SpringBook integrates Jwt to generate token tokens (session can be replaced when front and back ends are separated)

Overview of token tokens generated by Jwt 1. Stateful landing and stateless landing Stateful service, that is, the server needs to record the client information of each session to identify the identity of the client and process requests according to the identity of the user, such as session in tomcat ...

Added by mrodrigues on Fri, 04 Oct 2019 17:04:39 +0300

Tool class for sending mail in java

Share with you a very useful tool class for sending mail, which is also a tool class I have been using.1. source code public class MailUtils { public static void sendMail(String email, String emailMsg) throws AddressException, MessagingException { // 1. Create a program and mail server session obj ...

Added by algy on Thu, 03 Oct 2019 22:46:14 +0300

hibernate Association (one-to-many)

1. what is correlation (association) 1.1 Association refers to the reference relationship between classes. If class A is associated with class B, the referenced class B will be defined as the property of class A. For example: t_hibernate_order t_hibernate_order_item An order corresponds to multiple or ...

Added by !Mikey on Wed, 02 Oct 2019 15:06:49 +0300

tf.variable_scope VS tf.name_scope

This article is based on the version of tf1.13 tf.variable_scope Class sum tf.name_scope For example, the initialization of corresponding classes is introduced. tf.variable_scope Class initialization def __init__(self, name_or_scope, #Name or VariableScope, used as the name ...

Added by akforce on Mon, 30 Sep 2019 13:04:19 +0300

jsp Technology Development--jsp Built-in Object

1. Overview of built-in objects jsp files automatically generate and declare objects when they are translated into other corresponding servlet files. We can use them directly in jsp pages, but not in global variables. jsp's built-in objects are: application, config, exception, out, page, pageContex ...

Added by rach123 on Mon, 23 Sep 2019 06:36:02 +0300

Technology Sharing | mysql Table Data Checking

Author: Yang TaotaoQuestion from customers: What are the methods of database validation? Can you tell him? Me: Direct percona toolkit is not enough.Client: Any software installed on the server must be reviewed, and how long it will be reviewed is uncertain. And open source software is not allowed. Me:... Okay, let's see how MySQL itself checks ...

Added by newjsguy on Fri, 20 Sep 2019 12:17:18 +0300

Spring source learning (-) AbstractBeanFactory.getBean's main process

Introduction Happy Mid-Autumn Festival, you recently read Spring source code, always half-way, very hard to see the getBean part of the source code (IOC), will write a few blog s recently, write down their own feelings. Entrance General logic of getBean in AbstractBeanFactory //Source code of getBean method in AbstractBeanFactory @Override publ ...

Added by dotti on Sat, 14 Sep 2019 15:48:53 +0300

python crawler-simulated microblog login

Microblog Simulated Logon This is the website of this crawl: https://weibo.com/ I. Request Analysis Find the login location, fill in the username password for login operation Look at the data for this request response. This is the data from the response. Save it. exectime: 8 nonce: "HW9VSX" pcid: "gz-4ede4c6269a09f5b7a6490f790b4aa944eec" pubk ...

Added by freakus_maximus on Thu, 12 Sep 2019 10:43:47 +0300

How to realize the privilege control of background management system in vue

I. Preface In the advertising ji project, the role's authority management has been a difficult problem for a long time. Firstly, the authority control we determine is divided into two parts, which are more detailed according to the size of the granule: Privilege Control of Interface Access Privilege Control of Pages Is the page in the menu ac ...

Added by jerrylouise on Wed, 11 Sep 2019 17:09:12 +0300

How easy it is to get micro-credit user information in SpringBoot!

Preface I don't know if you have ever participated in the function of inviting Weixin friends to bargain. The first thing to consider is to get the information of Weixin users. To get user information is to get information about micro-credit users ...

Added by grimmier on Wed, 11 Sep 2019 12:13:22 +0300