包含标签:Java 的文章
-
Spring security dynamically loads user role permissions to realize login and authentication functions
Many people find it difficult to implement login verification with spring security, and I felt the same when I first l…… -
Analysis of the underlying implementation principle of Java serialization and deserialization
1、 Basic concepts 1. What are serialization and deserialization (1) Java serialization refers to the process of conve…… -
Explain the formlogin login authentication mode of spring security in detail
1、 Application scenario of formlogin In the previous articles in this column, we have introduced the httpbasic mode o…… -
Parsing process of creating XML (no Chinese garbled code) based on Java
This article mainly introduces the parsing process of creating XML (no Chinese garbled code) based on Java. It is intr…… -
Methods of using wildcards in struts 2 configuration files (three forms)
Introduction to struts 2 Struts 2 is a web application framework based on MVC design pattern. It is essentially equiva…… -
Java 8 calculation of time difference method example
package insping; import java.time.LocalDate; import java.time.Month; import java.time.Period; public class Test { …… -
Detailed explanation of new I / O knowledge points of java7
This chapter focuses on the changed I / O API in the Java language, which is called "renewed I / O" or NiO 2 (jsr-203)…… -
Spring’s actual operation example of obtaining the ID of the bean itself
This example describes the actual operation of spring to obtain the ID of the bean itself. Share with you for your ref…… -
Detailed explanation of Java multithreaded communication implementation
This article mainly introduces the detailed implementation of Java multi-threaded communication. The example code is i…… -
Log4j novice quick start tutorial
brief introduction Log4j is an open source project of Apache (official website) http://jakarta.apache.org/log4j ), by…… -
Java console to achieve guessing games
This example shares the specific code of Java guessing game for your reference. The specific contents are as follows L…… -
Method and steps of realizing synchronous lock based on string
In some cases, we may want to do something based on strings. For example, it is more reasonable to use lock strings fo…… -
Java uses recursive algorithm to delete folders
Premise: Integrated development environment (IDE): Eclipse JDK version: 8.0 Several methods of file class: 1)isFile()…… -
How to obtain the real IP address of the client in Java interview
preface When developing some small games, we often pay more attention to sharing. For sharing, we hope to have differe…… -
Three ways to reverse the order of Java array elements (summary)
There are many ways to reverse array elements. Here are three common ways Direct array element exchange @Test public v…… -
The principle of future and futuretask in Java and its combination with thread pool
Future and future in Java are usually used together with thread pool to obtain the return value after thread pool retu…… -
Implementation of Java generic extensions keyword setting boundary
This article mainly introduces how the placeholder in < > in the generic definition is used with the extends key…… -
Analysis of single sign on implementation of spring cloud microservice based on redis cluster
brief introduction This paper introduces how to implement single sign on in microservice architecture Create three ser…… -
Java anti lock screen applet code example
To prevent the system desktop from automatically locking the screen, just type a jar package and write a batch program…… -
Java implementation code for array flipping
1. Java provides some toolkits to realize array flipping. I won't repeat reverse here... 2. You can also assign a new …… -
Java array difference instance code
The following example demonstrates how to use the removeAll () method to calculate the difference between two arrays: …… -
Instance implementation of Java array to obtain maximum and minimum values
The following example demonstrates how to use the collections. XML file of the collections class Max () and collection…… -
Adding element instances to Java arrays
The following examples demonstrate how to sort a Java array using the sort () method and insert elements into the arra…… -
Java uses policy patterns to optimize too much if else code
preface Not surprisingly, this should be the last time I shared it years ago. This time, I'll give you some tips that …… -
Spring framework configuration entity class complex attribute injection XML file process details
Spring framework is a very important framework in Java Web projects. Most web projects are divided into persistence la…… -
Using array stack (Java implementation)
Stack introduction The stack is a first in, then out ordered list. Stack is a special linear table that restricts the …… -
Construction template pattern usage example of Java abstract class
This article describes the construction template pattern usage of Java abstract classes. Share with you for your refer…… -
Java code statistics applet
This example shares the Java code statistics applet for your reference. The specific contents are as follows You can t…… -
Java uses OTP dynamic password (changed every minute) for login authentication
Git address: https://github.com/suyin58/otp-demo Screenshot of dynamic code: In the background management system open …… -
Mybatis annotation to separate reading and writing from multiple data sources
First, you need to create two libraries for testing. I use master here_ Test and slave_ Test two libraries, both of wh…… -
Detailed explanation of spring annotation programming model
In spring, there is a concept called meta annotation, which realizes the "derivation" of annotations through meta anno…… -
Simple factory pattern example of java interface oriented programming
This paper illustrates the simple factory pattern of java interface oriented programming. Share with you for your refe……
