No Image

jsp 에서 사용자가 생성한 java class 호출 하기

2015-12-23 KENNETH 1

jsp 에서 사용자가 생성한 java class 호출 하기   사전 주의사항 java에서 기본적으로 지원하는 class 가 아닌 사용자가 직접 생성한 class 를 호출하기 위해서는 반드시 package 화 되어 있어야 한다고… 한다. 이 글에서는 apache + tomcat 연동 가상호스트(도메인 이라고도 표시할 수 있고)의 설정이 완료되었음을 전제로 한다.   서버 환경 OS : linux WEB : httpd-2.4 WAS : tomcat-7.0 / java-1.7 뭐.. 중요 하진 않다.   class 선언 환경 document_root : apache,tomcat 에 지정한 대로 사용 class package name : jsptest class name : HelloTest jsp file name : hellotest.jsp document_root 에 WEB-INF/classes 디렉토리 생성 WEB-INF/classes 하단에 ”class package name” 으로 사용될 디렉토리 생성 (즉, document_root/WEB-INF/classes/jsptest 가 되겠다)   class 생성 위치 : document_root/WEB-INF/classes/jsptest 파일이름 : HelloTest.java package jsptest; public class HelloTest { private String name=”HelloTest : 한글.. hello!!!”; public void setName(String name) { this.name=name; } public String getName() { return name; [ more… ]

No Image

MS15-082 – Important: Vulnerabilities in RDP Could Allow Remote Code Execution (3080348) – Version: 1.1

2015-12-23 KENNETH 0

Severity Rating: ImportantRevision Note: V1.1 (December 23, 2015): Bulletin revised to correct the Updates Replaced for the Server Core installation option on Windows Server 2008 and Windows Server 2008 R2.This is an informational change only. Customers who have successfully installed the updates do not need to take any further action.Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sends a specially crafted sequence of packets to a targeted system with Remote Desktop Protocol (RDP) enabled. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. Source: ms-security

No Image

RHSA-2015:2694-1: Important: qemu-kvm security update

2015-12-23 KENNETH 0

Red Hat Enterprise Linux: Updated qemu-kvm packages that fix two security issues are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. CVE-2015-7504, CVE-2015-7512 Source: rhn-errata