包含标签:Java 的文章
-
What does RPC look like after peeling off layers of coat?
RPC, the full name of which is remote procedure call. Generally speaking, it refers to calling functions on the remote…… -
JDK dynamic proxy and cglib bytecode enhancement
1、 JDK dynamic agent Java in Java Lang.reflect package has its own proxy support. This class (proxy. Java) is used to…… -
What happens when CPU or memory usage is too high
During the development process, sometimes we find that the CPU / memory occupied by the JVM remains high, which is inc…… -
Java handles multipart / mixed requests
1、 Multipart / mixed request multipart / mixed and multipart / form date are formats for uploading multiple files. …… -
Introduction to jctools
JCTools As early as 1996, some papers put forward the concept of lockless queue. Later, the high performance of destro…… -
Introduction to Java agent
1、 Write in front Java agent technology appears in jdk1 After 5, it is relatively unfamiliar to most people, but we h…… -
Multithreaded programming learning eight (atomic operation class)
brief introduction Atomic operation means "the smallest particle that cannot be further divided", while atomic operati…… -
Java code specification
1、 Foreword This article refers to Alibaba java development manual, which mainly defines some code specifications and…… -
Multithreaded programming learning IV (use of lock)
1、 Foreword This article will introduce that using the lock object in Java 5 can also achieve the effect of synchroni…… -
Multithreaded programming learning 11 (detailed explanation of ThreadPoolExecutor)
1、 ThreadPoolExecutor parameter description public ThreadPoolExecutor(int corePoolSize,int maximumPoolSize,long k…… -
Hash algorithm and hash code
1、 Introduce Looking at this result, the problem arises. There is clearly groudhog {number = 3} in the map. Why does …… -
Analysis of common collections 7 for Java Security
Analysis of common collections 7 for Java Security 0x00 Preface The chain explained in this article is the last CC cha…… -
Java learning JSP
Java learning JSP 0x00 Preface In fact, there is not much about JSP. Let's simply record the conceptual content of JSP…… -
Java start (basic)
data type Boolean 1 bit byte 1 byte (8 bits) short 2 bytes char 2 bytes int 4 bytes long 8 bytes The default type uses…… -
Javassist dynamic programming for Java Security
Javassist dynamic programming for Java Security 0x00 Preface Before debugging the CC2 chain, let's fill in the knowled…… -
Analysis of Shiro 550 deserialization vulnerability in Java Security
Analysis of Shiro 550 deserialization vulnerability in Java Security Starting from security guest: analysis of Shiro 5…… -
Object oriented java learning
0x00 Preface I talked about some basic syntax of Java. Here is the core idea of Java, object-oriented. 0x01 object ori…… -
Java string handler summary
String class Simple string splicing String length Splits a string into an array of characters Gets the character at th…… -
JNDI injection for Java Security
JNDI injection for Java Security Article launch: JNDI injection for Java Security 0x00 Preface Continue with the previ…… -
Swing GUI programming for java learning
Swing GUI programming for java learning 0x00 Preface The previously used GUI is implemented based on AWT, but AWT is r…… -
Introduction to spring MVC for java learning
Introduction to spring MVC for java learning 0x00 Preface The two frameworks of SSM, mybatis and spring, were written …… -
Common collections1 analysis of Java Security (1)
Common collections1 analysis of Java Security (1) 0x00 Preface In the CC chain, the specific implementation process is…… -
Fundamentals of mybatis framework for java learning
0x00 Preface Continue the introduction of the previous article and continue the content of mark mybatis. The previous …… -
File IO stream of java learning
File IO stream of java learning 0x00 Preface In some normal development, it is common to let the script run to store s…… -
Interface and polymorphism in java learning
0x00 Preface In the previous articles, we talked about encapsulation and inheritance. In this article, let's talk abou…… -
Notes on java learning
Notes on java learning 0x00 Preface Continuing with the previous article, this article will write about the relevant c…… -
Filter defense XSS of Java audit
Filter defense XSS of Java audit 0x00 Preface This paper considers some small details of audit from the perspectives o…… -
Analysis of common collections 7 for Java Security
Analysis of common collections 7 for Java Security 0x00 Preface The chain explained in this article is the last CC cha…… -
Jackson chapter of java learning
Jackson chapter of java learning 0x00 Preface The content of this article is relatively simple and simple to record. 0…… -
Crawler of java learning
Crawler of java learning 0x00 Preface After summarizing the basic stage, write a reptile practice, from which you can …… -
Weblogic 2017-3248 analysis of Java Security
Weblogic 2017-3248 analysis of Java Security 0x00 Preface At the beginning, let's talk about the previous bypass metho…… -
Analysis of common collections 7 for Java Security
Analysis of common collections 7 for Java Security 0x00 Preface The chain explained in this article is the last CC cha……