Article. Page 19



Fundamentals | deserialization Command Execution Vulnerability

Author: h0we777 Disclaimer: This article is only for study and research. It is strictly prohibited to engage in illegal ...
17:34 4 November 2021

JVM - 15. Locate out-of-heap memory OOM

1. Introduction to ByteBuffer out-of-heap memory In the article introducing OOM, we introduced out-of-heap memory and co...
16:37 4 November 2021

JavaSE (Basics) -- for, while, do while

Daily sentence: to put it down is to move forward better. The former beauty is kept in the bottom of my heart, and the f...
13:37 4 November 2021

Trap source code analysis

Switching between user space and kernel space is often called trap ...
13:33 4 November 2021

Spring's management of beans extended by three injection methods of spring 110402

spring's management of beans catalogue ...
12:30 4 November 2021

"21 days of good habits" phase I-13

C + + experience notes C++ Primer Plus Chapter 3 data processing   3.4.4         Type conversio...
11:08 4 November 2021

Promise a + handwritten promise

@[TOC] (article directory) preface 1. Promise's meaning? ...
5:14 4 November 2021

Deep learning Yolo algorithm code implementation

preface This blog mainly summarizes the technologies used in Yolo series according to the algorithm code of Yolo series,...
4:51 4 November 2021

N ways to implement various progress bars only using HTML/CSS

This article will introduce how to use HTML/CSS to create various basic progress bars and fancy progress bars and their ...
2:18 4 November 2021

Qt5 development and case study 13 Qt5 text editing function

preface   Qt classes often used when writing text editing programs containing formatting include QTextEdit, QTextDo...
2:12 4 November 2021

netty series: build a client to connect to the http2 server using http1.1

brief introduction For http2 protocol, its bot...
23:01 3 November 2021

Usage of function pointers and state machines

Original link: https://blog.csdn.net/liebecl/article/details/76718767 1 function pointer and state machine In many large...
21:33 3 November 2021

Stay up late to sort out 56 advanced handwriting knowledge points of JavaScript

preface Hello, I'm Lin Sanxin. Foundation is ...
19:41 3 November 2021

bug caused by improper operation of ThreadLocal

background The project is a simple web projec...
19:39 3 November 2021

Detailed explanation of Java construction method / garbage collection mechanism / brief description of JVM tuning / memory leak

Construction method Constructors, also known as constructors, are used to create and initialize objects. Detailed expl...
19:33 3 November 2021

Image rotation with ffmpeg filter

I found a problem at work: when shooting videos, mobile devices shoot through the vertical screen, and the thumbnail whe...
19:18 3 November 2021

[JavaSE series] Java classes and objects, all things are objects

⭐ ♪ previous words ⭐ ️ This article introduces you to Jav...
18:44 3 November 2021

In short, it is the solution of | CSP-S2 2021 (part)

Sync published on hriver2.github.io "Start" Because I felt very unwilling on the field, I wrote out the first ...
18:29 3 November 2021

PC wechat reverse: automatically save encrypted chat pictures

preface This article is based on anhkgg big man's article "Research on wechat PC end technology (2) - win voice&quo...
18:23 3 November 2021

kafka production operation

kafka operation document premise ...
18:05 3 November 2021

How to use events in Spring

[note] this article is translated from: Spring Events | Baeldung1. GeneralIn this tutorial, we will discuss how to use e...
16:48 3 November 2021

In the same method, Mybatis requests the database multiple times. Do you want to create multiple SqlSession sessions?

Suddenly a question came to mind: every time we execute SQL Will create one SqlSession,Then in a transaction, multiple m...
15:54 3 November 2021

Please answer c language - function [getting started]

preface Function is very important. Generally, when we learn more and more, we will often use function to simplify the r...
15:23 3 November 2021

Detailed explanation of break statement of Java (25) from zero

Introduction to the author Author name: Ming Shiyin in programming world Introduction: CSDN blog expert has been engaged...
14:57 3 November 2021

Virtual function table and virtual destructor in C + +

1. Virtual function table Virtual function ta...
14:16 3 November 2021

stm32 input capture

1. Introduction to Input Capture ...
12:48 3 November 2021

Learning Data Structure Notes=====>Recursion

Learning Sources ->Portal -> Silicon Valley Java Data Structure and Java Algorithms (Java Data Structure and Algor...
12:40 3 November 2021

Verilog Implemented Gray Code to Binary Code Conversion

1. What is Gray Code     ...
12:05 3 November 2021

Integration of Alibaba cloud RockMQ and SpringBoot in 2021

preface: The open source version of Rocket is somewhat di...
6:09 3 November 2021

Briefly talk about HashMap

Briefly talk about HashMap catalogueBriefly talk about HashMapprefacehash algorithmCommon hash algorithmsData structure ...
22:37 2 November 2021