包含标签:Java 的文章
-
Interface and polymorphism in java learning
0x00 Preface In the previous articles, we talked about encapsulation and inheritance. In this article, let's talk abou…… -
Notes on java learning
Notes on java learning 0x00 Preface Continuing with the previous article, this article will write about the relevant c…… -
Filter defense XSS of Java audit
Filter defense XSS of Java audit 0x00 Preface This paper considers some small details of audit from the perspectives o…… -
Analysis of common collections 7 for Java Security
Analysis of common collections 7 for Java Security 0x00 Preface The chain explained in this article is the last CC cha…… -
Jackson chapter of java learning
Jackson chapter of java learning 0x00 Preface The content of this article is relatively simple and simple to record. 0…… -
Crawler of java learning
Crawler of java learning 0x00 Preface After summarizing the basic stage, write a reptile practice, from which you can …… -
Weblogic 2017-3248 analysis of Java Security
Weblogic 2017-3248 analysis of Java Security 0x00 Preface At the beginning, let's talk about the previous bypass metho…… -
Use and comparison of countdownlatch and cyclicbarrier in Java
Countdownlatch and cyclicbarrier are both Java 1 5 began to introduce a tool used in multithreaded programming. They h…… -
Cookie instance, understanding cookies
1、 Understand what cookies are in one sentence Cookies are small documents sent by the server to the client to record…… -
ThreadLocal detailed explanation, ThreadLocal source code analysis, ThreadLocal diagram
This article is about: Concept explanation ----- principle illustration ----- source code analysis ----- thought arran…… -
Java generates compressed packages, and zipoutputstream is used
Case: obtain network resources a, B and C according to the URL, and put resources a and C together to generate a XXX z…… -
Introduction principle and practice of spring security
In web application development, security is undoubtedly very important. Choosing spring security to protect web applic…… -
Factorization using tail recursion
Usually, when calculating the factorial of a number, we will use the recursive algorithm. The recursive book program c…… -
Using scheduled tasks in spring projects
When we want to execute some business methods at a certain point in time, we use timed tasks. It is very simple to use…… -
BF algorithm
BF algorithm, short for brute force algorithm. Used to detect whether a string is a substring of another string. Conce…… -
Spring source code analysis – 1 – start
Spring source code analysis - 1 - start @ h_ 403_ 1 @ when using spring in web projects, we will Add the following con…… -
Dependency, association, aggregation, combination
Excerpt from: http://www.iteye.com/topic/632059 rely on It can be simply understood that one class a uses another clas…… -
Java mail
We have used many emails, QQ, 163, Netease, etc. 1、 SMTP protocol should be followed when sending e-mail, and POP3 pr…… -
As you know, Java singleton mode is not singleton mode
When we search the singleton mode, we can see many examples, such as lazy and hungry, as follows: When we write a main…… -
java. lang.NoSuchMethodError: javax. servlet. ServletContext. getContextPath()Ljava/lang/String;
Problem Description: in eclipse 3 This error always occurs when starting Tomcat6 in 7, java. lang.NoSuchMeth…… -
18 ID number verification methods for China’s residents, Java algorithm implementation
public static boolean validate18Idcard(String idcard){ if(idcard == null ) { return false; …… -
Problems caused by cookies containing Chinese
On Friday, after the project test was completed and there was no problem, it went online. After going online, it was f…… -
-
HTTP 403, Tomcat configures HTTPS, unable to access, return status code HTTP 403
In order to access the application started by the local machine (Windows system) in the form of HTTPS, after generatin…… -
Loading of Java classes
Keyworked Java class loading, class loading mechanism, classloader, parent delegation model, parent delegation model W…… -
Java uses zxing to generate QR code bar code
1、 Add the Maven dependency of zxing, or download the zxing jar package This example uses zxing3 Version 2.0 Maven de…… -
Three implementations of Java proxy
The Java proxy mode can be implemented in the following ways: 1. Static proxy. 2. JDK dynamic agent. 3. C…… -
Mybatis source code Learning Series
preface A long time ago, we learned Java from a console of Hello world At the beginning, we entered the object-oriente…… -
The Linux system reports an error when the virtual machine starts. This host supports Intel VT-x, but Intel VT-x is disabled
An error is reported when using the virtual machine to start Linux, as follows: The virtual machine is configured to u…… -
Java program questions
Excerpt from: http://www.cnblogs.com/forlina/archive/2011/08/03/2126292.html 1. Complete quick sorting and bubble …… -
Jedis, spring redis data integrated use, version exceptions and solutions.
Recently, there have been some problems in integrating and using redis spring redis spring:3.2. 4.RELEASE jedis: jedi…… -
The of Java 8 — simple and elegant lambda expressions to explore Java 9 module system and reaction flow
After the release of Java 8, words such as lambda expression, stream and so on slowly appeared in our words. For examp……