I was asked hundreds of times about IoC and AOP in my last interview, and I was still silly and confused?We understand the two ideas of IOC and AOP. Next, let's not consider how Spring achieves these two ideas. First, through a case of bank transfer, we analyze the code level problems in this case.Use our existing knowledge to solve these prob ...
Added by mrskhris on Tue, 02 Jun 2020 14:16:52 +0300
LINQ in C ා provides two operation modes: query expression and query operator. All query expressions are replaced by corresponding query operator classes. Query expression is a bit of "class" SQL. When writing SQL in the code, I always feel that it is not "elegant". Using query operators is "elegant". This series i ...
Added by nloding on Sat, 30 May 2020 17:01:17 +0300
XSS attack principle and protection
XSS(Cross Site Scripting) is a common way in Web attacks. Through this attack, users can be controlled to do a series of malicious operations, such as stealing, tampering, adding users' data or inducing to phishing sites.
A common way is to use unfiltered parameters to pass ...
Added by Nothsa on Thu, 28 May 2020 07:50:18 +0300
Mybatis-Plus (MP) is an enhancement tool for mybatis. On the basis of mybatis, only enhancements are made without changes, which simplifies the development efficiency.This is to help us encapsulate some simple curd methods that can be called directly without rewriting these simple sql statements, just like JPA.
A new project was created t ...
Added by zenix on Thu, 28 May 2020 06:02:40 +0300
In the Oracle database, the optimizer needs to rely on the collection of statistical information of related objects in order to generate the optimal execution plan. The database can automatically collect the execution plan or use the package DBMS_STATS is collected manually. This article does not explain the collection of general statistics. It ...
Added by libertyct on Wed, 27 May 2020 15:38:34 +0300
In the previous article, we introduced the addition, deletion, modification and query of SqlSugar in detail, which has satisfied our use in daily engineering development. However, there are a few methods that are not commonly used in development, but are very useful. Let's see what else is interesting.
1. Unusual query
Previously, we ...
Added by paullb on Tue, 26 May 2020 11:22:24 +0300
Ccom.mysql.cj.jdbc.exceptions.MySQLTransactionRollbackException: Lock wait timeout exceeded; try restarting transaction
Reasons for the problem
When optimistic locks modify data, the data version number has been modified, causing the modification to fail. When retrying the modification, each time the data read from the d ...
Added by xsist10 on Fri, 22 May 2020 21:51:58 +0300
---------------------------------------------------------------Table building----------------Determine whether the student table exists
declare num number; --Declare parameters num type number
select count(1) into num from user_tables where table_name='student';
if num>0 then
execute immediate 'drop table st ...
Added by crinkle on Thu, 21 May 2020 18:21:15 +0300
JDBC fixing steps:
Class.forName("com.mysql.cj.jdbc.Driver");//I don't know why com.mysql.jdbc.Driver will report an error. Please leave a message if you have any ...
Added by PHPfolife on Wed, 20 May 2020 17:31:54 +0300
In Oracle and SQL Server databases, you can set up some complex account password policies, such as locking an account more than N times after a failed login, so can you do the same in MySQL?The answer is that MySQL has similar capabilities, except in MySQL it delays the response time when its login fails beyond the threshold, instead of locking ...
Added by marco839 on Tue, 19 May 2020 20:23:28 +0300