(1) What is a cookie?
HTTP cookies, often called cookies directly, were originally used by clients to store callback information. The standard requires the server to send a Set-CookieHTTP header to any HTTP request as a corresponding part, which contains the callback information. The browser stores such re ...
Posted by elenev on Mon, 30 Mar 2020 22:32:31 -0700
In this article, we mainly introduce the related configurations of Cassandra. I will introduce the related configurations of Cassandra according to the horizontal dimension of cluster and node. I may not list some configurations here. Please refer to the detailed introduction in cassandra.yaml. How to configure Cassandra needs to be in the C un ...
Posted by mysqlnewjack on Mon, 23 Mar 2020 09:13:20 -0700
Graylog can collect nginx logs in two ways: one is through the Graylog Collector Sidecar (active mode), and the other is through modifying the nginx configuration file (passive mode).
This time, let's change the nginx configuration file (passive mode). The advantage of passive mode is that nginx sends the defined log fields to the user-defined ...
Posted by TheDefender on Sun, 15 Mar 2020 20:52:31 -0700
Specific reference: Alicloud tutorial
This paper is a summary of pit falling
1. In the section of modifying httpd.conf configuration file, you need to make the following settings
#Loadmodule SSL ﹣ module modules / module ﹣ ssl.so ᦇ delete the comment symbol of configuration statement at the beginnin ...
Posted by uknowho008 on Sat, 14 Mar 2020 02:45:29 -0700
Java send mail
163 email to 163 email, enterprise email, QQ email, etc
As mentioned in the last article java sends QQ mail , and Several ways to send mail ; in this article, we will talk about how to match all mail in the enhanced version.
The following Demo is to send a plain text email, but part o ...
Posted by Tindo on Fri, 13 Mar 2020 08:07:11 -0700
How to develop a custom starter
One or more custom configured property configuration classes (optional)
One / more autoconfig classes
The auto configuration class is written to the SPI mechanism configuration file of Spring Boot: spring.factories
Introduction to Java SPI mechanism
The core of S ...
Posted by vimukthi on Wed, 11 Mar 2020 00:11:34 -0700
Spring Boot 2.x Actual Warfare--First Spring Boot Program
The Spring Boot 2.X Actual Warfare series will be divided into the following modules. This section will build a RESTful API and customize the return data and HTTP return codes, as well as the data passed to the API interface. The next section will integrate Log4j2 with Slf4j for log prin ...
Posted by sdyates2001 on Tue, 10 Mar 2020 09:42:36 -0700
The premise is that you buy the certificate first, download it, and open the certificate compression package with 3 files in total
Certificate file: with. crt as the suffix or file type.
Certificate chain file: with. crt as the suffix or file type.
key file: with. key as the suffix or file type.
Create a new cert directory in the Apache ...
Posted by dc277 on Tue, 10 Mar 2020 02:08:13 -0700
1, Digital signature
1.1 relationship between digital signature and asymmetric encryption
In fact, there is a very close relationship between digital signature and asymmetric encryption. In short, digital signature is realized by using asymmetric encryption in reverse. Let's summarize the usage of t ...
Posted by thomas777neo on Mon, 09 Mar 2020 03:43:26 -0700
Virtual private network, in fact, is to open up a virtual private line in the network
1. Host remote access * * * service
2. Services between enterprise networks
3. Services between IDC rooms of Internet companies
Transmission data protocol mode:
Posted by derezzz on Wed, 04 Mar 2020 04:20:08 -0800