Java
-
Two ways of spring boot Ajax cross domain
preface In most cases, the Java language will be used as a back-end language for the front-end PHP, node JS provides A…… -
Solutions to XML-RPC Chinese problems in PHP and Java
Problem Description: when using PHP and Java to operate XML-RPC, if the request contains Chinese characters, it will b…… -
Java verification code tool instance code
Tools: VerifyCodeServlet: LoginServlet: login. jsp: loginsuccess: Welcome, warm welcome, welcome <% = username% &…… -
Java input a year, a month and a day to judge the day of the year
Title: enter a certain day of a certain month in a certain year to judge the day of the year? Program analysis: take M…… -
Java uses JSON lib to handle JSON details and example code
Java uses JSON lib to handle JSON [project environment] 1. Convert JSON array object to list object; 2. Convert list t…… -
Introduction to ztree
[introduction] Ztree uses the core code of jQuery to implement a set of tree plug-ins that can complete most common fu…… -
String. Format (c# Java)
c#string. format Numeric format of string C or C currency D or D Decimal number E or e Scientific type F or F Fixed po…… -
Example code of spring security picture verification code function
Verification code logic Verification codes have been made in the project before. There are many codes for generating v…… -
Sample code used by the fullcalendar calendar plug-in of the Java Web project
This article introduces the sample code used by the fullcalendar calendar plug-in of the Java Web project and shares i…… -
Simple code for Java implementation of “year month day am / PM: minute: second”
How to format the "Year Month Day morning / afternoon hour: minute: second" date with the simpledateformat class: The …… -
Spring integrated redis complete instance code
Students who have done large-scale software systems know that as the system data becomes larger and more complex, the …… -
Application code example of Java concurrency condition blocking condition
This paper mainly studies the application example code of Java concurrency condition blocking condition, as follows. C…… -
Explain in detail how to use spring security OAuth to implement OAuth 2.0 authorization
OAuth 2.0 is an industrial level authorization protocol. OAuth 2.0 is inherited from OAuth 1.0, which was created in 2…… -
Hibernate closed instance resolution about session
This paper mainly studies the closing of session in Hibernate, as follows. 1. What is the difference between getcurren…… -
How to install Jenkins on CentOS
Jenkins is an open source continuous integration tool written in Java. It can be installed directly on CentOS through …… -
Spring cloud client load balancing ribbon in-depth understanding
1、 Load balancing load balancing (load balance): Based on the existing network structure, it provides a cheap, effect…… -
Code explanation of traditional thread synchronous communication technology of Java concurrency
This paper mainly studies the code examples of Java Concurrent traditional thread synchronous communication technology…… -
Detailed explanation of spring transaction propagation and its implementation principle
This paper mainly studies the spring transaction propagation and its implementation principle. The details are as foll…… -
Resolve the “XML parser error on line 1: content not allowed in preface” error
When publishing a project with eclipse, if you edit the XML file in the project with the Notepad provided by windows a…… -
Cross domain, custom query and paging of spring boot (5)
Cross domain We have initially made a protected rest API, but we haven't covered a very important issue in the front-e…… -
Introduction and example analysis of spring transaction isolation level
This paper mainly studies the introduction and examples of spring transaction isolation level, as follows. When two tr…… -
Creation and operation of spring boot project (picture and text)
summary I haven't played spring boot yet. Now more and more companies are using it and have to learn. This is the begi…… -
Detailed steps for installing Jenkins under CentOS 7 system
This article mainly introduces the relevant contents about installing Jenkins in CentOS 7 for your reference and learn…… -
How spring boot uses spring security for security control
When writing web applications, we often need to do some security control on the page. For example, users without acces…… -
Java graphic verification code generation tool class web page verification code
Recently, I made a verification code and found many problems with reference to online cases. I specially modified and …… -
Spring boot integration mybatis example code (concise version)
summary Now, most Internet applications still use mybatis to operate databases. This article introduces how to integra…… -
Spring boot example tutorial for creating non executable jar packages
We often have this scenario. We just need to turn spring boot into an ordinary jar package without a configuration fil…… -
Migration of GC log parameters in Java 9
order This paper mainly studies the migration of java9 GC log parameters. Unified logging of JVM and GC Java 9 introdu…… -
JSP spring boot / cloud uses filter to prevent XSS
JSP spring boot / cloud uses filter to prevent XSS I preface XSS (cross site scripting attack) Cross site scripting is…… -
Analysis of the starting principle of spring boot jar
1. Preface Recently, when I was free to optimize the company's open API platform, I suddenly thought that I was famili…… -
On Hibernate n + 1 problem
Stored in the session cache are interrelated object graphs. By default, when hibernate loads the customer object from …… -
Implementation example of oauth2 logoff under spring cloud
Following the above implementation of oauth2 based authentication and authorization under spring cloud, we will implem……
