#Disclaimer: This is a personal note, which is only for learning. It is prohibited to use it for any illegal act. Any illegal act has nothing to do with me.
Weblogic XMLDecoder Deserialization Vulnerability (CVE-2017-10271)
Vulnerability No.: CVE-2017-10271 Vulnerability impact: wls wsat XMLDecoder deserialization vu ...
Posted by chelsea7 on Sat, 17 Sep 2022 21:36:21 +0300
Rights management: Rights management is required for systems involving user participation. Rights management belongs to the category of system security. Rights management is to realize the control of user access to the system. Users can be controlled according to security rules or security policies, and users can only access their own user ...
Posted by earthlingzed on Thu, 15 Sep 2022 21:52:31 +0300
It is impossible to have no transactions in a program. In Spring, transactions are implemented in two ways: programmatic transactions and declarative transactions. Because programmatic transactions are relatively cumbersome to implement and declarative transactions are extremely simple to implement, we use declarative transactions@Transactional ...
Posted by Dragoon1 on Wed, 14 Sep 2022 21:10:37 +0300
1. Project introduction
The purpose of this project is to use the trend of Internet development and related web application development technology to improve the vitality and vitality of the catering industry, while contributing their own ideas and technologies to the epidemic. As we all know, when the new crown epidemic spread by foam lea ...
Posted by witold on Wed, 14 Sep 2022 21:01:42 +0300
Event address: CSDN 21 Day Learning Challenge
1. What is a thread
To understand what a thread is, you must first understand a process
Process: A simple understanding is the running program
Thread: A thread is the smallest unit in a process, and there is at least one thread in a process
There is no concept of a process in the ...
Posted by rajmohan on Mon, 12 Sep 2022 21:15:45 +0300
1. Command netstat to display information such as local network connection, running port and routing table
netstat command: used to display various network related information, such as network connection, routing table, interface status, dead link, multicast membership, etc.
-a : list all network connections in the system
-t : List ...
Posted by Spitfire on Mon, 12 Sep 2022 21:01:50 +0300
Stream stream, method reference
Chapter 1 Stream
Speaking of Stream, it is easy to think of I/O Stream, but in fact, who stipulates that "stream" must be "IO stream"? In Java 8, thanks to Lambda The functional programming from the past introduces a new concept of Stream to solve the existing shortcomings of the existing c ...
Posted by filteredhigh on Fri, 09 Sep 2022 21:06:33 +0300
LinkendList is a two-way linked list and implements the Deque ue interface, which can be used as a queue. Although LinkendList is a linear structure, the data is not stored as a linear interface, but as data and address of the next node in each node, Cloneable interface, copy support, and java.io.Serializable support serialization a ...
Posted by bugcoder on Tue, 06 Sep 2022 20:59:47 +0300
HTML basic tag
Cell merge, th label
Background color and picture
Forms (relatively important to Java programmers
User registration form and drop-down list
file control and hidden control
readonly and disable
div and span editing
Three way ...
Tip: After the article is written, the table of contents can be automatically generated. For how to generate it, please refer to the help document on the right
` The factory pattern is divided into simple factory (not included in the 23 design patterns), factory method, and abstract method; here I will summarize and explain t ...
Posted by brad.techguy on Mon, 05 Sep 2022 04:46:57 +0300