NAT Unique Quintuple Selection
When using iptable for nat settings, you can use the following extension options:
# SNAT Source Address Translation, Used in POSTROUTING, INPUT Chain
--to-source [<ipaddr>[-<ipaddr>]][:port[-port]]
--random # Mapping to random port number,
--random-fully # Mapping to Random Port Number (PRNG Completely Randomized)
--persiste ...
Posted by jmosterb on Wed, 09 Oct 2019 12:37:41 -0700
Spring boot uses Mysql's OSQL functionality
problem
The need to save unstructured data, the first thought of mongodb, but the company does not allow mongodb, can only consider the storage of unstructured data in mysql.
thinking
Use mysql to provide xdevapi java for development.
Solve
Step 1: Check whether the X plug-in is installed
If you want Mysql to support document storage, you need ...
Posted by dewed on Wed, 09 Oct 2019 11:11:58 -0700
Verification Code Picture Generation and Solution to the Problem of Unable to Display
IntelliJ IDEA implements verification code related module for web page generation:
import com.sun.image.codec.jpeg.JPEGCodec;
import com.sun.image.codec.jpeg.JPEGImageEncoder;
import java.awt.*;
import java.awt.image.BufferedImage;
import java.io.ByteArrayInputStream;
import java.io.ByteArrayOutputStream;
import java.io.IOException; ...
Posted by lanjoky on Tue, 08 Oct 2019 23:00:22 -0700
JAVA Recording Operational Logging Steps
Explain
System log plays an important role in daily management and maintenance, but there are many problems in log recording.
Irregularity of log records
Repeatability of log records
Difficult classification of log records
At present, there are three main aspects of log records.
Entry and exit ...
Posted by BigX on Tue, 08 Oct 2019 18:21:02 -0700
Implementing QQ login in java
Links to the original text: https://blog.csdn.net/qq_37618797/article/details/90344835
--------
Forwarding Statement: This article is reprinted to the CSDN blogger "Drunk Three Lives". It is reprinted to the CSDN blogger.
Links to ...
Posted by DeadDude on Tue, 08 Oct 2019 10:10:15 -0700
Spring security Architecture Framework-Component, Service, Filter Analysis
_To go deep into the authentication (authentication) and access-control workflow of spring security, it must be clear that the main technical points of spring security include how key interfaces, classes and abstract classes work together to implement authentication and access-control.
1.spring security authentication and authorization process
...
Posted by laurton on Tue, 08 Oct 2019 06:24:31 -0700
ActiveMQ Starter Example Demo
ActiveMQ Starter Example Demo
Turn from https://www.cnblogs.com/parryyang/p/6062160.html
JMS message model
JMS message service application architecture supports two models: point-to-point model and publisher/subscriber model.
(1) Point-to-Point Model (Queue)
A producer publishes a message to ...
Posted by PurpleMonkey on Mon, 07 Oct 2019 20:42:14 -0700
zookeeper Distributed Lock of Dead java Synchronization Series
problem
(1) How does zookeeper implement distributed locks?
(2) What are the advantages of zookeeper distributed locks?
(3) What are the disadvantages of zookeeper distributed lock?
brief introduction
zooKeeper is a distributed, open source distributed application coordination service. It can provide consistent services for distributed applicat ...
Posted by andrei.mita on Mon, 07 Oct 2019 18:09:16 -0700
MyBatis Notes - EhCache Level 2 Cache
Links to the original text: https://my.oschina.net/u/2400661/blog/596247
introduce
ehcache is a distributed caching framework.
In order to improve system concurrency, our ...
Posted by jstarkey on Mon, 07 Oct 2019 10:05:51 -0700
Detailed description of HAProxy configuration file
Configuration details:
HAPrpxy configuration file: / etc/haproxy/haproxy.cfg
It consists of two parts: global and proxies.
global: global configuration segment
Process and security configuration-related parameters
Performance tuning related parameters
Debug parameter
proxies: Proxy configuration ...
Posted by Cugel on Sun, 06 Oct 2019 11:25:06 -0700