• Multiplayer blog background management day02


    (2) Realization of project function – user management Blog — source code directory └ – Middleware └──loginGuard. JS login interception └ — Model — database operation ├── connect. JS — database connection └── user. JS — user management └ — public — static resources └ — admin — static resources of blog management page └── […]

  • [notes on stepping on pits] every time the MAC restarts, it needs to re SSH add


    Problem: solve the problem that every SSH add is required for boot on the Mac, Use git warehouse every time you restart the computer,Will be prompted: enter passphrase for key,Then we need to go again SSH execution SSH add ID_ rsa。 Reason: the generated secret key is encrypted, as shown in the figure below, it […]

  • [ubuntu] SSH login to docker


    Method 1 If the SSH service has been set for the image, you can: docker run -d your_image:tag /usr/sbin/sshd -p 12345 -D -dIt is the instruction of docker and runs in the background /usr/sbin/sshd -p 12345 -DThe command that the container runs to open the SSH connection of port 12345 -Interpretation of D Do not […]

  • JSP fourth job


    @ page language=”java” import=”java.util.*” pageEncoding=”utf-8″%> User name: only letters or numbers, 4-6 characters Password: password length 6-12 Confirm password: Gender: Male female Email address: enter the correct email address Date of birth: year 1 2 3 4 5 6 7 8 9 10 11 12 month 1 2 3 4 5 6 7 8 9 […]

  • Hengyuan cloud_ Teach you how to log in to the terminal instance


    The following is divided into two parts:1、 Windows login instance2、 Macos/linux login instance Windows login instance How to get login information? Login information inMy examplesFor example, the login instruction is:ssh -p 60001 [email protected] To extract the login host name, port number and user, you need to fill in the SSH client: host name port user […]

  • Shiro project introduction


    Shiro project introduction After the previous Shiro integration project, the Shiro function has been improved. The previous code will not be shown and introduced. Please refer to the Shiro integration project for informationProject code acquisition: https://github.com/pysasuke/s… New functions User registration Limit of login errors (using redis as cache) Shiro annotation configuration Dto import Data validation […]

  • MySQL 8.0 password management strategy (I)


    Author: Sri sakthivel Original link:https://www.percona.com/blog/… MySQL 8.0 has many improvements in password management. This article will introduce the following two features. Password reuse policy Generate random password |1 password reuse policy This policy simply means that when setting a new password, you can restrict and prohibit the use of the used password. There are two […]

  • Application of state secrets in the security authentication scenario of Internet of vehicles


    preface State secret refers to the domestic cryptographic algorithm recognized by the State Encryption Bureau. It is an important measure to effectively improve the level of information security to protect the security of important data through autonomous and controllable domestic cryptographic algorithms. At present, China’s information systems in various important fields, such as finance and […]

  • Docker installing hadoop3 distributed cluster – diligent version


    brief introduction It is really troublesome to install Hadoop cluster. I looked for various materials on the Internet, and it took me almost four days to improve the environment If you want to install Hadoop in 5 minutes, you can see this lazy version: https://www.jianshu.com/p/6d294b515bda If you want to follow my steps to go through […]

  • Vulnhub-dc-4 target aircraft actual combat


    preface Target download address:https://www.vulnhub.com/entry/dc-4,313/ Kali address: Target address: I Information discovery 1. host discovery Use the following commands netdiscover -r The following figure shows the address of our target plane. 2. host scanning Here, use the nmap tool to scan. The command is as follows. nmap -A -T4 -O -p 0-65535 […]



    SMBMS schematic diagram Database: How to build the project? Consider using Maven? Dependency, jar Preparation for project construction Build a maven web project Configuring Tomcat Test whether the project can run Import the jar packages encountered in the project sevlet-api,jsp-api,jstl,jstl-api,mysql-connector-java Build project framework Writing entity classes ORM: table class mapping Writing basic public classes Database […]