Recent Posts
-
com. sun. org. apache. regexp. Internal does not exist
Error reason: an error is reported when importing idea from TX LCN (version 5.0.2). Solution: remove this line of guid…… -
JSON array parsing in Java
Recently, I got through the related APIs of blog Park and other third-party APIs. Because the system I developed needs…… -
Spring configuring cross domain requests
This article focuses on the Spring + spring MVC + mybatis / mybatis plus framework environment, including springboot. …… -
Shiro practical combat series (I): introduction to practical combat
1、 What is Shiro? Apache Shiro is a powerful and flexible open source security framework that cleanly handles authent…… -
Reflection technology of mybatis + JDK dynamic agent + cglib agent
1、 Reflection Description of Baidu Encyclopedia: -
Authorization of Shiro actual combat series (6)
Authorization, also known as access control, is the process of resource access management. In other words, control who…… -
Comparative analysis of mybatis + hibernate + jdbc
At present, mybatis is used most as a persistence layer because it meets the variability of Internet development. Ther…… -
Druid monitoring configuration
Druid has many new features compared with the traditional c3p0, DBCP and dbcp2 You can online monitor the database and…… -
Shiro actual combat series (IX) Web
1、 Configuration The easiest way to integrate Shiro into any web application is on the web Configure contextlistener …… -
ThreadLocal memory leak
I saw an article about ThreadLocal memory leak on the Internet some time ago Therefore, I also studied the ThreadLocal…… -
org. springframework. beans. factory. Beancreationexception: error creating bean with name ‘jpamappingcontext
Background of error: migrate the blog project previously written in eclipse to idea. The ecilpse project has never bee…… -
Talk about javac
The Java language has the Java language specification, which describes in detail the morphology and syntax of the Java…… -
Summary and architecture of spring (I)
Personal description: This link is referenced in the following section: https://www.tutorialspoint.com/spring/spring_a…… -
Annotation based configuration in spring (7)
Annotation based configuration Since spring 2.5, you can use annotations to configure dependency injection. Instead of…… -
Form processing in spring (17)
Form processing is very common in actual development, such as login, registration, addition, modification and so on. I…… -
Spring cloud config
What are the main applications of the configuration center, that is, the config component in spring cloud? This articl…… -
Application of inheritance of Java features
Inheritance is for reuse. Reuse is to reduce redundant code and improve development efficiency. This time I talk about…… -
com. sun. org. apache. regexp. Internal does not exist
Error reason: an error is reported when importing idea from TX LCN (version 5.0.2). Solution: remove this line of guid…… -
JS to clear cookies
Recently, the new system development uses cookies to store user information and uses DES encryption Tools are as follo…… -
Integration of SSM framework (Maven example)
Many friends report errors in Maven because of POM file dependency Today, I quickly set up the SSM framework to ensure…… -
Subject of Shiro actual combat series (10)
There is no doubt that the most important concept in Apache Shiro is subject. " Subject 'is just a security term, whic…… -
Merge list and de duplication in Java 8
The core code is as follows: The final result output is a B C. Application scenario: sometimes we need to merge two re…… -
Singleton mode and JDBC
Singleton pattern is a common software design pattern. Its core structure contains only a special class called singlet…… -
Lombok problem
Today, I studied Dubbo as a distributed open source project Dubbo app. In order to eliminate the conflict and interfer…… -
Druid encryption
As for why to encrypt, it mainly prevents too many people from knowing the database password, which may cause losses t…… -
Spring (XX) uses log4j to record logs
Log records are also commonly used, such as exception information records or other relevant information records. Good …… -
Renren security of Renren open source read “writing high quality code: 151 suggestions for improving Java programs”
Ren security, I will study it in detail from this week. The previous research is only shallow. As stated in reading "w…… -
FreeMarker generates java code from templates
FreeMarker generates java code based on templates. In this sentence alone, you must also know its application, such as…… -
Spring (XV) declarative transaction
Declarative transaction management allows you to manage transactions with the help of configuration rather than source…… -
Spring cloud ribbon
Spring cloud implements load balancing through the ribbon. 1、 Add Maven dependency 2、 Application YML configuration …… -
Renren open source code generator
This article mainly includes three parts: introduction, code generation demonstration, code analysis (not very in-dept…… -
Shiro actual combat series (7): real
Realm is an application specific security data access platform (such as users, roles and permissions). Realm converts ……