Java
-
Java EE 7 / JAX-RS 2.0: Simple REST API Authentication & Authorization with Custom HTTP Header–reference
REST has made a lot of conveniences when it comes to implementing web services with the already available HTTP protoco…… -
Node RSA encryption, Java decryption and debugging
The encryption and decryption with node RSA JS is normal, and the encryption and decryption with Java rsautils tool cl…… -
Java files run under windows without JDK installed.
1. Firstly, the project should be GUI, using swing or AWT. 2. Use eclipse to package jar files. Right click the projec…… -
JDK dynamic agent realizes simple AOP — conversion
JDK dynamic proxy is an important feature of java reflection. In some way, it provides dynamic characteristics for Jav…… -
Java decompress multi directory zip files (solve the problem of Chinese garbled code) — reprint
Original address: http://zhangyongbo.iteye.com/blog/1749439 The method of specifying directory re is as follows: -
Java NiO — source code analysis of selector mechanism — conversion
I haven't understood how pipe wakes up the selector, so I went to see the source code of JDK (openjdk download), and s…… -
JSTL core tag usage
There are 13 Tags in JSTL core tag library, which are functionally divided into 4 categories: 1. Expression control la…… -
Deep parsing of Java Memory Model: basic part — conversion
Original address: http://www.codeceo.com/article/java-memory-1.html Classification of concurrent programming models In…… -
Visual swing interface editing — reprint
Original address: http://279234058.iteye.com/blog/2200122 Today, I found a WindowBuilder plug-in with powerful functio…… -
How Do Annotations Work in Java?– turn
Original address: https://dzone.com/articles/how-annotations-work-java Annotations have been a very important part of …… -
Executing System commands in Java—ref
One of the nice features of Java language is that it provides you the opportunity to execute native system commands an…… -
How to ignore escape characters in strings in Java — reprint
Original address: http://my.oschina.net/u/1010578/blog/366252 cause In the past few days, I need to debug the rest int…… -
Java theory and practice: Thread pools and work queues–reference
Why thread pools? Many server applications,such as Web servers,database servers,file servers,or mail servers,are orie…… -
Simple beauty jodd HTTP — a basket of applications
Jodd HTTP is a miniature and simple HTTP client, but it is simple and convenient. Using it, you can easily send reques…… -
Servlet implementation of HTTP communication foundation
1. The client sends an HTTP message HTTP protocol is based on TCP / UDP protocol and encapsulates the details of socke…… -
Java theory and practice: correct use of volatile variables — conversion
Original address: http://www.ibm.com/developerworks/cn/java/j-jtp06197.html -
Initialization exception in Maven compilation: COM / sun / tools / javac / code / typetags
Formula jdk11 used Lombok style 1.16 four Error reason: version mismatch Upgrade Lombok to 1.18 four Problem solving -
How and Why Unsafe is Used in Java—reference
By sun. misc. Unsafe has been in Java from at least as far back as Java 1.4 (2004). In Java 9,Unsafe will be hidden al…… -
Jar package dependency query
When you encounter jar package conflicts in the project, you need to understand the dependency of jars before excludin…… -
Base64 is used in cross platform transmission to ensure the integrity of non ASCII code strings
First, let's take an example: In this case, the B and B1 byte arrays are the same. What about the following situation?…… -
Simple beauty jodd HTTP — in-depth understanding of the source code HTTP protocol
Jodd is an open source Java tool set, which contains some practical tool classes and small frameworks. Simple but powe…… -
Understanding extension class loading — Official
http://docs.spring.io/spring-amqp/docs/1.3.6.RELEASE/reference/html/sample-apps.html#d4e1285 http://docs.spring.io/spr…… -
Java permissions and security policy — official document
3 Permissions and Security Policy 3.1 The Permission Classes The permission classes represent access to system resourc…… -
JAAS LOGIN IN WEBLOGIC SERVER–reference
The Java Authentication and Authorization Service (JAAS) is a standard extension to the security in the J2SE Developme…… -
Design and implementation of cache — reprint
This article is compiled from the following two Blogs: http://my.oschina.net/ScottYang/blog/298727http://my.oschina.ne…… -
Handling of inconsistent compiled code when eclipse uses Tomcat for deployment
Operation steps: 1. Add and remove items first 2. Clean clears the directory of the project in Tomcat 3. project-->…… -
Event based NiO multithreaded server — reprint
JDK1. NiO of 4 effectively solves the problem of thread overhead existing in the original streaming io. The main purpo…… -
Glossary of Terms in the JavaTM platform –reference
http://docs.oracle.com/javase/tutorial/information/glossary.html field :A data member of a class. Unless specified oth…… -
Jackson ignores unnecessary fields when deserializing
Sometimes, if a field is added to the database table, but the returned JSON string contains a field we do not need, an…… -
Java annotations: explored & explained — reprinted
Original address: http://www.javacodegeeks.com/2012/08/java-annotations-explored-explained.html One of the many wonder…… -
New function in Java math class — floating point number
Java ™ Language specification version 5 Lang. math and Java Lang. strictmath adds 10 new methods, and Java 6 adds 10 m…… -
Session
Session 1. Represents a session between the client and the server; 2. The middle end session of the web refers to the ……