包含标签:Java 的文章
-
Completely bid farewell to the code copy of encryption and decryption module – detailed explanation of JCE core cpiher
premise javax. crypto. Cipher, translated as a password, is actually called a cipher, which is more suitable. Cipher i…… -
Analysis of resource loading in Java through source code
premise Recently, a basic component project just needs to use the resource loading in JDK. The resources mentioned her…… -
Java network programming – HTTP protocol
Definition of HTTP protocol This article temporarily does not study the handshake and wave process of TCP / IP at the …… -
Check whether the remote host can be connected with Java
有人推荐使用java的Runtime.exec()方法来直接调用系统的Ping命令。也有人完成了纯Java实现Ping的程序,使用的是Java的NIO包(na…… -
Java deletes redis according to the key specified by the keyword (fuzzy deletion is supported)
POM dependency: @ h_ 419_ 1@ @H_ 419_ 1@ Code directly available: @ h_ 419_ 1@ @H_ 419_ 1@ -
Solve the problem of fake death of Java FTP uploaded files
Before uploading files using FTP, the code was very stable. It has been used for nearly three years. Because of data m…… -
java. io. IOException: Zip bomb detected! The file would exceed the max.
terms of settlement: Just add a line of code reference resources: -
In return, python rub goddess heat to help send the circle of friends. The avatar is divided into nine palaces in Java, and then the puzzle avatar is generated
preface: In the evening, I brush a circle of friends. It's interesting to see such a circle of friends, as follows: So…… -
When Java sends a message, the header and sender are garbled
Recently, I encountered a problem. When Java sends mail, check the mailbox results. The sender and the mail header bod…… -
Reading and writing windows shared folders in Java programs
Use java to read and write shared folders through jcifs framework, use SMB protocol, and support domain authentication…… -
Log in to the server with the secret key and execute the shell script
When doing automation, sometimes it is inevitable to interact with the server. It happens that a project needs to exec…… -
Path switching of FTP upload changeworkingdirectory() method
During uploading, the ftpclient provides the upload method. For the second parameter path of upload (file, path), the …… -
Record the troubleshooting, analysis process and solution of a memory overflow problem
cause This test tool has been developed for some time. Due to the large amount of data and slow writing of data, the e…… -
How to dynamically modify the host file under Windows
Event Background: in order to verify whether the test data is successfully added at multiple test nodes in another env…… -
Java upload file FTP server code
1. In practical applications, files are usually uploaded through programs. 2. Upload files from Java to FTP server 3. …… -
Java map key value pairs sort by key and by value
I Theoretical preparation Map is the collection interface of key value pairs. Its implementation classes mainly includ…… -
Recursively traverse all XML nodes and child nodes
Reference article: https://blog.csdn.net/sidihuo/article/details/47318723 -
Java traverses the folder under the specified directory and finds the file containing the specified keyword
Enter the specified keyword, find the file containing the keyword in the specified directory, and return the file path…… -
Solve the problem that the file uploaded by ftpclient is empty and 0 bytes are displayed
Java is always empty when uploading files using ftpclient, but not when using FileZilla client. Later, after checking …… -
Java reflection mechanism and dynamic proxy
It is said that Java is a dynamic language. Why is it dynamic? Reflection! Through reflection, we can dynamically obta…… -
-
java8-Stream
Flow programming model Generally, the flow is used to operate the collection, and the operation on the collection is r…… -
Manually simulate JDK dynamic agent
For which methods? To implement your own dynamic proxy, you should first pay attention to which methods the proxy obje…… -
SSO single sign on idea
SSO (Single Sign On) What is single sign on: In large Internet companies, there will be multiple systems and projects.…… -
How to improve the throughput of web applications
Who restricted throughput? When we stress test a traditional project, we find that the throughput of the system is lim…… -
Written test programming (II) | analysis of 7 common sorting algorithms (with implementation code)
1. Quick sort (two implementation methods are given here) /**思路: * 1. 在数据集中,选择一个元素作为"基准(pivot)" …… -
Written test programming (I) | binary search and array correlation
Recently, a small buddy has to prepare some interview related articles in the background of the official account. Actu…… -
Java concurrent queues and containers
[Preface: it is one of the necessary skills for both big data practitioners and Java practitioners to master Java high…… -
For the memory leakage caused by development, the operation and maintenance team does not carry the pot in this way
A few days ago, the group arranged to be on duty and take turns to look after our services, mainly dealing with alarm …… -
Distributed transaction, consistency, transaction compensation, practice
1、 Design of transaction record compensation table 3、 Service compensation function Call the rest interface to trans…… -
Java video format conversion
In the project, various video formats need to be transcoded into MP4 format. Many methods have been tried. Finally, ff…… -
Spring security architecture and source code analysis
Spring security mainly implements authentication (authentication, which are you?) and access control (access control, ……