Java JDBC programming North

preface In our daily APP or website, we often need to access data. For example, in wechat, we need to store a series of information such as our user name, mobile phone number, user password, etc. Relying on the Java related knowledge learned before can no longer meet this demand. Now the most basic and widely used application program is relati ...

Added by icey37 on Sat, 19 Feb 2022 00:35:57 +0200

[SpringBoot] use the function of token SMS verification code Redis to realize basic login and registration operations (including how to configure Redis token verification code)

On the idea of login registration business and the realization of some codes Recently, I started the development of mobile terminal project. As I am in the background, I certainly can't avoid realizing the functions that every app should have: login and registration. At the beginning, I felt very confused. So I write a blog here to share with ...

Added by lisaNewbie on Fri, 18 Feb 2022 23:36:14 +0200

SSM multi table addition

Development tools and key technologies: Eclipse Software, SSM Multi table addition Author: Chen Long Written on: April 28, 2021 Multi table addition should be a basic addition function required by every project. One function of this practical new data is a basic small function that every programmer must learn. How to realize this function o ...

Added by cyclops on Fri, 18 Feb 2022 23:34:08 +0200

Linux Installation JDK, Tomcat, mysql, redis

Virtual machine installation, Linux system and software installation Environmental Science: Software selection: server with GUI Network type: use network address translation (NAT) Power on automatic networking cd /etc/sysconfig/network-scripts/ vim Network profile //ONBOOT = "no" is changed to yes, and there is no need to conne ...

Added by sarun on Fri, 18 Feb 2022 23:32:30 +0200

day02 - Java basic syntax

day02 - Java basic syntax 0. Type conversion problem Type conversion (understanding) In Java, there will be different types of data that need to participate in the operation together, so these data types need to be converted to each other. There are two cases: automatic type conversion and forced type conversion. Automatic type conversion ...

Added by kman on Fri, 18 Feb 2022 23:07:52 +0200

26-4.27 multi thread learning notes

4.26-4.27 multi thread learning notes Multithreading 1. Threads are independent execution paths 2. A process contains threads, which may execute a process, and multiple threads are executing at the same time. 3. If multiple threads are opened in a process, the operation of threads is scheduled by the scheduler. The scheduler is closely ...

Added by david212 on Fri, 18 Feb 2022 22:46:09 +0200

Spring security principle - authorization

summary Earlier, we have briefly introduced the authentication process of verifying user name and password. Here, let's take a look at the permission verification process of Spring Security. First, let's use a simple example to get a general idea of what Spring Security authorization is. Examples First of all, let's try to keep it simple. ...

Added by jess3333 on Fri, 18 Feb 2022 22:12:00 +0200

ZTE Plus Moon Master-Algorithmic Elite Challenge-First Pilot

1. High Jump Difficulty: A star Title Description: In the new year, Niu Niu wants to jump higher. Cows themselves can jump high h h HM. At the same time Niu Niu has n n n high jump bou ...

Added by jengle52 on Fri, 18 Feb 2022 21:52:17 +0200

java - Getting Started with Reflection

Introduction to reflection Reflection is an important advanced feature in java and is used in many frameworks. Dynamic proxies are also implemented using reflection. Reflection allows us to get all the information about a class or object while the program is running. For a class, reflection obtains all its attributes and method information ...

Added by simona_85 on Fri, 18 Feb 2022 21:51:27 +0200

HashSet source code analysis, based on jdk1 8 detailed analysis

Before reading this article, it is recommended to read the blogger's article on HashMap: HashMap source code analysis + interview questions HashSet source code analysis 1, Basic introduction The underlying implementation is based on HashMap, so it is not guaranteed to iterate according to the insertion order or other order The time-con ...

Added by finkrattaz on Fri, 18 Feb 2022 21:28:44 +0200