Symmetric encryption algorithm

concept In the symmetric encryption algorithm, the data sender processes the plaintext (original data) and the encryption key together through a special encryption algorithm, which makes it become a complex encrypted text to be sent out. After receiving the ciphertext, if the receiver wants to interpr ...

Posted by vaibhavs on Fri, 05 Jun 2020 09:50:25 +0200

Beauty of mybatis source code: 2.2. Convert DOM corresponding to mybatis global configuration file to XNODE object

Convert DOM corresponding to mybatis global configuration file to XNODE object In the above, we have completed the construction of XmlConfigBuilder object and prepared the basic environment for parsing XML files. So the next step is to call the parse() method exposed by XmlConfigBuilder to complete the parsing of mybatis configuration file. pub ...

Posted by lupus2k5 on Fri, 05 Jun 2020 08:15:43 +0200

Spring Cloud -- Spring Cloud microservice practice

1, Service provider and service consumer Using microservices to build distributed system, microservices communicate with each other through network. We use service providers and service consumers to describe the invocation relationship between microservices. noun definition Service provider The callee of the s ...

Posted by PromaneX on Mon, 01 Jun 2020 05:04:19 +0200

Install JDK and Tomcat on Linux (CentOS7.2)

1. Download related software JDK: http://www.oracle.com/technetwork/java/javase/downloads/jdk8-downloads-2133151.html Tomcat: http://mirrors.shuosc.org/apache/tomcat/tomcat-9/v9.0.2/bin/apache-tomcat-9.0.2.tar.gz 2. Install and configure JDK [root@JDK-Tomcat ~]# rpm -ivh jdk-8u151-linux-x64.rpm Add the followi ...

Posted by McManCSU on Fri, 29 May 2020 19:00:34 +0200

Source code analysis of shiro filter

I. configuration <!-- Shiro Of Web filter --> <bean id="shiroFilter" class="org.apache.shiro.spring.web.ShiroFilterFactoryBean"> <!-- Injection Security Manager--> <property name="securityManager" ref="securityManager"/> <!-- Set up login URL--> <property name="loginUrl" value="/login"/> ...

Posted by bdemo2 on Fri, 29 May 2020 18:11:48 +0200

Kafka Core API - Consumer Consumer

Automatic Submission from Consumer stay Above The use of the Producer API is described. Now that we know how to send messages through the API to Kafka, the producer/consumer model is one less consumer.Therefore, this article will introduce the use of the Consumer API, which consumes messages from Kafka to make an app a consumer role. As always ...

Posted by itisprasad on Sun, 24 May 2020 20:58:35 +0200

How does Java achieve an elegant stop?Get to the bottom of

Traveling in the Java world, if you can have a pair of eyes that are good at discovery, there are many things to watch carefully, plus patience and help, you will often taste different things carefully. With this sharing, you can easily get the following points, which are absolutely rewarding. a) How do you make Java programs look elegant?Thoug ...

Posted by brandtj on Wed, 20 May 2020 04:01:28 +0200

Modify Nginx configuration to implement https request (SSL certificate deployment)

When it comes to [Nginx] () servers, I think the biggest characteristics are lightweight and high performance. Through testing on several different servers, it is found that its concurrency is very strong, and it eats a lot less [memory] (). At present, it is the preferred HTTP and reverse proxy server for most webmasters. The webmaster's own ...

Posted by CrashRoX on Tue, 19 May 2020 11:52:26 +0200

The practice of Spring Cloud microservice architecture: consul registration center 02: the introduction case of consumer

Previous: Consul registration center 01: Spring Cloud microservice architecture practice You can click review. Next, let's talk about the introduction case of consumer. For the detailed video tutorial of spring cloud actual combat project, please leave a message.   1. Create project Let's create an aggregation project to explain Consul. First, ...

Posted by Zssz on Thu, 14 May 2020 17:10:39 +0200

Fastjson Deserialization Vulnerability History

Author: Longofo@knows Chuangyu 404 Laboratory Time: April 27, 2020 Original address: https://paper.seebug.org/1192/English version: https://paper.seebug.org/1193/ Fastjson doesn't have a cve number, it's not very good to look for a timeline, and it doesn't know how to write at first, but it slowly writes something out. Fortunately, fastjson is ...

Posted by slava_php on Tue, 12 May 2020 19:05:20 +0200