亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? java web start 1.0 developer's guide (2).txt

?? java技術(shù)綜合: 總結(jié)多家java技術(shù)論壇中的常見(jiàn)問(wèn)題
?? TXT
字號(hào):
作者:diego lynn
日期:2001-3-25 10:54:32
Application Development Considerations
Developing applications that can be deployed with Java Web Start are generally the same as developing a stand-alone application for the Java 2 platform. Hence, the entry point for the application is the standard public static void main(String[] argv). 
However, in order to support Web deployment -- automatic download and launching of the application -- and to ensure that an application can run in a secure sandbox, there are a few added considerations: 

An application must be delivered as a set of JAR files. 
  
All application resources, such as files and images must be stored in JAR files; and they must be referred to using the getResource mechanism in the Java 2 platform (see below). 
  
If an application is written to run in a secure sandbox, it must follow these restrictions: 
No access to local disk. 
All JAR files must be downloaded from the same host. 
Network connections are enabled only to the host from which the JAR files are downloaded. 
No security manager can be installed. 
No native libraries. 
Limited access to system properties. The application has read/write access to all system properties defined in the JNLP File, as well as read-only access to the same set of properties than an Applet has access to. 
An application is allowed to use the System.exit call. 
  

An application that needs unrestricted access to the system will need to be delivered in a set of signed JAR files. All entries in each JAR file must be signed. 
Retrieving Resources from JAR files
Java Web Start only transfers JAR files from the Web server to the client machine. It determines where to store the JAR files on the local machine. Thus, an application cannot use disk-relative references to resources such as images and configuration files. 
All application resources must be retrieved from the JAR files specified in the resources section of the JNLP file, or retrieved explicitly using an HTTP request to the Web server. We recommend storing resources in JAR files, since they will be cached on the local machine by Java Web Start. 

The following code example shows how to retrieve images from a JAR file: 

   // Get current classloader 
   ClassLoader cl = this.getClass().getClassLoader(); 
   // Create icons 
   Icon saveIcon  = new ImageIcon(cl.getResource("images/save.gif")); 
   Icon cutIcon   = new ImageIcon(cl.getResource("images/cut.gif")); 
   ... 

The example assumes that the following entries exist in one of the JAR files for the application: 

images/save.gif 
images/cut.gif 

Security and Code Signing
Java Web Start addresses the security issues of: 
Protecting users against malicious code (intentional & unintentional) that may affect local files 
  
Protecting enterprises against code that may attempt to access or destroy data on networks 
Applications launched with Java Web Start are -- by default -- run in a restricted environment where they have limited access to local computing resources, such as storage devices and the local network. In this sandbox environment, Java Web Start can guarantee that a downloaded and potentially untrusted application cannot compromise the security of the local files or the network. 
An additional security feature supported by Java Web Start is digital code signing. If an application being invoked is delivered in one or more signed JAR files, Java Web Start will verify that the contents of the JAR file have not been modified since they were signed. If verification of a digital signature fails, Java Web Start will not run the application, since it may have been compromised by a third-party. 

The support for code signing is important for both users and for application service providers. This service makes it possible for users to verify that an application comes from a trusted source. Because the application service provider signs the code, both can be ensured that no other party can impersonate the application on the Web. A signed application that is trusted by the user can also request additional system privileges, such as access to a local disk. 

Java Web Start presents a dialog displaying the application's origin, based on the signer's certificate, before the application is launched. Thereby allowing the user to make an informed decision whether to grant additional privileges to the downloaded code, or not. 

An application can request full access to a client system when all its JAR files are signed by including the following settings in the JNLP file: 

<security> 
   <all-permissions/> 
</security> 

The implementation of code signing in Java Web Start is based on the security API in the core Java 2 Platform. The Java 2 SE JRE 1.2.x supports code signing with the SHAwithSDA algorithm. Java 2 SE JRE 1.3 also supports MD2withRSA and MD5withRSA. The MD5withRSA is currently the most often used algorithm. 

Developers sign code for use with Java Web Start in the same manner as for Java Applets by using the standard jarsigner tool from the Java 2 SE SDK. The documentation for the jarsigner tool provides examples on how to sign code, create test certificates, and other signing related issues. 

