包含标签:Java 的文章
-
Multithreaded programming learning ten (thread pool principle)
1、 Thread pool workflow Tips: This design scheme can avoid frequent thread creation, and most work tasks will stay in…… -
Comparison of execution efficiency between ArrayList and LinkedList
1、 Concept: Generally, we all know that ArrayList * is a list derived from an array. Used as a general-purpose object…… -
Front and rear end separation demo hotel management system
model design hotel management system, mainly related to check-in, check-out and room and guest information manageme…… -
Java serialization mechanism
1、 Why serialize? 1. Generally, Java objects can exist only when the JVM is running, that is, the life cycle of these…… -
Java development history
JDK 1.0 In April 1991, The green project, led by Dr. James Gosling, began to develop a program architecture that can r…… -
On the concepts of Java RTTI and reflection
1、 Concept RTTI (run time type identification) means to identify the type of an object at runtime, and its correspond…… -
What does RPC look like after peeling off layers of coat?
RPC, the full name of which is remote procedure call. Generally speaking, it refers to calling functions on the remote…… -
JDK dynamic proxy and cglib bytecode enhancement
1、 JDK dynamic agent Java in Java Lang.reflect package has its own proxy support. This class (proxy. Java) is used to…… -
What happens when CPU or memory usage is too high
During the development process, sometimes we find that the CPU / memory occupied by the JVM remains high, which is inc…… -
Java handles multipart / mixed requests
1、 Multipart / mixed request multipart / mixed and multipart / form date are formats for uploading multiple files. …… -
Introduction to jctools
JCTools As early as 1996, some papers put forward the concept of lockless queue. Later, the high performance of destro…… -
Weblogic 2016-0638 analysis of Java Security
Weblogic 2016-0638 analysis of Java Security Article starting prophet: Weblogic 2016-0638 analysis of Java Security 0x…… -
Java crawling prophet forum articles
Java crawling prophet forum articles 0x00 Preface The last article wrote some crawler code. Here is a complete crawler…… -
RMI deserialization for Java Security
RMI deserialization for Java Security 0x00 Preface Before analyzing fastjson vulnerabilities, you need to understand R…… -
Java learning request
Java learning request 0x00 Preface In B / S architecture, request and response are essential. When visiting the web pa…… -
Dynamic agent for java learning
Dynamic agent for java learning 0x00 Preface In the later study of vulnerability research, we must know several knowle…… -
Introduction to mybatis framework for java learning
Introduction to mybatis framework for java learning 0x00 Preface The previous article uses JDBC to connect the databas…… -
Command execution of Java audit
Command execution of Java audit 0x00 Preface In fact, there are not many classes that can execute commands in Java, un…… -
Spring framework basics for java learning
Spring framework basics for java learning 0x00 Preface Continue the previous article and continue to update the spring…… -
Analysis of common collections 7 for Java Security
Analysis of common collections 7 for Java Security 0x00 Preface The chain explained in this article is the last CC cha…… -
Java learning JSP
Java learning JSP 0x00 Preface In fact, there is not much about JSP. Let's simply record the conceptual content of JSP…… -
Java start (basic)
data type Boolean 1 bit byte 1 byte (8 bits) short 2 bytes char 2 bytes int 4 bytes long 8 bytes The default type uses…… -
Javassist dynamic programming for Java Security
Javassist dynamic programming for Java Security 0x00 Preface Before debugging the CC2 chain, let's fill in the knowled…… -
Analysis of Shiro 550 deserialization vulnerability in Java Security
Analysis of Shiro 550 deserialization vulnerability in Java Security Starting from security guest: analysis of Shiro 5…… -
Object oriented java learning
0x00 Preface I talked about some basic syntax of Java. Here is the core idea of Java, object-oriented. 0x01 object ori…… -
Java string handler summary
String class Simple string splicing String length Splits a string into an array of characters Gets the character at th…… -
JNDI injection for Java Security
JNDI injection for Java Security Article launch: JNDI injection for Java Security 0x00 Preface Continue with the previ…… -
Swing GUI programming for java learning
Swing GUI programming for java learning 0x00 Preface The previously used GUI is implemented based on AWT, but AWT is r…… -
Introduction to spring MVC for java learning
Introduction to spring MVC for java learning 0x00 Preface The two frameworks of SSM, mybatis and spring, were written …… -
Common collections1 analysis of Java Security (1)
Common collections1 analysis of Java Security (1) 0x00 Preface In the CC chain, the specific implementation process is…… -
Fundamentals of mybatis framework for java learning
0x00 Preface Continue the introduction of the previous article and continue the content of mark mybatis. The previous …… -
File IO stream of java learning
File IO stream of java learning 0x00 Preface In some normal development, it is common to let the script run to store s……