(http://jotm.objectweb.org/) to support two-phase commit (2PC)
XA DataSource with Xapool (http://forge.objectweb.org/projects/xapool/) support for intelligent Connection pool management
Built-in MVC framework for automatic form mapping,validator,uploading, support for Jsp/velocity/freemarker page engine, and support for injecting ejbs directly into action
Support multi-application module deployment, allowing medium-sized applications to fully enjoy the benefits of modular developmen
Source: http://www.ttlsa.com/nginx/nginx-deny-ip-access/ Idle to Nothing, landing server, found that there is an IP constant guessing path, trying to upload files to the server (Trojan). So look at the previous log, helpless humble station was targeted by the attackers, and constantly have different IP attempts to upload Trojans. There seems to be some bad guys. Because you don't want to make your humble station a broiler, you want to write a simple
advertising or slogans)Theoretical Model
If a function is used to describe the entire display process, it looks like this.
F (data, template, display logic) => result html
The display logic is the display logic. Display logic operates data and templates to generate the final result.
This display logic may appear anywhere in various forms.
For example, it may exist as a server side script in the template and output data. It may also exist in the background Java and operate the template node acco
Previous Article: Application Framework Design II: hierarchical and inter-layer data transfer (I)
After reading the previous article, many people commented that it may be of no practical use to give so many nouns. In fact, compared with. net, java has a lot of architectural skills. It will be much superficial if we want to talk about the architecture without talking about java. At this point, net may take many years to catch up (if you do not redouble your efforts, I am afraid it will always lag
Linux is not difficult to install a Web server, but its maintenance and security hardening is not easy, it requires a deeper understanding of the Linux system and the various configuration options for Apache here is how to find a balance between security, operability and ease of use, but it also depends on the specific needs of the project, The following best practices will summarize what all the servers in the lamp project have in common.
Using configuration directives for access control
The
have done for the public network of the hardship of the web operation must have seen a variety of malicious scanning, pull, injection and other behavior? For direct external Web servers, we can ban these malicious requests directly via iptables, Nginx deny instructions, or programs.For a Web site with a CDN or proxy set, these methods may not be valid. In particular, personal sites, may be a VPS, and then set a free CDN on the Internet to walk. Not ev
week. We don't have to worry about how to configure the open source framework together because it's all done. Our projects are pre-configured to interact with the database, deployed to the application server, and authenticated to the user. We don't have to implement security features because it's already integrated.When I first developed AppFuse, it only supported Struts and Hibernate. After several years of effort, I found a better web framework than Struts, so I added the options for these we
With the rapid development of technology, new JSP technologies are also emerging. In order to learn and work, we will briefly introduce the JSP architecture, JSP development tools, Web servers, and their disadvantages.
JSP architecture:
Struts: Like many Apache projects such as Tomcat and Turbine, Struts is an open-source software. This is a major advantage of struts, allowing developers to gain a deeper understanding of its internal implementation mechanism.
In addition, the advantages of Strut
1. Define directory features
For each directory accessed by Apache, related services and features can be set to allow or (and) Not. (Also affect its subdirectories)
First, set the "default" address to only have the most basic permissions:
Options FollowSymLinks
AllowOverride None
Note that special permissions must be enabled from now on, so that no unexpected results will be generated. Please confirm carefully.
For example:
#
# This value is "None", "All", or a combination of the following:
Allow directives
Description: Controls which hosts have access to one area of the server
Syntax: Allow from all|host|env=env-variable [host|env=env-variable] ...
Context: directory,. htaccess
Overlays: Limit
Status: Base
Module: mod_access
The Allow directive affects which hosts can access one area of the server. Access can be controlled with the host name, IP address, IP address range, or client request attributes captured in other environment variables.
The first parameter of this instruct
obtain data from this server.
#
Order Allow,deny
Allow from all
Description
Allow and deny can be used in Apache conf files or. htaccess files (with directory, Location, files, etc.) to control access authorization for directories and files.
So, the most common is:
Order Deny,allow Allow from all note that there is only one comma in the middle of "
Springspring is an open-source Java/Java EE full-featured stack application framework, which is very popular in the Java EE community, is published as an Apache license. The migration version on the net platform. STRUTS2STRUTS2 is a Web application framework. It is not a new release version of Struts, but rather a new framework. Struts2 is the second generation of model-based-view-the Web application framework for the Controller (MVC) model. STRUTS2 is a framework for the extensibility of Java E
page after the separation, the page required data how to obtain, who will handle the page display logic. Two methods: 1. Continue to use mechanisms such as asp,php or JSP, but because they are running in a Web environment, the data they want to display (the result of the backend logic) needs to be put through the controller into the request stream; 2. The use of new techniques-template technology, the use of independent template technology as a result of the separation of the web environment, t
application with Hibernate, Spring and spring MVC ) 3:internal-> org.appfuse.archetypes:appfuse-basic-struts (appfuse archetype for creating a Web application with Hib Ernate, Spring and Struts 2) 4:internal-> org.appfuse.archetypes:appfuse-basic-tapestry (appfuse archetype for Creati Ng a Web application with Hibernate, Spring and Tapestry 4) 5:internal-> Org.appfuse.archetypes:appfuse-core (appfuse Arch
Setup Keep-state # Allo W out NNTP News (i.e. news groups) $cmd $skip the TCP from the to any 119 out via $PIFSetup Keep-state # Allow out secure FTP, Telnet, and SCP # This function is using SSH (Secure Shell) $cmd $skip TCP F Rom any to any of the Via $PIF Setup keep-state # Allow out whois $cmd a $skip tcp from any to any of the Via $pif Setu P keep-state # Allow NTP time server $cmd 130 $skip UDP ' from ' to any ' 123 out via $pif keep-state #################### ############################
Full Analysis of Apache Web server access control mechanism
See: http://netsecurity.51cto.com/art/201102/245666.htm
The Aapche server in Linux provides powerful access control functions. Users can choose to configure the server by using the configuration command or the. htaccess file. This article will introduce these two methods.
1. Use common access control configuration commands for access control
1. configuration instructions
The configuration commands for Implementing Access Control in Apa
Nginx rejects access from a specified IP address is actually very simple. Let's look at the simple configuration.In the following example, all connections are rejected:Location /{# The Error 403 will always be output here.Deny all;# These commands will not be enabled, because the connection to be reached has been rejected at the first entry.Deny 192.168.1.1;Allow 192.168.1.0/24;Allow 10.1.1.0/1}Of course, we can access some valid IP addresses.The control rules are checked in the declared ord
website construction, different modules have the same navigation.
Tapestry
Tapestry is an open-source servlet-based application framework that uses component object models to create dynamic and interactive web applications. Java code is completely separated from HTML. It is easy to use this framework to develop large applications, and the developed applications are easy to maintain and upgrade.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.