Java Web Start also support use of the Netscape signtool when used with the Java 2 SE JRE 1.3.0. See the Netscape Web site for details: http://developer.netscape.com/software/signedobj/ 

Signing JAR Files with a Test Certificate
Here are the steps needed to sign a JAR file with a test certificate: 

Make sure that you have a JDK 1.2 or JDK 1.3 keytool and jarsigner in your path (located in the J2SE SDK bin directory). 

Create a new key in a new keystore as follows: 
keytool -genkey -keystore myKeystore -alias myself 
You will get prompted for a information about the new key, such as password, name, etc. This will create the myKeystore file on disk. 

Then, create a self-signed test certificate as follows: 
keytool -selfcert -alias myself -keystore myKeystore 
This will prompt for the password. Generating the certificate takes a few minutes. 

Check to make sure that everything is ok. To list the contents of the keystore, use the command: 
keytool -list -keystore myKeystore 
It should list something like: 
Keystore type: jks
Keystore provider: SUN

Your keystore contains 1 entry:

myself, Tue Jan 23 19:29:32 PST 2001, keyEntry,
Certificate fingerprint (MD5):
C2:E9:BF:F9:D3:DF:4C:8F:3C:5F:22:9E:AF:0B:42:9D

Finally, sign the JAR file with the test certificate as follows: 
jarsigner -keystore myKeystore test.jar myself 
Repeat this step on all of your JAR files. 

Please note that a self-signed test certificate should only be used for internal testing, since it does not provide any guarantees about the identity of the user and therefore cannot be trusted. A trust-worthy certificate can be obtained from a certificate authority, such as VeriSign, and should be used when the application is put into production. 

Converting JNLP files to work with this release
The JNLP file format has changed significantly since the 0.4 early access release.  Below is a list of the most common modifications that needs to be applied to a 0.4 JNLP file to make it compatible with Java Web Start 1.0: 
Set spec attribute to 1.0. 
Rename the unrestricted element to all-permissions. 
Rename the jre element to j2se and move this element inside the resources element (i.e., make j2se a subelement of resources). 
Converting JNLP files used with the 1.0-beta or 1.0-rc release only requires updating the spec attribute to "1.0". 

Descriptions of new JNLP file features can be found below. 

JNLP File Syntax
The format used in this release correspond to the format specified in the Java Network Launching Protocol and API (JNLP) Specification, v1.0. This document describes the most commonly used elements of the JNLP file. Refer to the specification for a complete description of the format. 
The JNLP file is an XML document. The following shows a complete example of a JNLP file: 

<?xml version="1.0" encoding="utf-8"?> 
<!-- JNLP File for SwingSet2 Demo Application --> 
<jnlp 
  spec="1.0+" 
  codebase="http://javaweb.eng.com/jaws/apps" 
  href="swingset2.jnlp"> 
  <information> 
    <title>SwingSet2 Demo Application</title> 
    <vendor>Sun Microsystems, Inc.</vendor> 
    <homepage href="docs/help.html"/> 
    <description>SwingSet2 Demo Application</description> 
    <description kind="short">A demo of the capabilities of the Swing Graphical User Interface.</description> 
    <icon href="images/swingset2.jpg"/> 
    <offline-allowed/> 
  </information> 
  <security> 
      <all-permissions/> 
  </security> 
  <resources> 
    <j2se version="1.3"/> 
    <jar href="lib/SwingSet2.jar"/> 
  </resources> 
  <application-desc main-class="SwingSet2"/> 
</jnlp> 

The example shows the basic outline of the document. The root element is jnlp, which has four subelements: information, security, resources, and application-desc. In addition, Java Web Start also supports launching Applets by using the applet-desc element. The elements are described in more detail below. 

The JNLP Element
spec attribute: This attribute must be 1.0 or higher to work with this release. The default value is "1.0+". Thus, it can typically be omited. 

codebase attribute: All relative URLs specified in href attributes in the JNLP file is using this URL as a base. 

href attribute: This is a URL pointing to the location of the JNLP file itself. Java Web Start requires this attribute to be set in order for the application to be included in the Application Manager. 

