Volatile: The hidden hero of Java concurrent programming

: Just work hard and leave the rest to time : Xiaopozhan Volatile: The invisible hero of Java concurrent programming Preface First: Visibility Issues Second: Prohibit instruction reordering Third: Happens-Before relationship Fourth: Application cases Fifth: Comparison of Volatile, synchronized, and Lock Volatile: synchronized: Lock: Choose the appropriate tool: Sixth: Common misunderstandings and precautions Common misunderstandings: […]

There are hidden dangers in using Mybatis-Plus, it’s so tricky!

Author: confused codeLink: https://juejin.cn/post/7156428078061895710 Foreword MP has been controversial since its emergence. It feels like there have always been two voices. like: It is very convenient. Sql is automatically spliced through functions. There is no need to go to XML or use tags. The Sql written in one minute can now be written in one […]

The name of Spring Bean has a hidden secret, so that the name will not be proxied.

Some small usage details are gradually discovered through continuous source code exploration. Today, let’s talk to my friends about how to prevent a bean from being proxied through the setting of beanName! 1. Code practice Suppose I have the following aspect: @Aspect @EnableAspectJAutoProxy @Component public class LogAspect {<!– –> @Pointcut(“execution(* org.javaboy.demo.service.*.*(..))”) public void pc() {<!– […]

10 | TIME_WAIT: The devil hidden in the details

In the previous basics, we sorted out the basic knowledge involved in network programming. The main content includes the C/S programming model, TCP protocol, UDP protocol and local sockets. In the improvement chapter, I will combine my experience to guide you to a deeper understanding of TCP and UDP. After studying the improvement chapter, I […]

Edabit Algorithm Bacon Encryption: Hidden under the AppearanceHidden in Plain Sight

Hidden in Plain Sight cryptography simulation Instructions This challenge makes use of a modified Baconian (Francis Bacon) cipher. The following is an example of a (modified) Baconian ciphertext: ciphertext = “KNowlEDgE ITsElf Is power.” The peculiar capitalization might, at first glance, suggest that either the lowercase or uppercase letters contain, or code for, the hidden […]

[Solved] MySQL: Wrong data appears when executing sql query (caused by MySQL hidden mechanism-type conversion)

Table of Contents Problem symptoms: problem analysis: in conclusion: Solution: expand: Problem phenomenon: A very strange bug was discovered during project development today: As shown in the figure, I executed a sql query in the database with “dept_id = 1712651046956421123” as the condition, but the query result showed: dept_id is 1712651046956421122. At that time, I […]

ns2 wireless LAN transmission simulation–hidden node

1. Introduction to related content: “Hidden terminal” and “exposed terminal” are classic problems in wireless network conflict avoidance. This experiment uses the NS2 network simulator to test and analyze the hidden node problem. Hidden node problem 1. Hidden nodes Hidden nodes refer to nodes that are within the coverage of the receiving node but outside […]

Selenium hidden browser features

Selenium hidden browser features Selenium Features 1.CDP 2. stealth.min.js 3. undetected_chromedriver 4. Operate the opened browser 4. Common ways to hide Selenium features 4.1 Modify navigator.webdriver flag 4.2 Change user-agent 4.3 Exclude or turn off some Selenium-related switches 4.4 Code display 4.5 Summary Selenium features When we use Selenium to crawl web pages, if we […]

Sensitive information for web applications – hidden directories and files

Sensitive information of web applications-hidden directories and files 0x1, scene There may be a lot of hidden information in the web application root folder: source code version system folders and files (.git, .gitignore, .svn), project configuration files (.npmrc, package .json, .htaccess), custom configuration files using common extensions such as config.json, config.yml, config.xml and many others. […]

Phishing document attacks use MSI objects to install hidden backdoors in the Lua environment

Intelligence Background As the conflict between Russia and Ukraine continues to escalate recently, Proofpoint observed that, An organization used infected and stolen email accounts of members of the Ukrainian armed forces to spread XLS documents with macros to launch phishing attacks against European governments. Use macro code object Windows in this activity Installer and MSI […]