Recent Posts
-
Weblogic 2016-0638 analysis of Java Security
Weblogic 2016-0638 analysis of Java Security Article starting prophet: Weblogic 2016-0638 analysis of Java Security 0x…… -
Common collections1 analysis of Java Security (2)
Common collections1 analysis of Java Security (2) 0x00 Preface Continue the previous article and continue to debug the…… -
Java agent for Java Security
Java agent for Java Security 0x00 Preface I found that many technologies will use Java agent to implement it. It is sa…… -
Android network access (xutils3)
Xutils3 is an important library for Android network access. Basically, the contents involved in network requests are i…… -
Android listview line details display page writing and drop-down refresh implementation
Listview row details display page: The lightweight fragment is used to realize the simple detailed display of listview…… -
Android App hosted web page (WebView)
WebView will play an important role in how Android App opens Web pages and how to make a simple browser. WebView is a …… -
Real time communication (socket) that must be understood by Andrews
Socket: It can be divided into server and client. It is the encapsulation of TCP / IP. It uses IP address and port to…… -
Mybatis source code Learning Series
preface A long time ago, we learned Java from a console of Hello world At the beginning, we entered the object-oriente…… -
Loading of Java classes
Keyworked Java class loading, class loading mechanism, classloader, parent delegation model, parent delegation model W…… -
Problems caused by cookies containing Chinese
On Friday, after the project test was completed and there was no problem, it went online. After going online, it was f…… -
As you know, Java singleton mode is not singleton mode
When we search the singleton mode, we can see many examples, such as lazy and hungry, as follows: When we write a main…… -
Spring source code analysis – 1 – start
Spring source code analysis - 1 - start @ h_ 403_ 1 @ when using spring in web projects, we will Add the following con…… -
Factorization using tail recursion
Usually, when calculating the factorial of a number, we will use the recursive algorithm. The recursive book program c…… -
ThreadLocal detailed explanation, ThreadLocal source code analysis, ThreadLocal diagram
This article is about: Concept explanation ----- principle illustration ----- source code analysis ----- thought arran…… -
Java generics, understanding these is enough.
Contents of this document: 1、 What are Java generics? 2、 Common generic writing examples Generic class definition: D…… -
Integration of Tomcat and Apache server under Windows system
Note: This article is a successful real experiment in reading. The book mentioned the incompatibility of different ver…… -
How to make the JDK version switch as smooth as silk
I use Java 8 at work, but I have two versions of JDK installed on my personal computer: openjdk8 and openjdk11. There …… -
Hibernate operation: could not get next sequence value;
Error message: [2017-09-28 18:51:38,854]-[org.hibernate.util.JDBCExceptionReporter:101] ERROR - Numeric Overflow org.s…… -
What does the equals method compare in Java?
We know that whenever we create a new class, if the parent class is not specified, it inherits the object class by def…… -
Introduction to Axis2 WebService — development environment construction and concept understanding
On the concept of web service, there are various explanations on the Internet, but it is not easy to understand. It ca…… -
The difference between “= =” and equals methods
When writing code, you often use "= =" and equsls. You rarely think about the difference between them. Now let's summa…… -
The of Java 8 — simple and elegant lambda expressions to explore Java 9 module system and reaction flow
After the release of Java 8, words such as lambda expression, stream and so on slowly appeared in our words. For examp…… -
Java program questions
Excerpt from: http://www.cnblogs.com/forlina/archive/2011/08/03/2126292.html 1. Complete quick sorting and bubble …… -
Three implementations of Java proxy
The Java proxy mode can be implemented in the following ways: 1. Static proxy. 2. JDK dynamic agent. 3. C…… -
HTTP 403, Tomcat configures HTTPS, unable to access, return status code HTTP 403
In order to access the application started by the local machine (Windows system) in the form of HTTPS, after generatin…… -
18 ID number verification methods for China’s residents, Java algorithm implementation
public static boolean validate18Idcard(String idcard){ if(idcard == null ) { return false; …… -
Java mail
We have used many emails, QQ, 163, Netease, etc. 1、 SMTP protocol should be followed when sending e-mail, and POP3 pr…… -
BF algorithm
BF algorithm, short for brute force algorithm. Used to detect whether a string is a substring of another string. Conce…… -
Introduction principle and practice of spring security
In web application development, security is undoubtedly very important. Choosing spring security to protect web applic…… -
Cookie instance, understanding cookies
1、 Understand what cookies are in one sentence Cookies are small documents sent by the server to the client to record…… -
How to find your favorite girlfriend with java8 stream API
The traditional Java collection operation is a little verbose. When we need to filter and sort the combined elements, …… -
Tomcat startup project reports an error Java lang.OutOfMemoryError: Java heap space
Recently, when deploying a web project using MyEclipse and starting tomcat, an error is reported: Solution: add config……