Recent Posts
-
Emoji filtering
isNotEmojiCharacter( (codePoint == 0x0) ||== 0x9) ||== 0xA) ||== 0xD) ||>= 0x20) && (codePoint <= 0…… -
Java get current method
1. Get the current method stack. We usually use StackTraceElement[] stes = Thread. currentThread(). getStackTrace(); T…… -
ANNOTATION PROCESSING 101 by Hannes Dorfmann — 10 Jan 2015
Original address: http://hannesdorfmann.com/annotation-processing/annotationprocessing101 In this blog entry I would l…… -
Five things you don’t know about the Java collections API — turn
Part 1 http://www.ibm.com/developerworks/cn/java/j-5things2.html For many Java developers, the Java collections API is…… -
Implementation principle of JDK dynamic agent — reprint
Although the dynamic agent of JDK was used before, some problems have not been understood. For example: who calls the …… -
Jmap view memory usage and generate heapdump — conversion
PHP? uid=191&do=blog&id=7572"> http://www.webspherechina.net/home/space.PHP?uid=191&do=blog&id=7572…… -
Jar package dependency query
When you encounter jar package conflicts in the project, you need to understand the dependency of jars before excludin…… -
Java decompress multi directory zip files (solve the problem of Chinese garbled code) — reprint
Original address: http://zhangyongbo.iteye.com/blog/1749439 The method of specifying directory re is as follows: -
Anti if: the missing patterns — turn
@H_ 3010 @ original address: http://code.joejag.com/2016/anti-if-the-missing-patterns.html But then it gets you thinki…… -
Solve Java sql. Sqlexception: parameter number x is not an out parameter — turn
Recently, I wrote a project alone. I can't afford to hurt the program ape fighting alone! When Java calls MySQL stored…… -
Explore Java Lang.ref package — transfer
< H2 id = "major1" > overview Java. Lang.ref is a special package in the Java class library. It provides referen…… -
The 10 Most Important Security Controls Missing in JavaEE–reference
JavaEE has some excellent built-in security mechanisms,but they don’t come close to covering all the threats that your…… -
Encoding and scrambling (05) — conversion between GBK and UTF-8 — reprint
Original address: http://www.blogjava.net/pengpenglin/archive/2010/02/22/313669.html [GBK to UTF-8] On many forums and…… -
-
Java gets the real IP address — reprint
= request.getHeader("x-forwarded-for" (ip == || ip.length() == 0 || "unkNown"= request.getHeader("Proxy-Client-I…… -
Java ZIP File Example—refernce
In this tutorial we are going to see how to ZIP a file in Java. ZIP is an archive file format that enables data compre…… -
Commons Lang common tool class stringescapeutils use — to
https://my.oschina.net/ydsakyclguozi/blog/341496 Apache commons Lang (version 2.3 and above) provides us with a tool c…… -
Timer Stopwatch example
timer reference: 【1】 http://www.concretepage.com/spring/stopwatch-spring-example -
Java 8 concurrency tutorial — to
Threads and Executors Welcome to the first part of my Java 8 Concurrency tutorial. This guide teaches you in Java 8 w…… -
When using jetty for debugging, eclipse relies on the source code debugging method of the project
[1] Add source eclipse-->debug as-->debug configurations-->source [2] If source does not work Recompile and M…… -
J2EE security introduction — turn
< H2 id = "1" > I brief introduction Now more and more enterprise applications are built on J2EE platform, which…… -
In depth analysis of the working mechanism of Java I / O — reprint
< H2 id = "1. Basic architecture of Java I / O class library | outline" > basic architecture of Java I / O class…… -
How and Why Unsafe is Used in Java—reference
By sun. misc. Unsafe has been in Java from at least as far back as Java 1.4 (2004). In Java 9,Unsafe will be hidden al…… -
JDK dynamic agent realizes simple AOP — conversion
JDK dynamic proxy is an important feature of java reflection. In some way, it provides dynamic characteristics for Jav…… -
Jar package dependency query
When you encounter jar package conflicts in the project, you need to understand the dependency of jars before excludin…… -
Research on Hash storage mechanism by analyzing JDK source code — reprint
< H2 id = "major1" > analyze the hash storage mechanism through the source code of HashMap and HashSet < div …… -
Replace int constant with enum
Benefits of enumeration: 1. Type safety 2. Ease of use 3),BLUE(5),BLACK(8),YELLOW(13),GREEN(28 Color(.colorValue= -
20 very useful java program fragments — to
Original address: http://geek.csdn.net/news/detail/236591 Here are 20 very useful java program fragments. I hope they …… -
Use org apache. jasper. Jspc compiled JSP file — reprint
Jspc. Jspc setArgs(args); Set the required parameters, which is the same as compiling with instructions, Example of us…… -
Input system variables and operating parameters in eclipse — turn to
Original address: http://chenzhou123520.iteye.com/blog/1931670 During development, sometimes different system paramete…… -
Dynamics of Java programming, Part 5: dynamic conversion classes — reprint
In part 4, "", you learned how to use the javassist framework to convert the Java class file generated by the compiler……