NAT Unique Quintuple Selection

When using iptable for nat settings, you can use the following extension options: # SNAT Source Address Translation, Used in POSTROUTING, INPUT Chain --to-source [<ipaddr>[-<ipaddr>]][:port[-port]] --random # Mapping to random port number, --random-fully # Mapping to Random Port Number (PRNG Completely Randomized) --persiste ...

Posted by jmosterb on Wed, 09 Oct 2019 12:37:41 -0700

Spring boot uses Mysql's OSQL functionality

problem The need to save unstructured data, the first thought of mongodb, but the company does not allow mongodb, can only consider the storage of unstructured data in mysql. thinking Use mysql to provide xdevapi java for development. Solve Step 1: Check whether the X plug-in is installed If you want Mysql to support document storage, you need ...

Posted by dewed on Wed, 09 Oct 2019 11:11:58 -0700

Verification Code Picture Generation and Solution to the Problem of Unable to Display

IntelliJ IDEA implements verification code related module for web page generation: import com.sun.image.codec.jpeg.JPEGCodec; import com.sun.image.codec.jpeg.JPEGImageEncoder; import java.awt.*; import java.awt.image.BufferedImage; import java.io.ByteArrayInputStream; import java.io.ByteArrayOutputStream; import java.io.IOException; ...

Posted by lanjoky on Tue, 08 Oct 2019 23:00:22 -0700

JAVA Recording Operational Logging Steps

Explain System log plays an important role in daily management and maintenance, but there are many problems in log recording. Irregularity of log records Repeatability of log records Difficult classification of log records At present, there are three main aspects of log records. Entry and exit ...

Posted by BigX on Tue, 08 Oct 2019 18:21:02 -0700

Implementing QQ login in java

Links to the original text: https://blog.csdn.net/qq_37618797/article/details/90344835 -------- Forwarding Statement: This article is reprinted to the CSDN blogger "Drunk Three Lives". It is reprinted to the CSDN blogger. Links to ...

Posted by DeadDude on Tue, 08 Oct 2019 10:10:15 -0700

Spring security Architecture Framework-Component, Service, Filter Analysis

_To go deep into the authentication (authentication) and access-control workflow of spring security, it must be clear that the main technical points of spring security include how key interfaces, classes and abstract classes work together to implement authentication and access-control. 1.spring security authentication and authorization process ...

Posted by laurton on Tue, 08 Oct 2019 06:24:31 -0700

ActiveMQ Starter Example Demo

ActiveMQ Starter Example Demo Turn from https://www.cnblogs.com/parryyang/p/6062160.html JMS message model JMS message service application architecture supports two models: point-to-point model and publisher/subscriber model.    (1) Point-to-Point Model (Queue) A producer publishes a message to ...

Posted by PurpleMonkey on Mon, 07 Oct 2019 20:42:14 -0700

zookeeper Distributed Lock of Dead java Synchronization Series

problem (1) How does zookeeper implement distributed locks? (2) What are the advantages of zookeeper distributed locks? (3) What are the disadvantages of zookeeper distributed lock? brief introduction zooKeeper is a distributed, open source distributed application coordination service. It can provide consistent services for distributed applicat ...

Posted by andrei.mita on Mon, 07 Oct 2019 18:09:16 -0700

MyBatis Notes - EhCache Level 2 Cache

Links to the original text: https://my.oschina.net/u/2400661/blog/596247 introduce ehcache is a distributed caching framework. In order to improve system concurrency, our ...

Posted by jstarkey on Mon, 07 Oct 2019 10:05:51 -0700

Detailed description of HAProxy configuration file

Configuration details: HAPrpxy configuration file: / etc/haproxy/haproxy.cfg It consists of two parts: global and proxies. global: global configuration segment Process and security configuration-related parameters Performance tuning related parameters Debug parameter proxies: Proxy configuration ...

Posted by Cugel on Sun, 06 Oct 2019 11:25:06 -0700