RequestProcessor for source code analysis of zookeeper

Catalog 1, RequestProcessor 2, PrepRequestProcessor 3, SyncRequestProcessor 4, FinalRequestProcessor 1, RequestProcessor The request processors are linked together to process transactions. Requests are always processed in order. Independent servers and master-slave servers link together slight ...

Posted by lucianbeauty on Mon, 13 Jan 2020 19:21:45 -0800

Use Binlog logs to restore mistakenly deleted MySQL data

Preface "Delete library and run" is a topic that programmers often talk about. Today, I will teach you how to delete!Library!Run!Road! Just kidding, the topic of this article today is how to use Mysql's built-in Binlog log to recover mistakenly deleted data. After reading this article, you ...

Posted by m2babaey on Mon, 13 Jan 2020 16:54:40 -0800

Basic knowledge and understanding of jsp

Introduction: JSP is the full name of JavaServer Pages. Like servlet Technology, JSP is a technology defined by SUN company for developing dynamic web resources. The biggest feature of JSP technology is that writing JSP is like writing html, but: Compared with html, html can only provide static da ...

Posted by gregolson on Sat, 11 Jan 2020 21:56:51 -0800

Proficient in office365 Exchange online articles

Proficient in Office 365 Cloud Computing Management Exchange Online Chapter 1 Beginning with Office 365 1.1 Domain Name Management Registering Century Interconnected Office 365 will result in an initial Office 365 domain name: XXX.partner.onmschina.cn Administrator login office 365 portal: left "navigation bar" -- "installation& ...

Posted by jburbage on Sat, 11 Jan 2020 15:17:32 -0800

Some security settings of PHP

Happy new year to you guys. I haven't updated my blog for another half month. Update is also more casual, think of what to write something, convenient and everyone work with learning summary. Recently, I talked about PHP security related issues with my colleagues and recorded some experience. Due to many reasons of script language and early ver ...

Posted by sledgeweb on Sat, 11 Jan 2020 05:43:44 -0800

Java web filter login permission verification details

Catalog Three components of JavaWeb Filter 1. Workflow 2. Use scenario 3. Implementation process of filter method 4. Login permission verification case Three components of JavaWeb Filter 1. Workflow The client sends the http request to enter the filter first and execute the relevant busines ...

Posted by Immyphp on Fri, 10 Jan 2020 22:33:23 -0800

23 design modes: factory method mode

According to the different levels of abstraction, factory pattern can be divided into three types: simple factory pattern (also known as static factory pattern), factory method pattern described in this paper, and abstract factory pattern. Advantages of factory mode: It can make the code structure cle ...

Posted by mojodojo on Fri, 10 Jan 2020 21:31:45 -0800

[Mybatis Source Exploration]--- Interpretation of the Core Source of Mybatis Query Procedure--- mapper Call Method

Article Directory 1 Source Entry Interpretation of core source code of 2 sqlSession.getMapper(...) method 2.1 What should be analyzed without looking at the source code 2.2 [Source Code Analysis] Get the MapperProxyFactory object corresponding to TUserMapper 2.3 [Source Code Analysis] Use dynamic pr ...

Posted by cpetercarter on Fri, 10 Jan 2020 17:37:17 -0800

Implementation of MyBatis Association query: many to many

Two entities: order and commodity. An order can contain multiple commodities, and a commodity can belong to multiple orders, that is, many to many.   Goods table     Order form TB: no is the order number, and the user "id is associated with the id of the user table.     You need to create a new intermediate table, order item TB, and intr ...

Posted by skatermike21988 on Wed, 08 Jan 2020 10:23:53 -0800

JWT realizes authorization authentication

Catalog 1, What is JWT 2, JWT Standard Specification 3, Analysis of core code 4, Login authorization example 5, JWT usage 6, JWT considerations 1, What is JWT JSON Web Token (JWT) is the most popular cross domain authentication solution. In short, OAuth is a kind of authoriz ...

Posted by w4designs on Wed, 08 Jan 2020 08:10:31 -0800