[network security] bottom layer extension and production of deserialization vulnerability WebShell

XMLDecoder deserialization vulnerability underlying The reference articles have been analyzed in great detail. Here I mainly talk about the final implementation. That is, the use of the Expression class import java.beans.Expression; public class test { public static void main(String[] args)throws Exception { Parameter();//With ...

Added by Cbrams on Tue, 28 Dec 2021 05:50:04 +0200

Java microservice architecture practice, MySQL8

The algorithm implementation of hashjoin itself is not complex. To say that it is very complex, it may be that when the optimizer selects the execution plan, whether to select hashjoin and appearance, and the internal table may be more complex. Anyway, with hashjoin now, the optimizer has another choice when choosing the join algorithm. MySQL i ...

Added by Masterchief07 on Tue, 28 Dec 2021 03:07:24 +0200

Byte Java senior engineer interview, falling in love with data structures Season 1

The maximum degree of each node is 2 (up to 2 subtrees) The left subtree and the right subtree are ordered, and the binary tree is an ordered tree Even if a node has only one subtree, it is necessary to distinguish between the left and right subtrees Properties of binary tree The i-th layer of non empty binary tree has at most 2i &m ...

Added by darkke on Tue, 28 Dec 2021 00:58:37 +0200

Tomcat's immortality, learning notes of four mainstream middleware integrated by Alibaba P8 boss

import java.io.Writer; import org.apache.catalina.Context; import org.apache.catalina.LifecycleException; import org.apache.catalina.startup.Tomcat; public class EmbeddedTomcatEx { public static void main(String[] args) throws LifecycleException, InterruptedException, ServletException { Tomcat tomcat = new Tomcat(); tomcat.se ...

Added by dewknight on Mon, 27 Dec 2021 23:22:24 +0200

Java interview real problem analysis is popular all over the network, 6

double 0.0 char \u0000,stay window The system parses spaces String null boolean false 4.10: once the array has allocated space, it can be used 4.11: array direct output, the output is the memory address 5.2D array usage 5.1: syntax of two-dimensional array declaration: data type [] [] array name; (recommended) ...

Added by astaroth on Mon, 27 Dec 2021 16:43:10 +0200

Docker is gone, Podman is about to rise!

Introduction to PodmanWhat is Podman?Podman is an open source container runtime project that can be used on most Linux platforms. Podman provides functions very similar to Docker. As mentioned earlier, it does not need to run any daemons on your system, and it can also run without root privileges.Podman can manage and run any container and cont ...

Added by bombytza on Mon, 27 Dec 2021 16:16:13 +0200

Practical application of Java tree structure (balanced binary tree AVL tree, java development framework)

System.out.println("Height of right subtree:" + avlTree.getRoot().rightHeight()); System.out.println("root = " + avlTree.getRoot()); System.out.println("root.left = " + avlTree.getRoot().left); System.out.println("root.left.left = " + avlTree.getRoot().left.left); } } class AVLTree{ private SNode root; //Find nodes to delete ...

Added by hr8886 on Mon, 27 Dec 2021 05:52:20 +0200

Android gradle concept and foundation, three years of experience in Java development

Text outline 1. What is gradle 2. The characteristics of groovy language and its relationship with java 3. Why is your apk packing so slow 4. How to use gradle programming to solve practical problems in work 5. Advanced usage of gradle (gradle multi-channel quick packaging plug-in) text 1. What is gradle? Let's take a look at the expla ...

Added by Radon3k on Sun, 26 Dec 2021 11:54:28 +0200

Hystrix service fault tolerance processing: what is hystrix

return this.name + ":" + Thread.currentThread() . getName(); @Override protected String getFallback() { return"failed"; } } After re executing the calling code, you can find that the returned content is "failed", which proves that fallback has been triggered. # 3, Semaphore policy configuration The semaphore policy configurat ...

Added by Neville1985 on Sun, 26 Dec 2021 10:24:51 +0200

The adaptation process of the previous life and the present life of the Flutter launch page

The APP startup page is the most common and necessary scenario in China. The startup page is a mandatory requirement on iOS. In fact, configuring the startup page is very simple, because in fluent, you only need:iOS configuration launchscreen storyboard;Configure windows background for Android;Generally, as long as the configuration is correct ...

Added by GYK on Sun, 26 Dec 2021 09:05:14 +0200