Java
-
Java learning JSP
Java learning JSP 0x00 Preface In fact, there is not much about JSP. Let's simply record the conceptual content of JSP…… -
Java start (basic)
data type Boolean 1 bit byte 1 byte (8 bits) short 2 bytes char 2 bytes int 4 bytes long 8 bytes The default type uses…… -
Javassist dynamic programming for Java Security
Javassist dynamic programming for Java Security 0x00 Preface Before debugging the CC2 chain, let's fill in the knowled…… -
Analysis of Shiro 550 deserialization vulnerability in Java Security
Analysis of Shiro 550 deserialization vulnerability in Java Security Starting from security guest: analysis of Shiro 5…… -
Object oriented java learning
0x00 Preface I talked about some basic syntax of Java. Here is the core idea of Java, object-oriented. 0x01 object ori…… -
Java string handler summary
String class Simple string splicing String length Splits a string into an array of characters Gets the character at th…… -
JNDI injection for Java Security
JNDI injection for Java Security Article launch: JNDI injection for Java Security 0x00 Preface Continue with the previ…… -
java. lang.IllegalAccessError: tried to access field org. slf4j. impl. StaticLoggerBinder. SINGLETON from class org. slf4j. LoggerFactory
Error record: Java lang.IllegalAccessError: tried to access field org. slf4j. impl. StaticLoggerBinder. SINGLETON from…… -
#PriorityQueue of Java queue series
In the previous article, I used a diagram to sort out the relationship between various queues in Java. Here is the Pri…… -
How to make the JDK version switch as smooth as silk
I use Java 8 at work, but I have two versions of JDK installed on my personal computer: openjdk8 and openjdk11. There …… -
Probe into integer caused by an integer interview question
Interview questions: 1. It's mentioned in the title. It's jdk1 5 environment. OK, let's create a new project, create a…… -
Tomcat startup project reports an error Java lang.OutOfMemoryError: Java heap space
Recently, when deploying a web project using MyEclipse and starting tomcat, an error is reported: Solution: add config…… -
Integration of Tomcat and Apache server under Windows system
Note: This article is a successful real experiment in reading. The book mentioned the incompatibility of different ver…… -
How to find the implementation class of the mybatis mapper interface – source code analysis
Keywords: mybatis principle, source code, mybatis mapper interface implementation class, proxy mode, dynamic proxy, Ja…… -
How to find your favorite girlfriend with java8 stream API
The traditional Java collection operation is a little verbose. When we need to filter and sort the combined elements, …… -
Java generics, understanding these is enough.
Contents of this document: 1、 What are Java generics? 2、 Common generic writing examples Generic class definition: D…… -
Use and comparison of countdownlatch and cyclicbarrier in Java
Countdownlatch and cyclicbarrier are both Java 1 5 began to introduce a tool used in multithreaded programming. They h…… -
Cookie instance, understanding cookies
1、 Understand what cookies are in one sentence Cookies are small documents sent by the server to the client to record…… -
ThreadLocal detailed explanation, ThreadLocal source code analysis, ThreadLocal diagram
This article is about: Concept explanation ----- principle illustration ----- source code analysis ----- thought arran…… -
Java generates compressed packages, and zipoutputstream is used
Case: obtain network resources a, B and C according to the URL, and put resources a and C together to generate a XXX z…… -
Introduction principle and practice of spring security
In web application development, security is undoubtedly very important. Choosing spring security to protect web applic…… -
Factorization using tail recursion
Usually, when calculating the factorial of a number, we will use the recursive algorithm. The recursive book program c…… -
Using scheduled tasks in spring projects
When we want to execute some business methods at a certain point in time, we use timed tasks. It is very simple to use…… -
BF algorithm
BF algorithm, short for brute force algorithm. Used to detect whether a string is a substring of another string. Conce…… -
Spring source code analysis – 1 – start
Spring source code analysis - 1 - start @ h_ 403_ 1 @ when using spring in web projects, we will Add the following con…… -
Dependency, association, aggregation, combination
Excerpt from: http://www.iteye.com/topic/632059 rely on It can be simply understood that one class a uses another clas…… -
Java mail
We have used many emails, QQ, 163, Netease, etc. 1、 SMTP protocol should be followed when sending e-mail, and POP3 pr…… -
As you know, Java singleton mode is not singleton mode
When we search the singleton mode, we can see many examples, such as lazy and hungry, as follows: When we write a main…… -
java. lang.NoSuchMethodError: javax. servlet. ServletContext. getContextPath()Ljava/lang/String;
Problem Description: in eclipse 3 This error always occurs when starting Tomcat6 in 7, java. lang.NoSuchMeth…… -
18 ID number verification methods for China’s residents, Java algorithm implementation
public static boolean validate18Idcard(String idcard){ if(idcard == null ) { return false; …… -
Problems caused by cookies containing Chinese
On Friday, after the project test was completed and there was no problem, it went online. After going online, it was f…… -