
Since 1998, DevX has helped people start businesses, build websites, and provide enterprise technology to people globally. Interviewing the likes of Microsoft’s co-founder, Steve Ballmer, the publication brings comprehensive, reliable, and accessible insights to the Internet.
SQL injection is probably the most common and easiest hacking technique out there. Now, don’t think I condone it, I’m just trying to make you aware of some of the
SQL injection is probably the most common and easiest hacking technique out there. Now, don’t think I condone it, I’m just trying to make you aware of some of the
Automation of tasks is a good concept. Consider the example below in which you create a task and schedule it at your convenience to execute the needed actions. There are
Java arrays are not resizable. But we can work around this constraint with the following trick. int[] newArr = Arrays.copyOf(arr, arr.length + 1);
Just add a border-radius over the image element. See below for an example. . round {width: 100px;border-radius: 100%;}

Amid tons of data, finding a particular string’s presence in the data is extremely tedious. MySQL has a command named LOCATE that can be used with certain conditions and the
SQL injection is probably the most common and easiest hacking technique out there. Now, don’t think I condone it, I’m just trying to make you aware of some of the
SQL injection is probably the most common and easiest hacking technique out there. Now, don’t think I condone it, I’m just trying to make you aware of some of the
You can terminate the Java runtime that you are in programmatically. The Java Runtime class provides a method halt(argument) to support this. Of course, caution is advised when using this

With the Java Reflection API, we can isolate the abstract methods from a class via the following snippet of code: List abstractMethods = new ArrayList();Class clazz = Foo.class;Method[] methods =

