WeChat scan code authorization

... system now requires login screen to use mobile phone WeChat to scan and authorize login. Most examples on the Internet are completed on WeChat open platform. We use WeChat to test the public number (equivalent to service number, and Enterprise WeChat must use the enterprise WeChat app...


Base64

... Base64 is one of the most common encoding methods for transmitting 8Bit bytecode on the network. Before understanding Base64 encoding, first understand several basic concepts: bits and bytes. 位: "Bit" is the smallest unit of data in a computer. The status of each bit can only be 0 or 1;...


Idea debugging

... F9 resume programe recovery program Alt+F10 show execution point shows execution breakpoints F8 Step Over is equivalent to eclipse f6 jump to the next step F7 Step Into is equivalent to eclipse f5 is to enter the code Alt+shift+F7 Force Step Into This is the mandatory entry code Shift+F...


Linux installation Tomcat

... 2. Upload to the server Create a new folder on the server Switch to the file cd /usr 新建 mkdir tomcat Open xftp tool upload 3.Unzip installation cd /usr/tomcat tar -zxvf apache-tomcat-8.5.34 At this point decompression completed 4.Configure environment cd /usr/tomcat/apache-tomcat-8.5.34...


IDEA built a springboot2 webflux project

... recently completed PMP, studied a new set of things, although the previous spring boot1 project has not been finished, but slowly moved things to this project. also fought in IDEA, saying that it was really hard to get started, but after using it, I returned to eclipse, and I took a...


Java inheritance and interface

... Java language is a very important function, inheritance and interface. Integration allows you to share code in different classes, and excuses can handle objects of several different classes in a uniform way. Android uses a lot of inheritance and needs to be mastered. Object-oriented...


Value passing and reference passing in Java

... In my understanding, there are four main types of Java data: basic data types, encapsulation of basic data types, arrays, and classes. After doing a test, look at whether the three are passed as a method parameter or a reference. says my understanding of value passing and reference...


JAVA programming specification

... 一, programming protocol (1) The naming style 1.[mandatory] The naming in the code cannot start with an underscore or a dollar sign, nor can it end with a underline or a dollar sign. Counterexample: _name / name / n a m e / n a m e / n a m e name / name_ / name n a m e / n a m e / ​ n a...


CloseableHttpClient sets Timeout

... to set the timeout time of CloseableHttpClient Create a RequestConfig: RequestConfig defaultRequestConfig = RequestConfig . custom ( ) . setSocketTimeout ( 5000 ) . setConnectTimeout ( 5000 ) . setConnectionRequestTimeout ( 5000 ) . setStaleConnectionCheckEnabled ( true ) . build ( ) ;...


[LeetCode] 103. Binary Tree Zigzag Level Order Traversal

... 题 Given a binary tree, return the zigzag level order traversal of its nodes’ values. (ie, from left to right, then right to left for the next level and alternate between). For example: Given binary tree [3,9,20,null,null,15,7], 3 / \ 9 20 / \ 15 7 return its zigzag level order traversal...