包含标签:Java 的文章
-
Jackson chapter of java learning
Jackson chapter of java learning 0x00 Preface The content of this article is relatively simple and simple to record. 0…… -
Crawler of java learning
Crawler of java learning 0x00 Preface After summarizing the basic stage, write a reptile practice, from which you can …… -
Weblogic 2017-3248 analysis of Java Security
Weblogic 2017-3248 analysis of Java Security 0x00 Preface At the beginning, let's talk about the previous bypass metho…… -
Analysis of common collections 7 for Java Security
Analysis of common collections 7 for Java Security 0x00 Preface The chain explained in this article is the last CC cha…… -
Spring MVC common annotations for java learning
Spring MVC common annotations for java learning 0x00 Preface Continue with the previous article to record some annotat…… -
Java thread and TCP programming
thread Process is composed of threads. Multithreading can run multiple tasks at the same time. It is a necessary part…… -
Unsafe class of Java Security
Unsafe class of Java Security 0x00 Preface In fact, the use of some JNI programming and javaagent technologies in secu…… -
Java generates compressed packages, and zipoutputstream is used
Case: obtain network resources a, B and C according to the URL, and put resources a and C together to generate a XXX z…… -
Introduction principle and practice of spring security
In web application development, security is undoubtedly very important. Choosing spring security to protect web applic…… -
Factorization using tail recursion
Usually, when calculating the factorial of a number, we will use the recursive algorithm. The recursive book program c…… -
Using scheduled tasks in spring projects
When we want to execute some business methods at a certain point in time, we use timed tasks. It is very simple to use…… -
BF algorithm
BF algorithm, short for brute force algorithm. Used to detect whether a string is a substring of another string. Conce…… -
Spring source code analysis – 1 – start
Spring source code analysis - 1 - start @ h_ 403_ 1 @ when using spring in web projects, we will Add the following con…… -
Dependency, association, aggregation, combination
Excerpt from: http://www.iteye.com/topic/632059 rely on It can be simply understood that one class a uses another clas…… -
Java mail
We have used many emails, QQ, 163, Netease, etc. 1、 SMTP protocol should be followed when sending e-mail, and POP3 pr…… -
As you know, Java singleton mode is not singleton mode
When we search the singleton mode, we can see many examples, such as lazy and hungry, as follows: When we write a main…… -
java. lang.NoSuchMethodError: javax. servlet. ServletContext. getContextPath()Ljava/lang/String;
Problem Description: in eclipse 3 This error always occurs when starting Tomcat6 in 7, java. lang.NoSuchMeth…… -
18 ID number verification methods for China’s residents, Java algorithm implementation
public static boolean validate18Idcard(String idcard){ if(idcard == null ) { return false; …… -
Problems caused by cookies containing Chinese
On Friday, after the project test was completed and there was no problem, it went online. After going online, it was f…… -
-
HTTP 403, Tomcat configures HTTPS, unable to access, return status code HTTP 403
In order to access the application started by the local machine (Windows system) in the form of HTTPS, after generatin…… -
Loading of Java classes
Keyworked Java class loading, class loading mechanism, classloader, parent delegation model, parent delegation model W…… -
Java uses zxing to generate QR code bar code
1、 Add the Maven dependency of zxing, or download the zxing jar package This example uses zxing3 Version 2.0 Maven de…… -
Three implementations of Java proxy
The Java proxy mode can be implemented in the following ways: 1. Static proxy. 2. JDK dynamic agent. 3. C…… -
Mybatis source code Learning Series
preface A long time ago, we learned Java from a console of Hello world At the beginning, we entered the object-oriente…… -
The Linux system reports an error when the virtual machine starts. This host supports Intel VT-x, but Intel VT-x is disabled
An error is reported when using the virtual machine to start Linux, as follows: The virtual machine is configured to u…… -
Java program questions
Excerpt from: http://www.cnblogs.com/forlina/archive/2011/08/03/2126292.html 1. Complete quick sorting and bubble …… -
Jedis, spring redis data integrated use, version exceptions and solutions.
Recently, there have been some problems in integrating and using redis spring redis spring:3.2. 4.RELEASE jedis: jedi…… -
The of Java 8 — simple and elegant lambda expressions to explore Java 9 module system and reaction flow
After the release of Java 8, words such as lambda expression, stream and so on slowly appeared in our words. For examp…… -
Error Java lang.ClassCastException: com. xx cannot be cast to ResourceBundle
An error occurred: java.lang.ClassCastException: com.xxx cannot be cast to ResourceBundl…… -
The difference between “= =” and equals methods
When writing code, you often use "= =" and equsls. You rarely think about the difference between them. Now let's summa…… -
Explore Java 9 module systems and reaction flows
New features of Java 9, Java modularization, Java reaction flow, reactive, jigsaw Modular system The Java platform mod……