With the rapid popularization of AI technologies such as autonomous driving technology, smart assistants, face recognition, smart factories, and smart cities, and the rapid growth of related security incidents, consumers and the industry are paying more and more attention to AI cybersecurity issues and threats. Continuous improving.
Recently, at the request of the European Union and the US government, Adversa, a trusted AI research and consulting company, published the industry’s first comprehensive research report on the security and credibility of artificial intelligence. The report also combines Gartner’s relevant predictions and recent AI research reports. Of confrontational attacks.
Oliver Rochford, a…
Application software leaking user data has long been a common topic, but every time it is mentioned, I still have to feel the dangers that are difficult to prevent, especially when the scope of influence is too large and you may be a “victim”.
On the 20th of May, 2021, the network security company Check Point Research (hereinafter referred to as CPR) released a report: Because developers did not properly configure third-party cloud services, some popular Android applications leaked the personal data of more than 100 million users.
The CPR team said that by testing 23 applications, they found that…
The era of Adobe Flash Player has come to an end.
Starting from January 1, 2021, Adobe officially stopped supporting Adobe Flash Player. Prior to this, including Microsoft Edge, Google Chrome, Mozilla Firefox, and Apple Safari, Flash had been eliminated before this date. Use other technologies instead.
Recently, Microsoft has launched another “killer” on the Windows system. This is bound to root out the poorly secured and low-performance Flash Player from its own products. …
Recently, the well-known analysis company SlashData, after surveying more than 19,000 developers in 155 countries/regions around the world, released the “Developer Report” (20th edition) for the first quarter of 2021. In this report, focusing on tools and fields such as programming languages, machine learning, emerging technologies, and embedded, analyze the application status of development tools and the latest development trends of the developer ecology.
Programming language development prospects
The purpose of this article is to give you a detailed list of the learning route and important knowledge points of Python OpenCV. The core is divided into 24 small chunks, all of which are mastered.
In this part, you need to understand the related introduction of OpenCV (Open Source Computer Vision Library). OpenCV can run on multiple platforms. It is lightweight and efficient. It consists of a series of C functions and a small number of C++ classes. It provides Python, Ruby, MATLAB, etc. …
Recently, JetBrains announced that all its IntelliJ-based IDEs will stop supporting 32-bit operating systems, including AppCode, Clion, DataGrip, GoLand, IntelliJ IDEA, PhpStorm, PyCharm, Rider, RubyMine and WebStorm.
The main reason for giving up compatibility with 32-bit operating systems is that JetBrains has discovered that the number of users using Linux and Windows 32-bit operating systems has dropped significantly over the years, and they want to focus more on compatibility with the most commonly used operating systems. And emerging architectures, such as the AArch64 architecture, which is becoming more and more popular in the macOS field.
For all IntelliJ-based IDEs, the…
In the previous article, we have implemented the use of custom annotations to verify token information, so we will find that when we need to verify more interfaces, we need to add the @ JwtToken annotation to each method, which is also very troublesome. In this article, we continue to use interceptors to verify token information.
If you are not familiar with the integration of JWT, you can take a look at my article: Integrate JWT in SpringBoot to achieve Token verification (Integration)
If you are interested in custom annotation verification token information, you can check out my article: Integrate…
In the last article, we have integrated JWT in SpringBoot and implemented Token verification. In actual applications, we will find that if each view layer (controller) manually verifies the token, the code will be particularly bloated. This article The article is mainly to solve this problem.
If you are not familiar with the integration of JWT, you can take a look at my previous article: Integrate JWT in SpringBoot to achieve Token verification (Integration)
Create custom annotations
We have created an annotation named JwtToken, which has no parameters. An explanation for some of the above annotations:
JSON web token (JWT) is a JSON-based open standard ((RFC 7519) implemented to transfer claims between web application environments. The token is designed to be compact and secure, especially suitable for single-spots on distributed sites. Sign-on (SSO) scenario.
JWT statements are generally used to pass the authenticated user identity information between the identity provider and the service provider, in order to obtain resources from the resource server, and can also add some additional business logic necessary, The token can also be used for authentication directly, or it can be encrypted.
When we develop a front-end and back-end separation project, we…
Under the trend of reducing costs and increasing efficiency, “low code” seems to become hot overnight. According to Forrester, an international authoritative analysis organization, the market for low-code development platforms will increase to USD 21.2 billion by 2022, a significant increase from USD 3.8 billion in 2017. Gartner also estimates that by 2024, about 65% of global applications will involve low-code development.
Low-Code, or “Low Code”, means that in most cases, non-code methods such as visualization can replace handwritten code, and only a few specific requirements require developers to write code.
The low-code development platform is such a development tool…