Thread safety problems and processing methods

Thread safety problems and processing methods Example: create three windows to sell tickets, with a total number of 100 tickets. Use the way to implement the Runnable interface 1. Problem: in the process of selling tickets, there are duplicate tickets and wrong tickets -- > there are thread safety problems 2. Cause of the problem: when a th ...

Posted by lazy_yogi on Fri, 22 Oct 2021 19:31:38 -0700

OSSIM open source security information management system

2021SC@SDUSC The code analyzed last week is mainly Framework.py. This week, we will analyze the code of other files involved in the call. 1. Analysis of other classes involved in Framework.py 1.1 brief introduction Last week, we briefly analyzed and introduced the source code of the main source code file Framework.py of the Framework p ...

Posted by footiemadman007 on Fri, 22 Oct 2021 05:05:20 -0700

[CISCN2019 finals Day2 Web1]Easyweb1

1, Foreword In previous articles, I mentioned that I have been doing things related to sql injection recently, and I have also been doing problems related to sql injection. However, in fact, many competition questions have different test sites. They often need to combine other knowledge to get the desired results. The following question is the ...

Posted by Magestic on Fri, 22 Oct 2021 01:59:09 -0700

Stock market senior Daniel wrote a stock price real-time MacOS application in Python! Real time monitoring!

introduction While Python is good for building many things, MacOS applications are certainly not one of them. I wonder if I can use Python to build a menu bar application for MacOS. I found it not only possible, but also "very simple". In this tutorial, we will build a real-time MacOS application for stock prices -- all in Python. ...

Posted by SuisydeKing on Wed, 20 Oct 2021 19:37:51 -0700

OSSIM open source security information management system

2021SC@SDUSC 1, Web part source code analysis 1. Brief description The most users contact the OSSIM platform is the Web UI. They can easily obtain various security analysis charts through the web. As ordinary operation and maintenance personnel or monitoring personnel, most operations are completed through the Web UI. The Web UI interface ...

Posted by lordrt on Fri, 08 Oct 2021 02:49:51 -0700

Security open source project

Collect some excellent safety open source projects of Party A This is a list of open source security projects, which collects some excellent open source security projects to help Party A's security practitioners build enterprise security capabilities. Each of these open source projects is committed to solving some security problems. Ideas for ...

Posted by yalag on Thu, 07 Oct 2021 22:07:59 -0700

The plaintext password in jdbc.properties is encrypted and decrypted in the spring project

background                   When using spring to develop applications, you need to connect to the database. Generally, the database information is placed in a property configuration file, such as jdbc.properties, which stores the sensitive information of the database in clear te ...

Posted by bdlang on Mon, 27 Sep 2021 21:37:56 -0700

[security tools] talking about writing Java code audit tools

introduce The author is a senior student who is new to safety. If there are mistakes in the article, please point out! At first, it was considered to use pure matching, but this method is too strict, and the code written by programmers has various possible combinations Therefore, I tried to realize java lexical analysis and syntax analysis ...

Posted by tommyrulez on Mon, 27 Sep 2021 03:25:41 -0700

Detailed tutorial on nginx function construction

1, Access control Authentication access based on user name and password Server configuration vim /usr/local/nginx/conf/nginx.conf Add under the location to be verified, taking the root region as an example location / { root html; index index.html index.htm; #Add the following two lines auth_basic "welcome you here"; auth_basic_us ...

Posted by sawade on Sat, 25 Sep 2021 18:07:10 -0700

Add graphic verification code to spring security

preface In the process of using the Spring Security framework, there is often a need to add additional data, such as authentication code, user type, etc. during login authentication. The following describes how to implement it. Note: my project is based on the Spring Boot framework. If it is configured in xml, please study it by yourself. Impl ...

Posted by havenpets on Fri, 24 Sep 2021 21:35:49 -0700