包含标签:Java 的文章
-
Java serialization mechanism
1、 Why serialize? 1. Generally, Java objects can exist only when the JVM is running, that is, the life cycle of these…… -
Java development history
JDK 1.0 In April 1991, The green project, led by Dr. James Gosling, began to develop a program architecture that can r…… -
On the concepts of Java RTTI and reflection
1、 Concept RTTI (run time type identification) means to identify the type of an object at runtime, and its correspond…… -
What does RPC look like after peeling off layers of coat?
RPC, the full name of which is remote procedure call. Generally speaking, it refers to calling functions on the remote…… -
JDK dynamic proxy and cglib bytecode enhancement
1、 JDK dynamic agent Java in Java Lang.reflect package has its own proxy support. This class (proxy. Java) is used to…… -
What happens when CPU or memory usage is too high
During the development process, sometimes we find that the CPU / memory occupied by the JVM remains high, which is inc…… -
Java handles multipart / mixed requests
1、 Multipart / mixed request multipart / mixed and multipart / form date are formats for uploading multiple files. …… -
Introduction to jctools
JCTools As early as 1996, some papers put forward the concept of lockless queue. Later, the high performance of destro…… -
Introduction to Java agent
1、 Write in front Java agent technology appears in jdk1 After 5, it is relatively unfamiliar to most people, but we h…… -
Multithreaded programming learning eight (atomic operation class)
brief introduction Atomic operation means "the smallest particle that cannot be further divided", while atomic operati…… -
Java code specification
1、 Foreword This article refers to Alibaba java development manual, which mainly defines some code specifications and…… -
Dynamic agent for java learning
Dynamic agent for java learning 0x00 Preface In the later study of vulnerability research, we must know several knowle…… -
Introduction to mybatis framework for java learning
Introduction to mybatis framework for java learning 0x00 Preface The previous article uses JDBC to connect the databas…… -
Command execution of Java audit
Command execution of Java audit 0x00 Preface In fact, there are not many classes that can execute commands in Java, un…… -
Spring framework basics for java learning
Spring framework basics for java learning 0x00 Preface Continue the previous article and continue to update the spring…… -
Analysis of common collections 7 for Java Security
Analysis of common collections 7 for Java Security 0x00 Preface The chain explained in this article is the last CC cha…… -
Java learning JSP
Java learning JSP 0x00 Preface In fact, there is not much about JSP. Let's simply record the conceptual content of JSP…… -
Java start (basic)
data type Boolean 1 bit byte 1 byte (8 bits) short 2 bytes char 2 bytes int 4 bytes long 8 bytes The default type uses…… -
Javassist dynamic programming for Java Security
Javassist dynamic programming for Java Security 0x00 Preface Before debugging the CC2 chain, let's fill in the knowled…… -
Analysis of Shiro 550 deserialization vulnerability in Java Security
Analysis of Shiro 550 deserialization vulnerability in Java Security Starting from security guest: analysis of Shiro 5…… -
Object oriented java learning
0x00 Preface I talked about some basic syntax of Java. Here is the core idea of Java, object-oriented. 0x01 object ori…… -
Java string handler summary
String class Simple string splicing String length Splits a string into an array of characters Gets the character at th…… -
JNDI injection for Java Security
JNDI injection for Java Security Article launch: JNDI injection for Java Security 0x00 Preface Continue with the previ…… -
Swing GUI programming for java learning
Swing GUI programming for java learning 0x00 Preface The previously used GUI is implemented based on AWT, but AWT is r…… -
Introduction to spring MVC for java learning
Introduction to spring MVC for java learning 0x00 Preface The two frameworks of SSM, mybatis and spring, were written …… -
Common collections1 analysis of Java Security (1)
Common collections1 analysis of Java Security (1) 0x00 Preface In the CC chain, the specific implementation process is…… -
Fundamentals of mybatis framework for java learning
0x00 Preface Continue the introduction of the previous article and continue the content of mark mybatis. The previous …… -
File IO stream of java learning
File IO stream of java learning 0x00 Preface In some normal development, it is common to let the script run to store s…… -
Interface and polymorphism in java learning
0x00 Preface In the previous articles, we talked about encapsulation and inheritance. In this article, let's talk abou…… -
Notes on java learning
Notes on java learning 0x00 Preface Continuing with the previous article, this article will write about the relevant c…… -
Filter defense XSS of Java audit
Filter defense XSS of Java audit 0x00 Preface This paper considers some small details of audit from the perspectives o…… -
Analysis of common collections 7 for Java Security
Analysis of common collections 7 for Java Security 0x00 Preface The chain explained in this article is the last CC cha……