Java JDBC programming North
preface
In our daily APP or website, we often need to access data. For example, in wechat, we need to store a series of information such as our user name, mobile phone number, user password, etc. Relying on the Java related knowledge learned before can no longer meet this demand. Now the most basic and widely used application program is relati ...
Added by icey37 on Sat, 19 Feb 2022 00:35:57 +0200
[SpringBoot] use the function of token SMS verification code Redis to realize basic login and registration operations (including how to configure Redis token verification code)
On the idea of login registration business and the realization of some codes
Recently, I started the development of mobile terminal project. As I am in the background, I certainly can't avoid realizing the functions that every app should have: login and registration. At the beginning, I felt very confused. So I write a blog here to share with ...
Added by lisaNewbie on Fri, 18 Feb 2022 23:36:14 +0200
SSM multi table addition
Development tools and key technologies: Eclipse Software, SSM Multi table addition
Author: Chen Long
Written on: April 28, 2021
Multi table addition should be a basic addition function required by every project. One function of this practical new data is a basic small function that every programmer must learn. How to realize this function o ...
Added by cyclops on Fri, 18 Feb 2022 23:34:08 +0200
Linux Installation JDK, Tomcat, mysql, redis
Virtual machine installation, Linux system and software installation
Environmental Science:
Software selection: server with GUI
Network type: use network address translation (NAT)
Power on automatic networking
cd /etc/sysconfig/network-scripts/
vim Network profile
//ONBOOT = "no" is changed to yes, and there is no need to conne ...
Added by sarun on Fri, 18 Feb 2022 23:32:30 +0200
day02 - Java basic syntax
day02 - Java basic syntax
0. Type conversion problem
Type conversion (understanding)
In Java, there will be different types of data that need to participate in the operation together, so these data types need to be converted to each other. There are two cases: automatic type conversion and forced type conversion.
Automatic type conversion
...
Added by kman on Fri, 18 Feb 2022 23:07:52 +0200
26-4.27 multi thread learning notes
4.26-4.27 multi thread learning notes
Multithreading
1. Threads are independent execution paths
2. A process contains threads, which may execute a process, and multiple threads are executing at the same time.
3. If multiple threads are opened in a process, the operation of threads is scheduled by the scheduler. The scheduler is closely ...
Added by david212 on Fri, 18 Feb 2022 22:46:09 +0200
Spring security principle - authorization
summary
Earlier, we have briefly introduced the authentication process of verifying user name and password.
Here, let's take a look at the permission verification process of Spring Security.
First, let's use a simple example to get a general idea of what Spring Security authorization is.
Examples
First of all, let's try to keep it simple. ...
Added by jess3333 on Fri, 18 Feb 2022 22:12:00 +0200
ZTE Plus Moon Master-Algorithmic Elite Challenge-First Pilot
1. High Jump
Difficulty: A star Title Description:
In the new year, Niu Niu wants to jump higher. Cows themselves can jump high
h
h
HM. At the same time Niu Niu has
n
n
n high jump bou ...
Added by jengle52 on Fri, 18 Feb 2022 21:52:17 +0200
java - Getting Started with Reflection
Introduction to reflection
Reflection is an important advanced feature in java and is used in many frameworks. Dynamic proxies are also implemented using reflection. Reflection allows us to get all the information about a class or object while the program is running. For a class, reflection obtains all its attributes and method information ...
Added by simona_85 on Fri, 18 Feb 2022 21:51:27 +0200
HashSet source code analysis, based on jdk1 8 detailed analysis
Before reading this article, it is recommended to read the blogger's article on HashMap: HashMap source code analysis + interview questions
HashSet source code analysis
1, Basic introduction
The underlying implementation is based on HashMap, so it is not guaranteed to iterate according to the insertion order or other order The time-con ...
Added by finkrattaz on Fri, 18 Feb 2022 21:28:44 +0200