Spring Security automatically kicks off the previous logged-in user, a configuration is complete!
After successful login, automatically kick off the previous login user. Songge first saw this feature inside the button. It was fun at that time.
Once you've done your own development, you've met the same requirements. Just as the recent Spring Security series is being serialized, you can use Spring Security to talk about how this function work ...
Added by bl00dshooter on Thu, 07 May 2020 04:01:23 +0300
How to quickly view the IP address and other information of the login user in Spring Security?
Last article I've talked about how to use a more elegant way to customize Spring Security login logic. A more elegant way can effectively avoid the inefficiency brought by custom filters. I suggest you read it and understand the authentication logic in Spring Security by the way.
Based on the above, this paper will continue to discuss with you ...
Added by jimjack145 on Wed, 06 May 2020 11:21:22 +0300
International multilingual configuration
The static multilingual configuration file is placed in the Resource Bundle under the resources directory and configured in the form of key=value
For example, in Chinese: messages ABCD cn.properties
Property1 = property1
Property2 = property2
English:
property1=property one
property2=property two
Configuration Internationalization:
@Con ...
Added by ron814 on Tue, 05 May 2020 22:44:36 +0300
node simply implements a function of changing the head image
Preface
I've always wanted to write this article, but I've been reviewing it for the sake of exams. I've delayed writing until now. I wrote a small project with node's express framework, which has the function of uploading pictures. Here's how to realize it (I use ejs)
thinking
First of all, when the user clicks upload avatar to upd ...
Added by jmugambi on Mon, 04 May 2020 23:15:52 +0300
ios trust server certificate
When we use https to make network requests, we will receive the certificates from the server. These certificates are divided into agency certificates and certificates issued by ourselves. In ios, if we are going to request an organization certified to send an https request, we don't need to process it. But if it is a self signed certificate, we ...
Added by svihas on Mon, 04 May 2020 19:46:49 +0300
Using WebSocket under Tomcat
Environmental Science
tomcat 9
JDK8
web project with framework
Use
Jar package selection
Because the packages used in the online tutorials are many and miscellaneous, the average person may not see how to use them. In fact, the choice is very simple
J2EE: Java EE API with J2EE
Others: javax.websocket
tomcat: built in websocket API
...
Added by mbh23 on Sun, 03 May 2020 09:57:12 +0300
Get database metadata
MySQL provides a variety of methods to obtain database metadata (information about the database and various objects in it):
*Various SHOW statements, such as SHOW DATABASES or SHOW TABLES;
*Information? Table in schema database;
*Command line programs, such as mysqlshow or mysqldump.
Use SHOW statement to get metadata
-- List accessible ...
Added by riyaz123 on Thu, 30 Apr 2020 21:47:29 +0300
Getting started with Java Web listener
monitor
Catalog
OnlineCountListener.java
package com.huangdekai.JavaWeb.listener;
import javax.servlet.ServletContext;
import javax.servlet.http.HttpSessionEvent;
import javax.servlet.http.HttpSessionListener;
/**
* @Autord: HuangDekai
* @Date: 2020/4/28 22:41
* @Version: 1.0
* @since: jdk11
*/
public class OnlineCountListener imple ...
Added by vin_akleh on Wed, 29 Apr 2020 18:08:47 +0300
Recommend a better HTTP(S) proxy server than fiddlecore
Original text:
Recommend a better HTTP(S) proxy server than fiddlecore
Why not Fiddler core?
When it comes to Fiddler core, you may not be familiar with it, so its brother Fiddler is familiar with it. I usually use it to grab packets, simulate low bandwidth, and modify requests. Fiddler is essentially an HTTP proxy server. FiddlerCore is ...
Added by Valdhor on Tue, 28 Apr 2020 12:22:48 +0300
Word vector representation: word2vec and word embedding
In NLP tasks, the training data is usually one sentence (Chinese or English), and each step of input sequence data is one letter. We need to preprocess the data: first use the unique heat code for these letters, and then input it into RNN. For example, the letter a represents (1, 0, 0, 0,...) , 0), the letter b is (0, 1, 0, 0 , 0). If only the ...
Added by Garth Farley on Sun, 26 Apr 2020 07:51:24 +0300