The official account is Bypass.
Click here to view the original
Chapter 1: IIS
IIS 6 parsing vulnerability
IIS 7 parsing vulnerability
PUT arbitrary file write
IIS short file vulnerability
HTTP.SYS remote code execution (MS15-034)
Posted by Chupa85 on Wed, 26 Feb 2020 19:50:26 -0800
Application of java 8 in Spring Boot JPA
In the last article we talked about how to use JPA in Spring Boot.In this article, we will explain how to use the new special habits of java 8 in Spring Boot JPA, such as Optional, Stream API, and Comp ...
Posted by Anarchatos on Wed, 26 Feb 2020 18:07:50 -0800
Load balancing using Ribbon
Before using Ribbon, let's think about a previous question. We registered our service provider with the eureka registry, but on the consumer side, when we still used the restTemplate call, did it write something inappropriate like http://localhost:8001?Does the application use the service name to make calls like dubb ...
Posted by xterra on Wed, 26 Feb 2020 10:46:58 -0800
Overview of ArrayList
Hello, I'm going to talk about ArrayList today. When it comes to ArrayList, many people know that the bottom of it is implemented using arrays. Threads are not safe. When it comes to its features, it will say that search is fast and increase or decrease slowly, because interview questions are all reciprocal.Let's talk abo ...
Posted by suresh_nsnguys on Wed, 26 Feb 2020 08:23:05 -0800
1, Magic number in programming
In the first article of constant definition in Section II of the programming specification of Alibaba Java Development Manual:
Magic value (magic number) refers to an undefined constant, while the "ID × Taobao × U" in the opposite example is called ...
Posted by jagat21 on Wed, 26 Feb 2020 05:21:11 -0800
Java is a language that naturally supports concurrency. Supporting concurrency means multithreading. Frequent creation of threads consumes a lot of resources in high concurrency and large amount of data, because Java provides a thread pool. Before JDK1.5, the use of thread pool wa ...
Posted by Vikas Jayna on Wed, 26 Feb 2020 03:59:51 -0800
Complete tutorial: https://jooq.diamondfsd.com/
POJO s generated by jOOQ are generated for fields of a single table. In association queries, we usually store the data of multiple tables in one class. In this case, we can create a class by ourselves to add the multi table field member variables we need
For this kind of common situation, it is v ...
Posted by tripc1 on Wed, 26 Feb 2020 03:36:25 -0800
Scope of bean
The annotation Scope of spring Component has several common scenarios, such as singleton, prototype, request, session and global session. This annotation can be used with @ Component and @ Bean. In particular, Scope annotation can be divided into ConfigurableBeanFactory and WebApplicatio ...
Posted by olsrey on Tue, 25 Feb 2020 22:50:08 -0800
1. Environmental preparation:
A linux machine can be a virtual machine installed by local VMware or a real linux machine.
If it is a locally installed virtual machine, the following points need to be pre configured:
Configure the static IP of the machine (to prevent IP changes during restart)
Modify host name (easy to configure)
Turn off the ...
Posted by crazylegseddie on Tue, 25 Feb 2020 19:02:32 -0800
I mentioned it in my class today, Reflex.In order to further strengthen the basic principles of learning, take the initiative to understand the reflection.Write a Demo with someone else, some of which are not clear. Write it down here.
import java.lang.reflect.Cons ...
Posted by dawson1323 on Tue, 25 Feb 2020 18:28:19 -0800