包含标签:Java 的文章
-
Spring cloud security
Spring security is a security framework provided by spring, which provides authentication and authorization functions.…… -
Remember a mistake about the use of SSM framework
Today, I encountered a very fucking problem. Finally, I found that I forgot to add @ Autowired to the corresponding se…… -
Two common solutions to undefined problems in front-end JSON acquisition
A friend from the blog Park answered: Why add "(" ("+ data +")); / / "to eval? The reason lies in the problem of Eval …… -
Druid encryption
As for why to encrypt, it mainly prevents too many people from knowing the database password, which may cause losses t…… -
Shiro actual combat series (IX) Web
1、 Configuration The easiest way to integrate Shiro into any web application is on the web Configure contextlistener …… -
AOP of spring (11)
A key component of the spring framework is the aspect oriented programming (AOP) framework. Aspect oriented programmin…… -
How to use java to send e-mail when port 25 of alicloud server is disabled (solve the problem of disabling port 25)
Usually, we use java to send mail locally. There is usually no problem, but if we deploy to the server, we may encount…… -
JDK built-in monitoring tool
This article is mainly about the popularization of tools. It tells you that there are two tools that can help us tune …… -
Introduction to mybatis principle and test ox knife
In my opinion, the principle of mybatis is consistent with that of hibernate in some aspects. First, review the princi…… -
Restful example of SSM framework
Demo environment: Maven + Spring + spring MVC + mybatis plus or mybatis + jdk8 I think there should be no problem with…… -
Lombok problem
Today, I studied Dubbo as a distributed open source project Dubbo app. In order to eliminate the conflict and interfer…… -
Druid monitoring configuration
Druid has many new features compared with the traditional c3p0, DBCP and dbcp2 You can online monitor the database and…… -
Remember an eclipse question about JDK and JRE and talk about javac
Today, my colleague encountered a problem and found that the import package actually reported an error, but the packag…… -
Portal project startup problem
Error message: Solution: replace application QA Properties file and apply Specify QA as the profile above properties a…… -
Crud practice of Hibernate
As a highly encapsulated persistence layer framework, hibernate used to be very powerful. Now, although it is not wide…… -
Whitelist of microservice internal communication
There are many ways to communicate with microservices. Some use sockets, some use HTTP client tool classes, and some h…… -
Custom events for spring (10)
The simple process of writing custom events is as follows: (1) Write customevent java (2) Write customeventpublisher j…… -
Singleton mode and JDBC
Singleton pattern is a common software design pattern. Its core structure contains only a special class called singlet…… -
Comparative analysis of mybatis + hibernate + jdbc
At present, mybatis is used most as a persistence layer because it meets the variability of Internet development. Ther…… -
Easypoi import Excel
Easypoi's excel export function is as simple as its import function. As I stressed before, the essence of easypoi is P…… -
Spring Boot:The field file exceeds its maximum permitted size of 1048576 bytes
Error message: the field file exceeds its maximum allowed size of 1048576 bytes because Tomcat is embedded in springbo…… -
SSM framework about using JSP as a view to show the problem solution
JSP has been used as a view layer to display data for a long time. No matter studying in school or working in an enter…… -
Multiple versions of spring source code address sharing
The source code address is: http://repo.spring.io/simple/libs-release-local/org/springframework/spring/ For friends wh…… -
Shiro actual combat series (15): Spring integration Shiro
Shiro's JavaBean compatibility makes it ideal for using spring XML or other spring based configuration mechanisms. The…… -
Merge list and de duplication in Java 8
The core code is as follows: The final result output is a B C. Application scenario: sometimes we need to merge two re…… -
Authorization of Shiro actual combat series (6)
Authorization, also known as access control, is the process of resource access management. In other words, control who…… -
Handler message under Android
The implementation principle of handler message in Android is studied: When new handler(), get the data under the curr…… -
There is no normal TM
Error key information: Just add the following code in the configuration file (application. Properties): Error reason: …… -
LCN error: attempts to join the non-existent transaction group
Error message: Solution: configure the following contents in TX LCN project to solve the problem: Repackaging is requi…… -
Multi data source configuration of SSM framework
Application scenario of multiple data sources: mainly how to combine multiple databases to meet business requirements …… -
Subject of Shiro actual combat series (10)
There is no doubt that the most important concept in Apache Shiro is subject. " Subject 'is just a security term, whic…… -
Reflection technology of mybatis + JDK dynamic agent + cglib agent
1、 Reflection Description of Baidu Encyclopedia: