Access other nodes through a jumper using the JSCH framework
A set of code for remotely accessing ssh has been developed. Recently, there is a need for a jumper to access the target service.After searching the web for half a day, I didn't find a good example, so I browsed the API of JSCH myself.But look in the clouds.Imagine if port forwarding works by mapping the target node ip:port to localhost:port an ...
Posted by Spoiler on Sun, 05 Jul 2020 08:04:33 -0700
Necessary knowledge points of MySQL development log file
Necessary knowledge points of MySQL log file development
Reference source: juejin.im/post/5b7c0aabf265da438415b9eb
preface
Log files record all kinds of activities that affect MySQL database. Common log files in MySQL database include error log, binary log, slow query log and query log. They are i ...
Posted by Yucky on Tue, 30 Jun 2020 00:40:28 -0700
[cluster building topic] - Kafka cluster building
Kafka -- cluster building
Service discovery: first of all, the mutual discovery of services between kfakas is realized by using Zookeeper. Therefore, Zookeeper must be built in advance. To build a Zookeeper cluster, please pay attention to the blog's article: Building Zookeeper cluster;Service relat ...
Posted by Bauer418 on Mon, 29 Jun 2020 20:50:55 -0700
Four ways to create singleton pattern
This is a question for my recent interview
There are several ways to create a single example of the interviewer's question. I answered the lazy man and the hungry man. He told me that there are two kinds. In fact, I still vaguely remember two kinds. I just can't remember, and my heart silently tears.... ...
Posted by Birdmansplace on Sun, 28 Jun 2020 22:54:54 -0700
nodejs crawler project
The news data of several websites have been crawled before. Now we need to organize and display these data. The specific requirements are as follows
The first step is to install the dependency package in npm install under the final project folder
Here, I met a problem during the installation process. Th ...
Posted by moonman89 on Sun, 28 Jun 2020 20:05:01 -0700
Asynchronous programming - coprogramming
Python asynchronous programming
preface
Now it's Python 3.5 and it has entered the asynchronous era
Because of the existence of GIL (global lock), python can not play the advantage of multi-core, and its performance has been criticized. However, in IO intensive network programming, asynchronous processing is hundreds of times more efficient ...
Posted by stickman373 on Sat, 27 Jun 2020 22:46:42 -0700
Spring Science - SMS verification code login function
Spring Science (5) -- SMS verification code login function
Previous articles on spring Science Series
1,Spring security (1) -- authentication + authorization code implementation
2,Spring security (2) --- remember my feature implementation
3,Spring Science (3) -- function implementation of graphic verification code
4,Spring Science (4) -- ...
Posted by marky2coats on Sat, 27 Jun 2020 20:17:11 -0700
ActiveMQ learning note 5 -- the transmission protocol of ActiveMQ
1. Introduction
In the previous receiving ActiveMQ and code cases, you have configured:
broker-url: tcp://192.168.106.131:61616
See the default protocol of ActiveMQ for TCP. However, ActiveMQ processing supports TCP thank you. It also supports client broker communication protocols: TCP, NIO, UDP, ...
Posted by bigger on Sat, 27 Jun 2020 02:27:07 -0700
Spring Security's remomberme automatic login
Automatic login is a mechanism that saves the user's login information in the cookie of the user's browser. When the user visits next time, it automatically realizes the verification and establishes the login state. Spring Security provides two very good types of Tokens:
Hash algorithm encrypts user's necessary login information and generates ...
Posted by exec1 on Sat, 27 Jun 2020 01:18:49 -0700
Serialization and deserialization and differences of serialization protocols
1, What is serialization and deserialization?
Java serialization refers to the process of converting Java objects into byte sequences;
Java deserialization refers to the process of restoring byte sequences to Java objects.
2, What does serialization do?
Object persistence, which can permanently s ...
Posted by everknown on Fri, 26 Jun 2020 21:35:28 -0700