The Information Element
title element: The name of the application. 
vendor element: The name of the vendor of the application. 

homepage element: Contains a single attribute, href, which is a URL locating the home page for the Application. It is used by the Application Manager to point the user to a Web page where they can find more information about the application. 

description element: A short statement about the application. Description elements are optional. The kind attribute defines how the description should be used, it can have one of the following values: 

one-line: If a reference to the application is going to appear on one row in a list or a table, this description will be used. 
short: If a reference to the application is going to be displayed in a situation where there is room for a paragraph, this description is used. 
tooltip: A description of the application intended to be used as a tooltip. 
Only one description element of each kind can be specified. A description element without a kind is used as a default value. Thus, if Java Web Start needs a description of kind short, and it is not specified in the JNLP file, then the text from the description without an attribute is used 
All descriptions contain plain text. No formatting, such as HTML tags is supported. 

icon element: Contains an HTTP URL to an image file in either GIF or JPEG format. The icons are used to represents the application when Java Web Start presents the application to the user during launch, in the Application Manager, and in desktop shortcuts. A 64x64 icon is shown during download and a 32x32 for desktop icons and in the application manager. Java Web Start automatically resizes an icon to the appropriate size. 

?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美xxxxx牲另类人与| 成人综合在线网站| 亚洲国产wwwccc36天堂| 蜜臀久久久99精品久久久久久| 日韩在线一二三区| 国产精选一区二区三区| voyeur盗摄精品| 91精品国产高清一区二区三区| 7777精品伊人久久久大香线蕉完整版| 欧美剧在线免费观看网站| 日韩视频免费观看高清完整版 | 久久精品国产一区二区三 | 中文字幕亚洲精品在线观看| 亚洲综合一区二区| 国产精品影视网| 欧美精选在线播放| 中文在线资源观看网站视频免费不卡| 亚洲免费在线看| 韩国在线一区二区| 日韩欧美中文字幕公布| 中文字幕日韩一区| 国产成人一区在线| 精品国产伦理网| 日本三级韩国三级欧美三级| 99re热这里只有精品免费视频 | 美女视频免费一区| 欧美亚一区二区| 国产精品久久久久久久久免费樱桃| 