Proxyee Down.3.4.windows.x64.zip 一个下载工具。
2021-12-14 16:17:32 93.46MB 下载 proxyee
1
jdk11安装包64位,
2021-12-14 13:25:03 149.52MB jdk jdk11
1
JDK最近包jdk-9.0.1_windows-x64_bin,需要的朋友可以下载
2021-12-12 15:34:08 48B jdk9.0.1 windows 64
1
apache-tomcat-7.0.72-windows-x64
2021-12-11 22:09:15 10.06MB tomcat
1
最新javax64离线安装包 方便不能下载的朋友
2021-12-10 22:17:40 29.25MB java jre 离线 x64
1
Hadoop 2.7.3 Windows64位 编译bin(包含winutils.exe, hadoop.dll),自己用的,把压缩包里的winutils.exe, hadoop.dll 放在你的bin 目录 在重启eclipse 就好了
2021-12-10 15:10:36 82KB hadoop winutils.
1
jre 7 64位版本(jre-7u45).
2021-12-10 11:44:17 27.25MB jre jre-7u45
1
jdk1.8 亲测可用
2021-12-09 16:21:41 204.68MB jdk jdk1.8 window jdk1.8
1
jdk1.6 windows x64 官方正式版 。。。。。。。。。。。。。。。。。。。。。。。。。
2021-12-08 14:31:41 59.45MB jdk1.6
1
This release contains a variety of fixes from 14.0. For information about new features in major release 14, see Section E.2. A dump/restore is not required for those running 14.X. However, note that installations using physical replication should update standby servers before the primary server, as explained in the third changelog entry below. Also, several bugs have been found that may have resulted in corrupted indexes, as explained in the next several changelog entries. If any of those cases apply to you, it's recommended to reindex possibly-affected indexes after updating. Make the server reject extraneous data after an SSL or GSS encryption handshake (Tom Lane) A man-in-the-middle with the ability to inject data into the TCP connection could stuff some cleartext data into the start of a supposedly encryption-protected database session. This could be abused to send faked SQL commands to the server, although that would only work if the server did not demand any authentication data. (However, a server relying on SSL certificate authentication might well not do so.) The PostgreSQL Project thanks Jacob Champion for reporting this problem. (CVE-2021-23214) Make libpq reject extraneous data after an SSL or GSS encryption handshake (Tom Lane) A man-in-the-middle with the ability to inject data into the TCP connection could stuff some cleartext data into the start of a supposedly encryption-protected database session. This could probably be abused to inject faked responses to the client's first few queries, although other details of libpq's behavior make that harder than it sounds. A different line of attack is to exfiltrate the client's password, or other sensitive data that might be sent early in the session. That has been shown to be possible with a server vulnerable to CVE-2021-23214. The PostgreSQL Project thanks Jacob Champion for reporting this problem. (CVE-2021-23222) Fix physical replication for cases where the primary crashes after shipping a WAL se
2021-12-07 13:06:56 270.97MB postgresql 开源数据库
1