Recent Posts
-
Java realizes account withdrawal and deposit operations
This article mainly introduces the Java implementation of account withdrawal and deposit operation. The example code i…… -
Detailed explanation of the process of building Eureka server port with multiple modules of spring could
This article mainly introduces the detailed process of building Eureka server port with multiple modules in springcour…… -
The correct way to implement the exit function of spring security (recommended)
Introduction to spring security The core functions of spring security mainly include: Its core is a set of filter chai…… -
Example of uploading files to OSS (alicloud) using java
This article describes how Java implements the function of uploading files to OSS (Alibaba cloud). Share with you for …… -
Joint search set of data structure and algorithm (Disjoint Set)
Recognize and search the set Many people will feel strange to the joint query set (Disjoint Set), have never heard of …… -
Usage example of project bean in spring actual combat container
This article describes the usage of project bean in spring container. Share with you for your reference, as follows: O…… -
Spring security dynamically loads user role permissions to realize login and authentication functions
Many people find it difficult to implement login verification with spring security, and I felt the same when I first l…… -
Automatic configuration does not take effect after inheriting webmvcconfigurationsupport and how to configure interceptors
There are many articles on the Internet about spring boot2 After 0, it is recommended to directly implement webmvcconf…… -
Simple implementation of Huffman algorithm for Java optimal binary tree
The optimal binary tree is also called Huffman tree. The straight point is that each node has weight. We let the large…… -
Writing examples of 7 singleton modes in Java version
preface Today, I saw a sentence in an article. Add V before single example DCL. Let me take a closer look at the singl…… -
Spring process analysis of ActiveMQ message queue technology integration
This article mainly introduces the integration of ActiveMQ message queue technology and spring process parsing. It is …… -
Analysis of PDF file generated by Java based on rich text
This article mainly introduces the process of generating PDF files by Java according to rich text. It is introduced in…… -
Parsing process of reading XML file content through Java
This article mainly introduces the content parsing process of reading XML files through Java. It is introduced in grea…… -
Spring security test practice
introduction The security module of the test question management system uses spring security, and the code is transpla…… -
Detailed explanation of volatile keyword in Java concurrency tutorial
introduction When it comes to multithreading, I think the most important thing is to understand the concept of a criti…… -
Detailed explanation of web client usage in spring 5
preface Spring 5 brings a new responsive web development framework Webflux and a new httpclient framework webclient. W…… -
Spring declarative transaction implementation process parsing
/** * 声明式事务: * * 环境搭建: * 1、导入相关依赖 * 数数据 * 3、给方法上标注 @Transactional 表示当前方法是…… -
Java console to achieve guessing games
This example shares the specific code of Java guessing game for your reference. The specific contents are as follows L…… -
Detailed explanation of Java multithreaded communication implementation
This article mainly introduces the detailed implementation of Java multi-threaded communication. The example code is i…… -
Detailed explanation of new I / O knowledge points of java7
This chapter focuses on the changed I / O API in the Java language, which is called "renewed I / O" or NiO 2 (jsr-203)…… -
Methods of using wildcards in struts 2 configuration files (three forms)
Introduction to struts 2 Struts 2 is a web application framework based on MVC design pattern. It is essentially equiva…… -
Explain the formlogin login authentication mode of spring security in detail
1、 Application scenario of formlogin In the previous articles in this column, we have introduced the httpbasic mode o…… -
Spring security can automatically log in to “remember me” within two weeks
This article is part of the spring security series. In the previous article, we implemented userdetailsservice and use…… -
Mybatis-Plus3. 2.0 metaobjecthandler cannot globally populate public fields
Problem description Recently, the project architecture team has taken the following measures for the decision of confi…… -
Detailed explanation of spring IOC container knowledge points
Spring IOC container can be compared to a restaurant. When you come to a restaurant, you usually directly greet the wa…… -
Basic knowledge points of Java language and platform
Before using Java, we should first make clear the difference between the Java language and the Java platform. However,…… -
Spring boot builds a file server to solve the problem of uploading and downloading multiple pictures at the same time
In normal business scenarios, it is inevitable to build a file upload server as a public service. Generally, only a si…… -
Java uses socket to determine whether a service can connect to a code instance
This article mainly introduces how Java uses socket to judge whether a service can be connected. The example code is i…… -
Spring boot JPA service layer code example
This article mainly introduces the spring boot JPA service layer code examples, which are introduced in great detail t…… -
Using nail robot to push message to nail group based on Java
This article mainly introduces the use of nail robot to push messages to nail groups based on Java. The example code i…… -
Java 7 improved exception handling
There are two improvements in exception handling - multicatch and final re throwing. To see how they can help us, firs…… -
Examples and solutions of java thread deadlock
This article mainly introduces java thread deadlock examples and solutions. The example code is introduced in great de……