XSS attack principle and protection
XSS(Cross Site Scripting) is a common way in Web attacks. Through this attack, users can be controlled to do a series of malicious operations, such as stealing, tampering, adding users' data or inducing to phishing sites.
A common way is to use unfiltered parameters to pass ...
Added by Nothsa on Thu, 28 May 2020 07:50:18 +0300
1. Parse xml using sax
- sax mode can not add or delete, only query operation
Print out the entire document and execute the parse method. The first parameter is the path to the xml, and the second parameter is the parser.With respect to parsers, you need to create a class, inherit the event resolution class, and override the methods in it.
Added by neogranas on Mon, 25 May 2020 19:59:42 +0300
The text and pictures of this article are from the Internet, only for learning and communication, not for any commercial purpose. The copyright belongs to the original author. If you have any questions, please contact us in time for handling.
Python has a lot of map visualization libraries. Although Matplotlib library is very power ...
Added by dannyluked on Thu, 21 May 2020 09:54:45 +0300
Case story: Bug videos are found during the test, which need to be provided for reference in the development of Bug solution,
However, after video shooting, it is too large to be transmitted on wechat client,
Therefore, there have been testers using winzip to compress in batches (part1, part2, part3),
Then transmit the "chaos" of vid ...
Added by ciaranmg on Tue, 19 May 2020 20:11:39 +0300
Automated testing is simple, fast and easy to maintain. The most important part of automatic maintenance is element positioning.
Before we write code, we should make clear our thinking, so that when we write code again, we won't know how to start.
1. Manage elements and positioning methods through yaml (or other tools)
2. Encapsul ...
Added by NEWDAY on Sat, 16 May 2020 08:18:03 +0300
Sometimes, in this case, we have the value of one of the enumeration fields, and then get the information of enumeration or other fields through this value. If there is no tool class, we need to add corresponding methods to each enumeration. Through the method of tool class, we can reduce the code generation and make it more concise and bea ...
Added by jashankoshal on Sun, 10 May 2020 17:43:36 +0300
Spring IOC and Factory Mode
PS: The content of this article is hard core, which requires a better understanding of java's object-oriented, reflection, class loader, generics, properties, XML and other basic knowledge.
(1) Brief introduction
Before talking about Spring IOC, it's necessary to talk about Factory Pattern.Factory mode separates the ...
Added by edkellett on Fri, 08 May 2020 20:56:05 +0300
Popular understanding of spring source code (5) -- parsing and registering bean definitions
Last section talked about how to get document. After converting the document to document, the next extraction and registration bean is our play.
protected int doLoadBeanDefinitions(InputSource inputSource, Resource resource)
throws Bea ...
Added by TEENFRONT on Wed, 06 May 2020 00:53:03 +0300
I've always wanted to write this article, but I've been reviewing it for the sake of exams. I've delayed writing until now. I wrote a small project with node's express framework, which has the function of uploading pictures. Here's how to realize it (I use ejs)
First of all, when the user clicks upload avatar to upd ...
Added by jmugambi on Mon, 04 May 2020 23:15:52 +0300
When we use https to make network requests, we will receive the certificates from the server. These certificates are divided into agency certificates and certificates issued by ourselves. In ios, if we are going to request an organization certified to send an https request, we don't need to process it. But if it is a self signed certificate, we ...
Added by svihas on Mon, 04 May 2020 19:46:49 +0300