亚洲视频在线一区二区| 成人性生交大片免费看中文| www精品美女久久久tv| 日韩精品成人一区二区三区| 色综合久久久久综合体| 国产精品久久久久久久久免费相片| 另类人妖一区二区av| 日韩一区二区三区免费观看| 五月天激情小说综合| 91精品国产黑色紧身裤美女| 日本视频免费一区| www国产精品av| 国产不卡视频一区二区三区| 久久精品在线免费观看| 成人一道本在线| 亚洲欧美一区二区三区极速播放| 99久久99久久精品国产片果冻 | 国产综合一区二区| 国产日韩欧美精品综合| 国产91丝袜在线播放九色| 欧美激情在线一区二区| 91在线视频免费观看| 亚洲一区二区三区影院| 91精品国产综合久久精品性色| 蜜臀久久99精品久久久久久9| 精品久久久久久综合日本欧美| 国产精品亚洲人在线观看| 中文字幕日韩一区| 欧美一区二区三区小说| 国产精品小仙女| 日日夜夜精品视频免费| 国产女人18毛片水真多成人如厕| 99国产精品久久久久久久久久| 亚洲影院久久精品| 国产精品网站在线观看| 欧美视频一二三区| 成人美女在线视频| 国产揄拍国内精品对白| 亚洲高清中文字幕| 亚洲精品你懂的| 久久蜜桃av一区二区天堂| 欧美婷婷六月丁香综合色| 久久国产精品72免费观看| 夜夜精品视频一区二区 | 久久99国产精品久久| 一区二区三区中文在线观看| 久久久精品国产99久久精品芒果| 欧美色窝79yyyycom| 99久久精品免费| eeuss鲁片一区二区三区| 国产乱码精品一区二区三区五月婷| 日韩高清不卡一区二区三区| 一区二区久久久久| 亚洲综合一二区| 亚洲大片在线观看| 日韩高清不卡一区二区| 日本麻豆一区二区三区视频| 日本视频一区二区三区| 美女网站色91| 成人小视频在线观看| 成av人片一区二区| 色呦呦国产精品| 欧美一区二区视频在线观看2022| 91精品国产91久久综合桃花 | 美女视频网站久久| 国产成人精品免费视频网站| 99久久综合国产精品| 色婷婷亚洲精品| 精品日韩一区二区三区免费视频| 久久午夜免费电影| 国产精品伦理在线| 五月天精品一区二区三区| 狠狠网亚洲精品| 色综合久久久久| 日韩精品专区在线影院重磅| 国产人伦精品一区二区| 一区二区三区在线视频播放 | 91精品国产综合久久久蜜臀粉嫩 | 成人午夜免费av| 欧美日韩精品一区二区三区四区| 欧美肥大bbwbbw高潮| 国产精品理论在线观看| 琪琪久久久久日韩精品| 99国产欧美另类久久久精品| 欧美剧在线免费观看网站| 亚洲天堂网中文字| 国产精品88888| 久久久99精品免费观看| 日韩av电影免费观看高清完整版在线观看| 国精品**一区二区三区在线蜜桃 | 一区二区高清免费观看影视大全 | 一区二区三区久久| 国产999精品久久| 精品国产伦一区二区三区观看方式| 亚洲自拍偷拍欧美| 95精品视频在线| 国产精品毛片无遮挡高清| 国产91清纯白嫩初高中在线观看 | 久久99久久99小草精品免视看| 精品欧美一区二区三区精品久久| 亚洲视频免费看| 日本精品视频一区二区| 亚洲精品中文字幕在线观看| 日本久久一区二区三区| 亚洲国产视频一区| 欧美精品丝袜久久久中文字幕| 午夜av一区二区| 日韩精品在线一区| 国产麻豆精品一区二区| 中文字幕亚洲一区二区va在线| 91小视频在线| 天天色 色综合| 久久久久久黄色| 91福利视频网站| 激情五月婷婷综合| 国产欧美日韩不卡| 在线看日韩精品电影| 日韩国产一二三区| 亚洲色图一区二区三区| 欧美浪妇xxxx高跟鞋交| 精品一区二区在线观看| 亚洲天堂中文字幕| 26uuu亚洲| 8x福利精品第一导航| 成人高清在线视频| 日本不卡中文字幕| 亚洲精品成人在线| 国产精品无圣光一区二区| 91麻豆精品国产91久久久 | 亚洲高清在线精品| 国产精品久久久久久久久动漫 | 天天亚洲美女在线视频| 国产精品丝袜黑色高跟| 久久一夜天堂av一区二区三区| 欧美亚洲精品一区| 91久久精品一区二区二区| 国产成人小视频| 久久国产尿小便嘘嘘尿| 日韩精彩视频在线观看| 一区二区三区在线视频观看58| 国产欧美日韩精品在线| 久久新电视剧免费观看| 欧美成人三级在线| 日韩一区二区影院| 欧美日韩国产免费一区二区 | 国产精品电影一区二区三区| 精品日韩一区二区| 久久精品日产第一区二区三区高清版| 在线成人小视频| 日韩欧美另类在线| 日韩免费成人网| 国产精品丝袜一区| 自拍偷拍欧美精品| 亚洲精品国产第一综合99久久| 亚洲欧美视频在线观看| 亚洲激情第一区| 精品亚洲国产成人av制服丝袜| 精品在线一区二区| 色一情一伦一子一伦一区| 在线观看www91| 精品久久久久香蕉网| 中文字幕一区二区三区在线不卡 | 欧美成人伊人久久综合网| 久久久久久久久99精品| 亚洲欧洲精品成人久久奇米网| 综合久久给合久久狠狠狠97色| 综合亚洲深深色噜噜狠狠网站| 一区二区三区欧美日韩| 韩国欧美国产一区| 91激情在线视频| 久久夜色精品国产噜噜av| 亚洲无线码一区二区三区|