1> Business logic for paging implementation
1->N data are displayed on each page. For the total number of data records M, the number of pages M%N==0?M/N:M/N+1;
2->Page Rendering Paging html Part
3>Switch pages, input parameters, background processing, and retrieve new eligible data
4>Paging method, js paging, and ...
Added by whare on Sun, 19 Jul 2020 17:37:26 +0300
Docker is a lightweight virtualization technology, and lnmp is a powerful, open-source web running environment, so here's a demonstration of using Docker to build an lnmp image.
PS: To maintain lightweight and scalable performance, Docker encourages us to "one process per person"Container"means don't integrate too many functions ...
Added by madrazel on Fri, 17 Jul 2020 17:54:47 +0300
Druid is the best database connection pool in the Java language and provides powerful monitoring and extension capabilities.
After comparing Druid with HikariCP, although HikariCP has a higher performance than Druid, Druid includes many dimensions of statistical and analytical functions, which is why everyone chooses t ...
Added by cwarn23 on Sat, 04 Jul 2020 18:32:49 +0300
Recently, I watched a lot of spring boot teaching videos. I felt they were too long, and there was no actual combat of the project. Today, according to a blogger to write a simple user system to add, delete, modify and check, the source code can refer to the second issue of the article. This project use ...
Added by ecco on Sun, 28 Jun 2020 08:52:33 +0300
Modify MySqlMariaDB password
Modify the original password as soon as you know it
1 Use the SET PASSWORD command to change the password
2 UPDATE Command Modify Password
3 mysqladim change password
2 Forget the original password to modify
Modify MySql/MariaDB password
Change Passwor ...
Added by mike760534211 on Sat, 27 Jun 2020 19:43:37 +0300
seata is an open source distributed transaction solution dedicated to providing high-performance and easy-to-use distributed transaction services. seata will provide users with AT, TCC, SAGA and XA transaction modes, and build a one-stop distributed solution for users. The purpose of this tutorial is to provide a quick start to the case of seat ...
Added by Cogen on Thu, 25 Jun 2020 07:25:46 +0300
Develop an app to interact with the background database, based on MySQL+native JDBC+Tomcat, without using DBUtils or JDBC framework, pure underlying JDBC implementation.In the future, we will gradually change to the Spring framework, optimize MySQL, further deploy Tomcat and so on. Now the project is just startin ...
Added by _will on Tue, 23 Jun 2020 20:10:09 +0300
SSRF uses Gopher
After studying the application of Gopher protocol for one day, I decided to write a summary about the SSRF utilization of Gopher protocol.
Reference link: https://blog.csdn.net/qq_41107295/article/details/103026470
SSRF (server side request forgery) se ...
Added by dipenmistry on Tue, 23 Jun 2020 08:03:47 +0300
cc attack: for applications, such as malicious swipe verification code
DDoS attack: for servers, such as a large number of http requests, malicious access with large traffic
Note source station B video (Knowledge Area > wild Technology Association)Hacker attack and defense: from entry to access to y ...
Added by FoxhoundX on Sun, 21 Jun 2020 12:11:09 +0300
Build query SQL statement
Definition of search
GORM source code interpretation, based on v1.9.11 edition.
In the previous section, we explored how models are defined and how data tables are creat ...
Added by champoi on Sun, 21 Jun 2020 12:01:47 +0300