 environment. OK, let's create a new project, create a……
- 
        Tomcat startup project reports an error Java lang.OutOfMemoryError: Java heap spaceRecently, when deploying a web project using MyEclipse and starting tomcat, an error is reported: Solution: add config……
- 
        Integration of Tomcat and Apache server under Windows systemNote: This article is a successful real experiment in reading. The book mentioned the incompatibility of different ver……
- 
        How to find the implementation class of the mybatis mapper interface – source code analysisKeywords: mybatis principle, source code, mybatis mapper interface implementation class, proxy mode, dynamic proxy, Ja……
- 
        How to find your favorite girlfriend with java8 stream APIThe traditional Java collection operation is a little verbose. When we need to filter and sort the combined elements, ……
- 
        Java generics, understanding these is enough.Contents of this document: 1、 What are Java generics? 2、 Common generic writing examples Generic class definition: D……
- 
        Use and comparison of countdownlatch and cyclicbarrier in JavaCountdownlatch and cyclicbarrier are both Java 1 5 began to introduce a tool used in multithreaded programming. They h……
- 
        Cookie instance, understanding cookies1、 Understand what cookies are in one sentence Cookies are small documents sent by the server to the client to record……
- 
        ThreadLocal detailed explanation, ThreadLocal source code analysis, ThreadLocal diagramThis article is about: Concept explanation ----- principle illustration ----- source code analysis ----- thought arran……
- 
        Java generates compressed packages, and zipoutputstream is usedCase: obtain network resources a, B and C according to the URL, and put resources a and C together to generate a XXX z……
- 
        Introduction principle and practice of spring securityIn web application development, security is undoubtedly very important. Choosing spring security to protect web applic……
- 
        Factorization using tail recursionUsually, when calculating the factorial of a number, we will use the recursive algorithm. The recursive book program c……
- 
        Using scheduled tasks in spring projectsWhen we want to execute some business methods at a certain point in time, we use timed tasks. It is very simple to use……
- 
        BF algorithmBF algorithm, short for brute force algorithm. Used to detect whether a string is a substring of another string. Conce……
- 
        Spring source code analysis – 1 – startSpring source code analysis - 1 - start @ h_ 403_ 1 @ when using spring in web projects, we will Add the following con……
- 
        Dependency, association, aggregation, combinationExcerpt from: http://www.iteye.com/topic/632059 rely on It can be simply understood that one class a uses another clas……
