包含标签:Java 的文章
-
Multithreaded programming learning II (concurrent access to objects and variables)
1、 Concept 2、 Synchronized synchronization method 1. The problem of non thread safety exists in the instance variabl…… -
Multithreaded programming learning 12 (reading notes)
1、 Multithreading semantics 2、 Java Memory Model 3、 Memory semantics for synchronized, volatile, and final 4、 Other -
Java reflection mechanism
1、 Concept Java reflection is a method by which a java program can load a class whose name is known only when it runs…… -
See what web authentication technologies are available
Basic certification Basic authentication (basic authentication) is an authentication method defined from http / 1.0. B…… -
Elegant encoding using Lombok
1、 Introduction and use Lombok is a Java library that can simplify java code in the form of simple annotations and im…… -
Java file stream operation
1、 Concept In Java, The input and output of the file is through the stream (stream). A stream must be an active end a…… -
Multithreaded programming learning 6 (blocking queue in Java)
introduce Blocking queue means that when the queue is full, the queue will block the thread inserting elements until t…… -
Collaboration Library in Java – quasar
1、 Synergetic process A process can produce many threads. Each thread has its own context. When we use multithreading…… -
Final keyword
1. Overview The most common meaning is to declare that "this thing cannot be changed". The reason for banning change m…… -
Java 8 functional programming
1、 Function interface Why start with the function interface first? Because I think this is the entrance to java8 func…… -
Transformation of mail sending class smtpappender of log4j
During the development process, we sometimes need to send important error logs to relevant responsible persons by emai…… -
Common collections1 analysis pre knowledge of Java Security
Common collections1 analysis pre knowledge of Java Security 0x00 Preface The utilization chain of common collections, …… -
SQL injection of Java audit
SQL injection of Java audit 0x00 Preface As an introduction to Java Web audit, this article is also my first audit art…… -
Common collections1 analysis of Java Security (3)
Common collections1 analysis of Java Security (3) 0x00 Preface Continue to analyze CC chain, using the previous articl…… -
Analysis of common collections 6 for Java Security
Analysis of common collections 6 for Java Security 0x00 Preface In fact, the analysis of several chains are roughly th…… -
Interpretation of Java security’s native readObject method
Interpretation of Java security's native readObject method 0x00 Preface In the analysis of Shiro in the previous artic…… -
Analysis of Java deserialization vulnerabilities
Analysis of Java deserialization vulnerabilities Share topics within the Department and team once, and share them Dese…… -
Jdk7u21 chain analysis of Java Security
Jdk7u21 chain analysis of Java Security First article: analysis of the jdk7u21 chain of Java Security 0x00 Preface In …… -
XSS audit points of Java audit
XSS audit points of Java audit 0x00 Preface The previous article talked about a simple audit of XSS. This article can …… -
XxE of Java audit
XxE of Java audit 0x00 Preface In the past, I didn't know much about xxE vulnerabilities, but I had a preliminary unde…… -
Java agent for Java Security
Java agent for Java Security 0x00 Preface I found that many technologies will use Java agent to implement it. It is sa…… -
File operation vulnerability of Java audit
File operation vulnerability of Java audit 0x00 Preface This article intends to describe some file operation vulnerabi…… -
Database connection pool for java learning
Database connection pool for java learning 0x00 Preface The JDBC used earlier needs to re-establish objects every time…… -
Filter and listener in java learning
Filter and listener in java learning 0x00 Preface In some login points or function points that can only be used after …… -
Common collections1 analysis of Java Security (2)
Common collections1 analysis of Java Security (2) 0x00 Preface Continue the previous article and continue to debug the…… -
Java audit SSRF
Java audit SSRF 0x00 Preface This article will record the audit learning related content of Java SSRF. 0x01 SSRF vulne…… -
Collection of java learning
Collection of java learning 0x00 Preface In fact, the common classes in the previous article have already talked about…… -
Response of java learning
Response of java learning 0x00 Preface Continuing from the previous article, this chapter updates the response. 0x01 R…… -
Weblogic 2016-0638 analysis of Java Security
Weblogic 2016-0638 analysis of Java Security Article starting prophet: Weblogic 2016-0638 analysis of Java Security 0x…… -
Java crawling prophet forum articles
Java crawling prophet forum articles 0x00 Preface The last article wrote some crawler code. Here is a complete crawler…… -
RMI deserialization for Java Security
RMI deserialization for Java Security 0x00 Preface Before analyzing fastjson vulnerabilities, you need to understand R…… -
Java learning request
Java learning request 0x00 Preface In B / S architecture, request and response are essential. When visiting the web pa……