包含标签:Java 的文章
-
Introduction to mybatis framework for java learning
Introduction to mybatis framework for java learning 0x00 Preface The previous article uses JDBC to connect the databas…… -
Command execution of Java audit
Command execution of Java audit 0x00 Preface In fact, there are not many classes that can execute commands in Java, un…… -
Spring framework basics for java learning
Spring framework basics for java learning 0x00 Preface Continue the previous article and continue to update the spring…… -
Analysis of common collections 7 for Java Security
Analysis of common collections 7 for Java Security 0x00 Preface The chain explained in this article is the last CC cha…… -
Java learning JSP
Java learning JSP 0x00 Preface In fact, there is not much about JSP. Let's simply record the conceptual content of JSP…… -
Java start (basic)
data type Boolean 1 bit byte 1 byte (8 bits) short 2 bytes char 2 bytes int 4 bytes long 8 bytes The default type uses…… -
Javassist dynamic programming for Java Security
Javassist dynamic programming for Java Security 0x00 Preface Before debugging the CC2 chain, let's fill in the knowled…… -
Two ways of configuring virtual hosts in Tomcat
1. Virtual host configuration based on host name Suppose there is hello. Com in the root folder under Tomcat and wenba…… -
Hibernate operation: could not get next sequence value;
Error message: [2017-09-28 18:51:38,854]-[org.hibernate.util.JDBCExceptionReporter:101] ERROR - Numeric Overflow org.s…… -
java. lang.IllegalAccessError: tried to access field org. slf4j. impl. StaticLoggerBinder. SINGLETON from class org. slf4j. LoggerFactory
Error record: Java lang.IllegalAccessError: tried to access field org. slf4j. impl. StaticLoggerBinder. SINGLETON from…… -
#PriorityQueue of Java queue series
In the previous article, I used a diagram to sort out the relationship between various queues in Java. Here is the Pri…… -
How to make the JDK version switch as smooth as silk
I use Java 8 at work, but I have two versions of JDK installed on my personal computer: openjdk8 and openjdk11. There …… -
Probe into integer caused by an integer interview question
Interview questions: 1. It's mentioned in the title. It's jdk1 5 environment. OK, let's create a new project, create a…… -
Tomcat startup project reports an error Java lang.OutOfMemoryError: Java heap space
Recently, when deploying a web project using MyEclipse and starting tomcat, an error is reported: Solution: add config…… -
Integration of Tomcat and Apache server under Windows system
Note: This article is a successful real experiment in reading. The book mentioned the incompatibility of different ver…… -
How to find the implementation class of the mybatis mapper interface – source code analysis
Keywords: mybatis principle, source code, mybatis mapper interface implementation class, proxy mode, dynamic proxy, Ja…… -
How to find your favorite girlfriend with java8 stream API
The traditional Java collection operation is a little verbose. When we need to filter and sort the combined elements, …… -
Java generics, understanding these is enough.
Contents of this document: 1、 What are Java generics? 2、 Common generic writing examples Generic class definition: D…… -
Use and comparison of countdownlatch and cyclicbarrier in Java
Countdownlatch and cyclicbarrier are both Java 1 5 began to introduce a tool used in multithreaded programming. They h…… -
Cookie instance, understanding cookies
1、 Understand what cookies are in one sentence Cookies are small documents sent by the server to the client to record…… -
ThreadLocal detailed explanation, ThreadLocal source code analysis, ThreadLocal diagram
This article is about: Concept explanation ----- principle illustration ----- source code analysis ----- thought arran…… -
Java generates compressed packages, and zipoutputstream is used
Case: obtain network resources a, B and C according to the URL, and put resources a and C together to generate a XXX z…… -
Introduction principle and practice of spring security
In web application development, security is undoubtedly very important. Choosing spring security to protect web applic…… -
Factorization using tail recursion
Usually, when calculating the factorial of a number, we will use the recursive algorithm. The recursive book program c…… -
Using scheduled tasks in spring projects
When we want to execute some business methods at a certain point in time, we use timed tasks. It is very simple to use…… -
BF algorithm
BF algorithm, short for brute force algorithm. Used to detect whether a string is a substring of another string. Conce…… -
Spring source code analysis – 1 – start
Spring source code analysis - 1 - start @ h_ 403_ 1 @ when using spring in web projects, we will Add the following con…… -
Dependency, association, aggregation, combination
Excerpt from: http://www.iteye.com/topic/632059 rely on It can be simply understood that one class a uses another clas…… -
Java mail
We have used many emails, QQ, 163, Netease, etc. 1、 SMTP protocol should be followed when sending e-mail, and POP3 pr…… -
As you know, Java singleton mode is not singleton mode
When we search the singleton mode, we can see many examples, such as lazy and hungry, as follows: When we write a main…… -
java. lang.NoSuchMethodError: javax. servlet. ServletContext. getContextPath()Ljava/lang/String;
Problem Description: in eclipse 3 This error always occurs when starting Tomcat6 in 7, java. lang.NoSuchMeth…… -
18 ID number verification methods for China’s residents, Java algorithm implementation
public static boolean validate18Idcard(String idcard){ if(idcard == null ) { return false; ……