Recent Posts
-
What happens when CPU or memory usage is too high
During the development process, sometimes we find that the CPU / memory occupied by the JVM remains high, which is inc…… -
On the concepts of Java RTTI and reflection
1、 Concept RTTI (run time type identification) means to identify the type of an object at runtime, and its correspond…… -
Front and rear end separation demo hotel management system
model design hotel management system, mainly related to check-in, check-out and room and guest information manageme…… -
Basic knowledge of computer network
1、 Computer network classification Local area network (LAN) is a computer communication network formed by connecting …… -
Parsing of string’s intern() method
1、 Overview In the versions before and after JDK7, there are differences in the implementation of string's intern() m…… -
Final keyword
1. Overview The most common meaning is to declare that "this thing cannot be changed". The reason for banning change m…… -
CDN 2021 full attack Guide (1)
This is the most complete, detailed, up-to-date, and practical article on CDN network against attacks in the whole net…… -
Reflection of java learning
Reflection of java learning 0x00 Preface Today, let's briefly record some things about reflection and annotation. Refl…… -
Common collections2 analysis of Java Security
Common collections2 analysis of Java Security Launch: common collections2 analysis of Java Security 0x00 Preface The u…… -
Unsafe class of Java Security
Unsafe class of Java Security 0x00 Preface In fact, the use of some JNI programming and javaagent technologies in secu…… -
Weblogic 2017-3248 analysis of Java Security
Weblogic 2017-3248 analysis of Java Security 0x00 Preface At the beginning, let's talk about the previous bypass metho…… -
Filter defense XSS of Java audit
Filter defense XSS of Java audit 0x00 Preface This paper considers some small details of audit from the perspectives o…… -
Fundamentals of mybatis framework for java learning
0x00 Preface Continue the introduction of the previous article and continue the content of mark mybatis. The previous …… -
JNDI injection for Java Security
JNDI injection for Java Security Article launch: JNDI injection for Java Security 0x00 Preface Continue with the previ…… -
Javassist dynamic programming for Java Security
Javassist dynamic programming for Java Security 0x00 Preface Before debugging the CC2 chain, let's fill in the knowled…… -
Spring framework basics for java learning
Spring framework basics for java learning 0x00 Preface Continue the previous article and continue to update the spring…… -
Java learning request
Java learning request 0x00 Preface In B / S architecture, request and response are essential. When visiting the web pa…… -
Response of java learning
Response of java learning 0x00 Preface Continuing from the previous article, this chapter updates the response. 0x01 R…… -
Filter and listener in java learning
Filter and listener in java learning 0x00 Preface In some login points or function points that can only be used after …… -
XxE of Java audit
XxE of Java audit 0x00 Preface In the past, I didn't know much about xxE vulnerabilities, but I had a preliminary unde…… -
Analysis of Java deserialization vulnerabilities
Analysis of Java deserialization vulnerabilities Share topics within the Department and team once, and share them Dese…… -
Common collections1 analysis of Java Security (3)
Common collections1 analysis of Java Security (3) 0x00 Preface Continue to analyze CC chain, using the previous articl…… -
Introduction to spring framework for java learning
Introduction to spring framework for java learning 0x00 Preface Recently, I have been studying the three frameworks of…… -
On the vulnerability of Weblogic T3 protocol in Java Security
On the vulnerability of Weblogic T3 protocol in Java Security The first article from the security guest: a preliminary…… -
Socket network programming for java learning
Socket network programming for java learning 0x00 Preface In the development of some tools, the most inseparable may b…… -
Java thread and TCP programming
thread Process is composed of threads. Multithreading can run multiple tasks at the same time. It is a necessary part…… -
Crawler of java learning
Crawler of java learning 0x00 Preface After summarizing the basic stage, write a reptile practice, from which you can …… -
Notes on java learning
Notes on java learning 0x00 Preface Continuing with the previous article, this article will write about the relevant c…… -
Common collections1 analysis of Java Security (1)
Common collections1 analysis of Java Security (1) 0x00 Preface In the CC chain, the specific implementation process is…… -
Java string handler summary
String class Simple string splicing String length Splits a string into an array of characters Gets the character at th…… -
Java start (basic)
data type Boolean 1 bit byte 1 byte (8 bits) short 2 bytes char 2 bytes int 4 bytes long 8 bytes The default type uses…… -
Command execution of Java audit
Command execution of Java audit 0x00 Preface In fact, there are not many classes that can execute commands in Java, un……