VMware Workstation Download Summary

Due to the continuous updating of VMware products, many software has not been available for download since it was acquired by Broadcom. In order to facilitate downloading, I will regularly summarize the commonly used software to the online disk. If the link is unavailable, please give feedback at any time and I will update it as soon as possible.

Last updated on: September 12, 2024.

VMware ESXi system image download summary

Due to the continuous updating of VMware products, many software has not been available for download after being acquired by Broadcom. In order to facilitate downloading, I will regularly summarize the commonly used ISO images to the online disk. If the link is unavailable, please give feedback at any time and I will update it as soon as possible.

Last updated on: July 14, 2024.

Java optimistic lock and pessimistic lock

What is the difference between optimistic locks and pessimistic locks?

In simple terms, optimistic locks assume that those who take data will not be modified, so they are locked only when reading, to determine whether the data is updated after reading. Pessimistic locks assume that data will be modified every time it is read, so locks will be applied when reading. When one thread is used, other threads will block.

Sorting out Java collection related issues

What is the difference between ArrayList and LinkedList?

  1. ArrayList is the data structure implementation of dynamic array, while LinkedList is the data structure implementation of two-way linked list.

  2. ArrayList is more efficient than LinkedList in random access. Because LinkedList is a linear data storage mode, you need to move the pointer to search from front to back.

Is Java parameter transfer a value transfer or a reference transfer?

The Java language can only pass parameters by value. When an instance object is passed to a method as a parameter, the value of the parameter is a copy of the object's reference. Pointing to the same object, the content of the object can be changed within the called method, but the reference of the object (not the copy of the reference) will never change.

Open source intranet penetration tool frp simple use tutorial

Note: This tool depends on a PC or server with a public IP address.

First, let's talk about the original requirements. As we all know, the number of IPv4 network addresses is very limited, only about 4.3 billion. With the development of the global Internet, it is obviously impossible for every device to be assigned to IPv4 addresses.