Spring Security automatically kicks off the previous logged-in user, a configuration is complete!

After successful login, automatically kick off the previous login user. Songge first saw this feature inside the button. It was fun at that time. Once you've done your own development, you've met the same requirements. Just as the recent Spring Security series is being serialized, you can use Spring Security to talk about how this function work ...

Added by bl00dshooter on Thu, 07 May 2020 04:01:23 +0300

How to quickly view the IP address and other information of the login user in Spring Security?

Last article I've talked about how to use a more elegant way to customize Spring Security login logic. A more elegant way can effectively avoid the inefficiency brought by custom filters. I suggest you read it and understand the authentication logic in Spring Security by the way. Based on the above, this paper will continue to discuss with you ...

Added by jimjack145 on Wed, 06 May 2020 11:21:22 +0300

International multilingual configuration

The static multilingual configuration file is placed in the Resource Bundle under the resources directory and configured in the form of key=value For example, in Chinese: messages ABCD cn.properties Property1 = property1 Property2 = property2 English: property1=property one property2=property two Configuration Internationalization: @Con ...

Added by ron814 on Tue, 05 May 2020 22:44:36 +0300

node simply implements a function of changing the head image

Preface I've always wanted to write this article, but I've been reviewing it for the sake of exams. I've delayed writing until now. I wrote a small project with node's express framework, which has the function of uploading pictures. Here's how to realize it (I use ejs) thinking First of all, when the user clicks upload avatar to upd ...

Added by jmugambi on Mon, 04 May 2020 23:15:52 +0300

ios trust server certificate

When we use https to make network requests, we will receive the certificates from the server. These certificates are divided into agency certificates and certificates issued by ourselves. In ios, if we are going to request an organization certified to send an https request, we don't need to process it. But if it is a self signed certificate, we ...

Added by svihas on Mon, 04 May 2020 19:46:49 +0300

Using WebSocket under Tomcat

Environmental Science tomcat 9 JDK8 web project with framework Use Jar package selection Because the packages used in the online tutorials are many and miscellaneous, the average person may not see how to use them. In fact, the choice is very simple J2EE: Java EE API with J2EE Others: javax.websocket tomcat: built in websocket API ...

Added by mbh23 on Sun, 03 May 2020 09:57:12 +0300

Get database metadata

MySQL provides a variety of methods to obtain database metadata (information about the database and various objects in it): *Various SHOW statements, such as SHOW DATABASES or SHOW TABLES; *Information? Table in schema database; *Command line programs, such as mysqlshow or mysqldump. Use SHOW statement to get metadata -- List accessible ...

Added by riyaz123 on Thu, 30 Apr 2020 21:47:29 +0300

Getting started with Java Web listener

monitor Catalog OnlineCountListener.java package com.huangdekai.JavaWeb.listener; import javax.servlet.ServletContext; import javax.servlet.http.HttpSessionEvent; import javax.servlet.http.HttpSessionListener; /** * @Autord: HuangDekai * @Date: 2020/4/28 22:41 * @Version: 1.0 * @since: jdk11 */ public class OnlineCountListener imple ...

Added by vin_akleh on Wed, 29 Apr 2020 18:08:47 +0300

Recommend a better HTTP(S) proxy server than fiddlecore

Original text: Recommend a better HTTP(S) proxy server than fiddlecore Why not Fiddler core? When it comes to Fiddler core, you may not be familiar with it, so its brother Fiddler is familiar with it. I usually use it to grab packets, simulate low bandwidth, and modify requests. Fiddler is essentially an HTTP proxy server. FiddlerCore is ...

Added by Valdhor on Tue, 28 Apr 2020 12:22:48 +0300

Word vector representation: word2vec and word embedding

In NLP tasks, the training data is usually one sentence (Chinese or English), and each step of input sequence data is one letter. We need to preprocess the data: first use the unique heat code for these letters, and then input it into RNN. For example, the letter a represents (1, 0, 0, 0,...) , 0), the letter b is (0, 1, 0, 0 , 0). If only the ...

Added by Garth Farley on Sun, 26 Apr 2020 07:51:24 +0300