MySQL provides you a mechanism to find the current user. SELECT USER(), CURRENT_USER(); This command comes handy when you have associated a proxy privilege to a user. Sample: mysql SELECT
We understand how equals() method works. There is a more elaborate method deepEquals() which compares in depth details during comparison.Basic usage is described below. Let us explore more using these as examples. import java.util.Objects; public class DeepEquals{ public static void main(String args[]) { DeepEquals deepEquals = new DeepEquals(); deepEquals.proceed(); } private void proceed() { System.out.println(“Objects.deepEquals(1,1): ” + Objects.deepEquals(1,1)); System.out.println(“Objects.deepEquals(1,2): ” + Objects.deepEquals(1,2)); System.out.println(“Objects.deepEquals(“abc”,”abc”): ” + Objects.deepEquals(“abc”,”abc”)); System.out.println(“Objects.deepEquals(“aa”,”ab”): ” + Objects.deepEquals(“aa”,”ab”)); }} /* Expected output: [root@mypc]# java DeepEqualsGetting handle of runtime ConsoleGot handle of runtime ConsoleYou can now use runtimeConsole object to perform actions of your choice on java.io.Console */
The Runtime class provides mechanism to get the console of the current runtime environment. Using this, we can perform needed actions on the console. import java.io.*; public class SystemConsole{ public static void main(String args[]) { SystemConsole systemConsole = new SystemConsole(); systemConsole.proceed(); } private void proceed() { System.out.println(“Getting handle of runtime Console”); Console runtimeConsole = System.console(); System.out.println(“Got handle of runtime Console”); System.out.println(“You can now use runtimeConsole object to perform actions of your choice on java.io.Console”); }} /* Expected output: [root@mypc]# java SystemConsoleObjects.deepEquals(1,1): trueObjects.deepEquals(1,2): falseObjects.deepEquals(“abc”,”abc”): trueObjects.deepEquals(“aa”,”ab”): false */
To expose non-public methods to the test project, you need to mark the assembly with an attribute called InternalsVisibleTo in the asemblyinfo.cs file?? For example: [assembly: InternalsVisibleTo(“testProjectName”)] You need to
Programming needs vary. You may have a requirement to convert a Base 10 value to binary as part of a complex logic. Java has easier mechanism to achieve the same. public class Base10ToBinary{ public static void main(String args[]) { Base10ToBinary base10ToBinary = new Base10ToBinary(); base10ToBinary.proceed(); } private void proceed() { int num = 10; String binaryNum = Integer.toString(num, 2); System.out.println(“Binary value of ” + num + ” : ” + binaryNum); }} /* Expected output: [root@mypc]# java Base10ToBinaryBinary value of 10 : 1010 */
This is generally useful, specifically if you want to perform some operations based on Java version and so on. public class JavaVersion{ public static void main(String args[]) { JavaVersion javaVersion = new JavaVersion(); javaVersion.proceed(); } private void proceed() { //This works in Java 8 and prior //For Java 9, there is a new api available in Runtime class String javaVersion = System.getProperty(“java.version”); System.out.println(“Java Version: ” + javaVersion); }} /* Expected output: [root@mypc]# java JavaVersionJava Version: 1.8.0_221 */
At times, requirement to update an already delivered JAR file will need to be handled. Of course, JAR file is a way of packaging and delivering Java class file and related metadata files in a package. But having an easier way is always welcome by the developer group. The following command when executed on a command line will achieve updating a JAR file with 1 or more files as needed jar uf jar-file input-file-name(s) where uf : indicates update and filejar-file : the jar file that needs to be updatedinput-file-name(s) : the name of file(s) that needs to be updated in the jar file.
First, define an abstract class and annotate it with @MappedSuperclass. This is not an entity: @MappedSuperclasspublic abstract class User implements Serializable { …} Second, each entity should extend the User class. For example, Student and Teacher entitites: @Entitypublic class Student extends User implements Serializable { …} @Entitypublic class Teacher extends User implements Serializable { …}
For defining an auto-incremented identifier in an entity we need the @Id annotation and the IDENTITY generator as follows: @Entitypublic class User implements Serializable { @Id @GeneratedValue(strategy = GenerationType.IDENTITY) private Long id; …}
You can use a script similar to the following to read through all SQL Server Log files: CREATE PROCEDURE SearchLogFiles (@LogType INT = 1, Filter NVARCHAR(MAX) = ”)ASBEGIN DECLARE @LogsTable
As with any database, MySQL provides powerful user management feature. Learn how to remove a user from the database. DROP USER SRIDHAR However, the catch here is that the user
Knowing the current flush mode can be done as follows: // via EntityManagerentityManager.getFlushMode();// in Hibernate JPA, via Session(entityManager.unwrap(Session.class)).getFlushMode();// starting with Hibernate 5.2(entityManager.unwrap(Session.class)).getHibernateFlushMode();
Add the check along with the function call as below. Admin Function
We can use the AnyMatch method to figure out if a string contains any of the given words from an Array. See below for a sample. List middleEasternCountries = Arrays.asList(“egypt”, “iran”, “turkey”);String sampleString = “Egypt is a famous tourist destination. It contains the Pyramids”; System.out.println(middleEasternCountries.stream().anyMatch(sampleString::contains));
Using Math module, we can retrieve the remainder of two numbers For e.g. the following would return 0.import math re = math.remainder(6, 3))
One of the inbuilt libraries in Python is zip. It can be utilized to transpose a matrix by performing an Unzip followed by zip. Sample code below. Python comes with many inbuilt libraries zip is among those. The??zip()??function returns an iterator of tuples based on the??iterable??object. In order to get the transpose of the matrix first, we need to unzip the list using??*??operator then zip it. inputMatrix = [ [7, 14, 21], [1, 2, 3] ]zip(*inputMatrix) Output will be as follows:[ (7, 1), (14, 2), (21, 3) ]
Java supports creating of ServerSocket(s) in more than one way. This is an important aspect of security. SSLServerSocketFactory is a secure way of achieving this. This ensures that the socket is
Use StringContent?in the Web API response to return a custom JSON. See below for an example: StringContent responseContent = new StringContent ( ” { ‘handled’ : ‘true’ } “, Encoding.UTF8,
By default, Spring Boot uses HikariCP as the connection pool. Via the connection pool, we can disable the auto-commit mode. For example, the following setting disabled auto-commit mode from application.properties:











