Recent Posts
-
Explain in detail how to use spring security OAuth to implement OAuth 2.0 authorization
OAuth 2.0 is an industrial level authorization protocol. OAuth 2.0 is inherited from OAuth 1.0, which was created in 2…… -
Spring Security Oauth2. 0 implementation of SMS verification code login example
This article introduces spring security oauth2 0 realizes the login example of SMS verification code, which is shared …… -
Detailed explanation and comparison of spring transaction isolation and transaction propagation
Detailed explanation and comparison of spring transaction isolation and transaction propagation Spring is the administ…… -
Spring boot (4) uses JWT and spring security to protect the rest API
Under normal circumstances, it is very risky to directly expose the API. If you are directly attacked by a machine, yo…… -
Implementation method of feign of spring cloud using HTTP to request remote services
1、 Feign introduction In the spring cloud Netflix stack, each micro service exposes its own service in the form of HT…… -
Spring bean load execution order instance parsing
This paper mainly studies the loading and execution sequence of spring beans, as follows. Source of problem: One bean …… -
Simple implementation of Java address book system
This example shares the specific code of Java address book system for your reference. The specific contents are as fol…… -
On Hibernate n + 1 problem
Stored in the session cache are interrelated object graphs. By default, when hibernate loads the customer object from …… -
Migration of GC log parameters in Java 9
order This paper mainly studies the migration of java9 GC log parameters. Unified logging of JVM and GC Java 9 introdu…… -
Spring boot integration mybatis example code (concise version)
summary Now, most Internet applications still use mybatis to operate databases. This article introduces how to integra…… -
How spring boot uses spring security for security control
When writing web applications, we often need to do some security control on the page. For example, users without acces…… -
Creation and operation of spring boot project (picture and text)
summary I haven't played spring boot yet. Now more and more companies are using it and have to learn. This is the begi…… -
Cross domain, custom query and paging of spring boot (5)
Cross domain We have initially made a protected rest API, but we haven't covered a very important issue in the front-e…… -
Detailed explanation of spring transaction propagation and its implementation principle
This paper mainly studies the spring transaction propagation and its implementation principle. The details are as foll…… -
Spring cloud client load balancing ribbon in-depth understanding
1、 Load balancing load balancing (load balance): Based on the existing network structure, it provides a cheap, effect…… -
Hibernate closed instance resolution about session
This paper mainly studies the closing of session in Hibernate, as follows. 1. What is the difference between getcurren…… -
Application code example of Java concurrency condition blocking condition
This paper mainly studies the application example code of Java concurrency condition blocking condition, as follows. C…… -
2017 java development job interview questions worth collecting
The following is my own collection of interview questions for Java posts in 2017, which can be used to prepare for the…… -
Integrate spring security and customize the verification code instance in spring boot
Final effect 1. Realize page access permission restriction 2. Distinguish user roles and distinguish page permissions …… -
Implementation of spring security password error locking user for 5 times in Java
Introduction to spring security Spring security is a security framework that can provide declarative security access c…… -
Introducing com. Com into eclipse sun. image. codec. Perfect solution to JPEG packet error
When developing a java program in eclipse to process images, two packages need to be introduced: However, sometimes er…… -
Analysis of Java color tile programming problems
Niuniu likes colored things, especially colored tiles. Niuniu's room is paved with L square tiles. There are four poss…… -
Spring boot and mybatis configuration methods
1. First, all the dependencies required for configuring mybatis by spring boot are as follows: Here we mainly talk abo…… -
Analysis of the starting principle of spring boot jar
1. Preface Recently, when I was free to optimize the company's open API platform, I suddenly thought that I was famili…… -
Detailed explanation and example of Android single thread model
Detailed explanation and example of Android single thread model We will introduce the Android single thread model in d…… -
Android imitation QQ space dynamic interface sharing function
Let's see the effect first: With very little code, the data acquisition and processing of dynamic details and secondar…… -
Android realizes the functions of clicking on the picture in the WebView interface to slide browse and save the picture
1、 Implementation requirements Recently, the requirements encountered in the company's projects are as follows: 1. Cl…… -
How to implement the activity of starting another program in Android
How to implement the activity of starting another program in Android You can use action, for example: 1. For example, …… -
Android starts the activity implementation code in another app / APK
Android starts the activity implementation code in another app / APK preface: Android provides the ability to start an…… -
Talking about Android getting pictures on ImageView and a possible problem
1. Call setdrawingcacheenabled (true) before obtaining the picture: Example: mimageview.setdrawingcacheenabled (true);…… -
Graphic tutorial of Android studio installation and configuration method
This article mainly explains some problems encountered in installing Android studio and configuring environment variab…… -
Android adds text and image watermark example code to images
We sometimes need to add watermarks to pictures when we are doing projects. Shuihan encountered such a problem today, ……