, grammar analysis, semantic analysis ... But unlike compilers, they can customize a variety of complex rules to analyze the code.Static Detection tools:Pmd
1) PMD is a code-checking tool that analyzes Java source code to identify potential problems:
1) Potential bug: Empty Try/catch/finally/switch statement
Java implements the Online Preview sample code (openOffice implementation) and the sample code openoffice
I have written an article about online preview of poi, which also says that openOffice can also be used. Here I will introduce it in detail.
There are two i
Checkstyle is a project under SourceForge that provides a tool to help Java developers comply with certain coding specifications. It automates the process of code specification checking, freeing developers from this important but tedious task. It can check the code according to the set coding rules. For example, the sp
Java code Security check mechanism :First, the class loader is responsible for loading the class file (. class file) into the Java Virtual machine (JVM), which adds security by distinguishing between classes on the local file system and classes imported by the network system. This can limit any Trojan horse program. B
Check the java source code of the set data structure.
You can see a question on the Internet:
A set of strings. The format is as follows:. Merging a set whose intersection is not empty requires that there be no intersection between the merged sets. For example, the preceding example should be output.
(1) Describe your solution to this problem;
(2) provides the
Recently Learning Java NIO Network development knowledge, wrote a Java NIO based multiplayer online chat tool training practiced hand. Source code open on the coding:Https://coding.net/u/hust_wsh/p/MyChat/git , the development environment is Ubuntu14.04+eclipse mars+jdk1.8.To write a multi-person
asynchronous operationDatabase Restore : Historical backup record, restore database or single table, statistics backup time and file sizeSQL Editor: Powerful SQL Editor, support edit Statement complex query statement, generate dynamic report, export ExcelAccess records: Record the time of each IP visit, the source region, the network operator, and the number of visits and detailed times per IPIP blacklist: Blocked IP blocked access to website foreground traffic statistics: PV clicks and indep
See a topic on the Internet:Given a collection of strings, in the formof:. Requires merging a collection where the intersection is not empty, requiring no overlap between the completed collections, for example, the above example should be output.
(1) Please describe your idea of solving this problem;
(2) give the main processing flow, algorithm, and the complexity of the algorithm;
(3) Please describe the possible improvements.
One solution is to use and
Java project export source code jar package check Chinese comments garbled in Eclipse, jareclipseProblem scene:
Since many projects are added to the Maven main project, it is convenient to update and debug the project, but the speed of Eclipse is severely affected. Therefore, some projects are exported to jar Packages containing source
Always look forward to having an online eclipse website that wants to see a jar package that does not need to download this jar package locally and import Eclipse to see the source code of this jar. One day colleagues introduced a website www.grepcode.com really feel good, not only can see the source code of this jar, click on the association of class or method,
, task start off asynchronous operation 16 . Database restore : Historical backup record, restore database or single table, statistics backup time and file size 17 . SQL Editor: Powerful SQL Editor, support edit Statement complex query statement, generate dynamic report, can export Excel 18 . Access records: Log each IP access time, source region, network operator, count the number of visits per IP and verbose time 19 . IP blacklist: Blocked IP blocked access to Web site foreground
operationDatabase Restore : Historical backup record, restore database or single table, statistics backup time and file sizeSQL Editor: Powerful SQL Editor, support edit Statement complex query statement, generate dynamic report, export ExcelAccess records: Record the time of each IP visit, the source region, the network operator, and the number of visits and detailed times per IPIP blacklist: Blocked IP blocked access to website foreground traffic statistics: PV clicks and independent IP vi
Thunder Download the core idea is to verify the MD5 value of the file, two files if the MD5 is the same file.When a user requests to download a file, it MD5 the URL that owns the file based on the file retained in the database.Hooks a user request to this URL and mimics a false breakpoint continuation request, stitching a normal file from several URLs.Check the information, Java can also implement the file MD5 che
from:http://chenjianjx.iteye.com/blog/1681681You find that your machine has a CPU usage of 100%, and it is found to be the result of your Java application, but which code in this application eats the performance?Here's a share from a colleague:1. Find out the thread that eats the performance first: Top-h-P PID, find the thread ID that consumes the most performance (leftmost column)2. Get the 16 binary repre
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
and provide relevant evidence. A staff member will contact you within 5 working days.