JAVA - light copy and deep copy
Understanding of java copy In the java language, when we need to copy an object, there are two common ways to copy; Deep copy and shallow copy. Shallow copy only copies the address of the original object, so when any value of the original object changes, the value of the copied object will also change. Deep copy copies all the values of the sou ...
Posted by gamerzfuse on Tue, 08 Mar 2022 11:39:25 +0100
MyBatis simple instructions
First, briefly explain the use of MyBatis, and then focus on several core principles of MyBatis.
MyBatis easy to use
MyBatis can be divided into the following key points
Introducing MyBatis dependency
Configure mybatis config XML configuration file
Create database entity class and Mapper mapping file
Load the configuration through S ...
Posted by rahuul on Tue, 08 Mar 2022 09:04:35 +0100
Operation and maintenance: RocketMQ Operator, a powerful tool for RocketMQ operation and maintenance control in the cloud native Era
Introduction: RocketMQ Operator: a powerful tool for RocketMQ operation and maintenance control in the cloud native era:
Introduction: RocketMQ Operator has joined OperatorHub and officially entered the Operator community. Starting from practice and combining with cases, this paper will illustrate how to quickly build a RocketMQ cluster on Kub ...
Posted by mikes127 on Tue, 08 Mar 2022 03:20:56 +0100
Find Liangji App buried point Case automatic regression
Find a beautiful machine and bury it. Case Automatic Regression
1, Background and purpose
The total number of buried points on the line is more than 1000, and the main process case is more than 300. In the process of functional iteration, there are often statements about the regression of existing buried points. In the past, it used to consum ...
Posted by Skara on Sat, 05 Mar 2022 12:37:35 +0100
Top level distribution analysis of LAMP architecture in Linux system
Top level distribution analysis of LAMP architecture in Linux system
theory
1, LAMP (Linux Apache MySQL PHP)
LAMP It has the advantages of universal, cross platform, high performance and low price LAMP Whether it is performance, quality or price, it is the preferred platform for enterprises to build websites
(1) Distribution interpretation ...
Posted by m5638829 on Sat, 05 Mar 2022 03:04:30 +0100
Android - Section 10 JSON explanation
1, Introduction to JSON
JSON(JavaScript Object Notation) is a lightweight data exchange format. It is based on a subset of JavaScript, which is easy for people to write and read, and easy for machine parsing. JSON adopts a text format completely independent of the language, but it also uses habits similar to the C language family (inclu ...
Posted by getmizanur on Thu, 03 Mar 2022 20:26:56 +0100
An InterruptException occurred when the RocketMQConsumer service was shut down
An InterruptException occurred when the RocketMQConsumer service was shut down
Background summary
The main problem is the version upgrade
Old version core rocketmq dependency <dependency>
<groupId>org.apache.rocketmq</groupId>
<artifactId>spring-boot-starter-rocketmq</artifactId>
<version>${ve ...
Posted by akumakeenta on Tue, 01 Mar 2022 11:00:42 +0100
Blog dry goods | using Apache Pulsar in Kotlin
About Apache Pulsar
Apache Pulsar is a top-level project of Apache Software Foundation. It is a native distributed message flow platform of the next generation cloud. It integrates message, storage and lightweight functional computing. It adopts the design of separation of computing and storage architecture, supports multi tenant, ...
Posted by blackandwhite on Tue, 01 Mar 2022 08:48:16 +0100
Java deserialization vulnerability - Apache Commons collections2 templatesimpl attack chain
preface
CC1 was analyzed earlier. Continue to learn today and analyze CC2. stay ysoserial In CC2, the PriorityQueue class is used as the entry of deserialization, so I'll analyze it from here.
Vulnerability mining
PriorityQueue
PriorityQueue priority queue is a special queue based on a priority heap. It defines "priority" for ...
Posted by mchip on Sun, 27 Feb 2022 17:27:06 +0100
Apache Web page optimization for Web Services
I Apache Web page and security optimization
In enterprises, only using the default configuration parameters after deploying Apache will cause many problems in the website. In other words, the default configuration is for the previous lower server configuration, which is no longer applicable to today's Internet era.In order to meet the needs of ...
Posted by Fahid on Fri, 25 Feb 2022 14:04:26 +0100