In this article, we discuss 13 different static exposure techniques. For each type of exposure, we explain the impact of not dealing with these security issues. We also recommend some rules for you to develop robust and secure Java applications that are not threatened by these static security exposures. When appropriate, we provide code samples (both exposed code and exposed code ).
Techniques for dealing with High severity exposuresFollow the follow
multi-threading best practice, but it's double edge sword at same time. Lock interface is powerful but every power comes with responsibility. Different locks for Read and write operation allows to build scalable data structures like Concurrenthashmap, but it also Require lot of care during coding. Unlike synchronized keyword, thread doesn ' t release lock automatically. You need to call unlock () method to release a lock and the best practice are to
Source: http://java.sun.com/docs/codeconv/html/CodeConvTOC.doc.html,Http://morningspace.51.net/,moyingzz@etang.com.
1 Introduction (Introduction)1.1 Why coding standards (Why Have Code Conventions)Coding standards are especially important for programmers for the following reasons:-80% of the cost for a software life cycle is maintenance.-Almost no software is maintained by the original developer throughout
Coding | Problems Java language default encoding is Unicode, and we Chinese commonly used files and databases are based on GB2312 or BIG5 encoding, how to properly select the encoding method and correctly handle the Chinese character encoding? This article will start with encoding common sense, combine Java programming example, analyze above two questions and pro
, then how to decode Java?We know that there are two classes in the Java-side processing URL codec, namely Java.net.URLEncoder and Java.net.URLDecoder. These two classes can decode all "%" plus UTF-8 code values with UTF-8 to get the original characters. View the source code of Urlencoder you can find that Urlencoder protected special characters less than the special characters protected in JS.
Mom no longer worries about my coding. Integration of Chinese encoding, windows, django, python, java, html, djangopythonUse django to write a small web application. This application calls a business-related jar package and displays the returned values of the jar package. In windows, the django framework is used to call the java jar package in python and output t
Chinese character "strict ". You can query a specific symbol table at unicode.org or a special Chinese character table.3. UTF-8 With the popularity of the Internet, a unified encoding method is strongly required. UTF-8 is the most widely used Unicode implementation method on the Internet. Other implementations also include UTF-16 and UTF-32, but are basically not needed on the Internet. Repeat, the relationship here is that UTF-8 is one of the Unicode implementation methods.The biggest feature
Java vs. Unicode:Java's class file is encoded in UTF8, and the JVM runs with UTF16.The Java string is Unicode-encoded.In summary, Java uses the Unicode character set to make it easy to internationalize.Which character sets are supported by Java:Which character sets can Java recognize and handle correctly?View the CharS
Java coding UTF-8, ISO-8859-1, GBK
Java support UTF-8, ISO-8859-1, GBK and other font encoding, the author found that the problem of font encoding in Java is still difficult to fall a lot of programmers, although there are many articles on how to correctly display Chinese Characters in
Causes of Java coding and Solutions
I. file encoding
Unicode is the preferred encoding. Unicode is a global character encoding standard.
Conclusion: the conversion between GBK and unicode is performed through the gbk unicode ing table.
The conversion between UTF-8 and unicode is based on the Conversion rule Formula
Therefore, unicode is the core intermediary. To convert Gbk to UTF-8, convert it to unicode
Java coding specification (1)-General Linux technology-Linux programming and kernel information. For details, see the following section. 2. File Names)
This section lists common file names and their suffixes.
2.1 File suffix (File Suffixes)
Java programs use the following file suffixes:
File category file suffix
Java s
Often encountered in the work of Java coding problems, due to lack of research, always can not give the exact answer, this weekend on the Internet to check some information, here to do some summary.The first thing we need to know is:(1) In the computer disk storage is a byte, the network is also transmitted bytes;(2) The so-called encoding, refers to the characters encoded into a specific encoding format of
Java coding in JS
In the current web applications, more and more page elements are operated by js, especially when an asynchronous request is initiated by js, encoding problems often occur. The following describes the Encoding Problems in js.1. Introduce js files externally
Contains string input in a separate js file, for example:
If a script. js script is introduced, the script contains the following code
Write a small web app with Django. A business-related jar package called in the application and displays the return value of the jar package. It is in the Windows environment, using the Django framework, the Python language to call the Java jar package, output content into, HTML. involves a bunch of coding problems.the process is not garbled, is garbled. Finally in the expert guidance under the fix. Hereby
Java coding specification (2)-General Linux technology-Linux programming and kernel information. For details, see the following section. 6.3 Placement)
Declare variables only at the beginning of the code block. (A block refers to any code contained in braces "{" and .) Do not declare the variable when it is used for the first time. This will confuse unfocused programmers and impede code portability in this
Understanding the basic thread mechanism of java-18.2 from the ground up (6)-using constructors or internal classes to implement multi-thread coding variations
In this section, we will discuss how to use constructors or internal classes to implement multi-threaded coding variations.
1. Basic implementation
package com.ray.ch17;public class Test {public static voi
. */@OverridepublicgetFilethrows IOException { thrownew" cannot be resolved to absolute file path");}Comments on attributes and variables and in-method codeUse // to annotate variables and attributes, and code within methods to use // annotationsIf the non-essential variables and attributes can be commented out, if the code has the responsible logic should be explained by using // annotationspublicServletContextResource(ServletContext servletContext, String path) { // check ServletContext
{//ensure the arrays is of equal size ...}9) ToString methodIn general, each class should define a ToString method:Public String toString () {...}) Main methodGeneral class, consider placing a main () method that contains the code used to test the class, and if it contains the main () method, it should be written at the bottom of the class.4. Java Coding Other ConventionsN DocumentationYou must use Javadoc
Recommended 2 tool classes that can reduce the amount of code and are easy to use during coding: for Java reflection and single-measurement assert.1 Introduction to Mirror:java ReflectionOfficial website: http://projetos.vidageek.net/mirror/mirror/Simplify the command-oriented syntax provided by the Java Native API: Class.getfield/getdeclaredfields/getmethod ()/g
C # vs. Java learning: type judgment, class and interface inheritance, code specification and coding habits, constant definitionsType judgment symbol:C#:object A; if (A is int) {} Judged by the IS symbolJava:object A; if (a instanceof Integer) {} is judged by the instanceof symbolClass-To-Interface inheritance:C #: public class Mdatarow:listJava:Publicclass Mdatarow extends arraylistThe common denominato
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.