Recent Posts
-
Java decimal to binary, octal, hexadecimal string
Decimal to binary class DecToBin { public static void main(String[] args) { //System.out.println("Hello Worl…… -
Detailed explanation of symmetric encryption using Java (DES, 3DES, AES)
There are two sentences: 1) Algorithms and data structures are an important part of programming. If you lose algorithm…… -
Java encryption and decryption function example based on AES symmetric encryption algorithm
This paper describes the encryption and decryption function of Java based on AES symmetric encryption algorithm. Share…… -
Detailed explanation of Java backend to realize unified code scanning payment: wechat
Recently I finished a project and just had nothing to do. The product manager arranged a task for me. Make a function …… -
Explain in detail how Java obtains the file encoding format
1: Simply judge whether it is UTF-8 or not. Because it is generally GBK except UTF-8, it is set to GBK by default@ H_ …… -
Solve the problem of Java Lang.exceptionininitializererror error problem
Solve the problem of Java Lang.exceptionininitializererror error problem Start a project today An error is reported wh…… -
Play spring boot with angularjs and JDBC (4)
Refer to official examples: http://spring.io/guides/gs/relational-data-access/ -
Java IO is an example of computer search and deletion
I Recursive method @ h_ 301_ 4@ 1. Recursion is to call its own method on the premise that there is a method. 2. Recur…… -
Deep understanding of spring AOP
I preface In previous projects, I seldom paid attention to the specific implementation and theory of spring AOP. I jus…… -
Deep analysis of Java disassembly box
Let's start with a code: Guess what? Many people will think that the results are all true, but that's not the case tru…… -
JDBC connection to Oracle database function example
This paper describes the function of JDBC linking Oracle database. Share with you for your reference, as follows: I ho…… -
Java sorts list collections sort()
Sort the objects in a collection, and sort them in ascending or descending order according to the size of an indicator…… -
Several algorithms of Java symmetric encryption are implemented respectively
Java symmetric encryption is implemented using DES / 3DES / AES algorithms There are two sentences: 1) Algorithms and …… -
Example code of Excel file upload and download based on spring MVC
Recently, I encountered a demand. I need to download the excel template, upload it for analysis and store it in the da…… -
Explain in detail the simple addition, deletion and modification through JDBC (take MySQL as an example)
Foreword: what is JDBC Java database connectivity (JDBC) is an application program interface used in the Java language…… -
Collection of Java interview questions and answers (122 basic questions and 19 code questions)
A collection of java basic interview questions and answers (122 basic questions and 19 code questions). The details ar…… -
Deep understanding of spring multi data source configuration
We often encounter the problem of multiple data sources in projects, especially in projects such as data synchronizati…… -
Detailed explanation of three methods of converting list into map in Java
Detailed explanation of three methods of converting list into map in Java In this article, we introduce three methods …… -
Detailed explanation and examples of Java statement block
Java statement block I still remember when I first read the programming books of C, C + + and Java, there was an intro…… -
Detailed explanation of encryption and decryption function implemented by Java based on DES symmetric encryption algorithm
This paper describes the encryption and decryption function of Java based on DES symmetric encryption algorithm. Share…… -
Design of Java Web personal address book system
Now start the screenshot: Paste the code below: The first is the directory structure: index. jsp <%@ page language=…… -
Example code of mybatis interceptor for processing query parameters and query results
Now let's introduce the query parameters and query results processed by mybatis interceptor. The specific code is as f…… -
Java Web export data to PDF format file code snippet
The effect of this clip is: after accessing this request, the browser will open a new interface and display the PDF fi…… -
Writing method and simple use of mybatis configuration file
First meeting mybatis At first, Apache had an open source project of Batis, which was put in Google Code. Later, it wa…… -
Method of parsing excel file with Java
The POI package needs to be imported before the project is established. Download address of POI related jar package: h…… -
Implementation of Java websocket and sample code of spring websocket
Start learning websocket, and prepare to use it to realize a log that outputs log4j in real time on the page and the l…… -
Detailed explanation of XML configuration in mybatis
Mybatis commonly uses XML configurations with caching disabled Mybatis is fully configured as follows: Mybatis officia…… -
Summary of six principles and one rule of java object-oriented
1. Single responsibility principle: one kind only does what it should do. 2. Richter substitution principle: a subclas…… -
Summary of six principles and one rule of java object-oriented
1. Single responsibility principle: one kind only does what it should do. 2. Richter substitution principle: a subclas…… -
Android imitation news top navigation tab switching effect
Recently, due to personal interest, I wrote a demo that imitates the navigation tab at the top of the news. See the fi…… -
Implementation method of Android custom component into jar package
The implementation method of Android custom components into jar packages. Here, the jar packages of the Android view c…… -
Explain in detail the sending and receiving of Android SMS, and realize the monitoring of SMS
This paper introduces the sending of Android short messages and the monitoring of short messages by broadcast receiver……