亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? java web start 1.0 developer's guide (2).txt

?? 一個(gè)新的采集工具 一個(gè)新的采集工具 一個(gè)新的采集工具
?? TXT
字號(hào):
作者:diego lynn
日期:2001-3-25 10:54:32
Application Development Considerations
Developing applications that can be deployed with Java Web Start are generally the same as developing a stand-alone application for the Java 2 platform. Hence, the entry point for the application is the standard public static void main(String[] argv). 
However, in order to support Web deployment -- automatic download and launching of the application -- and to ensure that an application can run in a secure sandbox, there are a few added considerations: 

An application must be delivered as a set of JAR files. 
  
All application resources, such as files and images must be stored in JAR files; and they must be referred to using the getResource mechanism in the Java 2 platform (see below). 
  
If an application is written to run in a secure sandbox, it must follow these restrictions: 
No access to local disk. 
All JAR files must be downloaded from the same host. 
Network connections are enabled only to the host from which the JAR files are downloaded. 
No security manager can be installed. 
No native libraries. 
Limited access to system properties. The application has read/write access to all system properties defined in the JNLP File, as well as read-only access to the same set of properties than an Applet has access to. 
An application is allowed to use the System.exit call. 
  

An application that needs unrestricted access to the system will need to be delivered in a set of signed JAR files. All entries in each JAR file must be signed. 
Retrieving Resources from JAR files
Java Web Start only transfers JAR files from the Web server to the client machine. It determines where to store the JAR files on the local machine. Thus, an application cannot use disk-relative references to resources such as images and configuration files. 
All application resources must be retrieved from the JAR files specified in the resources section of the JNLP file, or retrieved explicitly using an HTTP request to the Web server. We recommend storing resources in JAR files, since they will be cached on the local machine by Java Web Start. 

The following code example shows how to retrieve images from a JAR file: 

   // Get current classloader 
   ClassLoader cl = this.getClass().getClassLoader(); 
   // Create icons 
   Icon saveIcon  = new ImageIcon(cl.getResource("images/save.gif")); 
   Icon cutIcon   = new ImageIcon(cl.getResource("images/cut.gif")); 
   ... 

The example assumes that the following entries exist in one of the JAR files for the application: 

images/save.gif 
images/cut.gif 

Security and Code Signing
Java Web Start addresses the security issues of: 
Protecting users against malicious code (intentional & unintentional) that may affect local files 
  
Protecting enterprises against code that may attempt to access or destroy data on networks 
Applications launched with Java Web Start are -- by default -- run in a restricted environment where they have limited access to local computing resources, such as storage devices and the local network. In this sandbox environment, Java Web Start can guarantee that a downloaded and potentially untrusted application cannot compromise the security of the local files or the network. 
An additional security feature supported by Java Web Start is digital code signing. If an application being invoked is delivered in one or more signed JAR files, Java Web Start will verify that the contents of the JAR file have not been modified since they were signed. If verification of a digital signature fails, Java Web Start will not run the application, since it may have been compromised by a third-party. 

The support for code signing is important for both users and for application service providers. This service makes it possible for users to verify that an application comes from a trusted source. Because the application service provider signs the code, both can be ensured that no other party can impersonate the application on the Web. A signed application that is trusted by the user can also request additional system privileges, such as access to a local disk. 

Java Web Start presents a dialog displaying the application's origin, based on the signer's certificate, before the application is launched. Thereby allowing the user to make an informed decision whether to grant additional privileges to the downloaded code, or not. 

An application can request full access to a client system when all its JAR files are signed by including the following settings in the JNLP file: 

<security> 
   <all-permissions/> 
</security> 

The implementation of code signing in Java Web Start is based on the security API in the core Java 2 Platform. The Java 2 SE JRE 1.2.x supports code signing with the SHAwithSDA algorithm. Java 2 SE JRE 1.3 also supports MD2withRSA and MD5withRSA. The MD5withRSA is currently the most often used algorithm. 

Developers sign code for use with Java Web Start in the same manner as for Java Applets by using the standard jarsigner tool from the Java 2 SE SDK. The documentation for the jarsigner tool provides examples on how to sign code, create test certificates, and other signing related issues. 

Java Web Start also support use of the Netscape signtool when used with the Java 2 SE JRE 1.3.0. See the Netscape Web site for details: http://developer.netscape.com/software/signedobj/ 

Signing JAR Files with a Test Certificate
Here are the steps needed to sign a JAR file with a test certificate: 

Make sure that you have a JDK 1.2 or JDK 1.3 keytool and jarsigner in your path (located in the J2SE SDK bin directory). 

Create a new key in a new keystore as follows: 
keytool -genkey -keystore myKeystore -alias myself 
You will get prompted for a information about the new key, such as password, name, etc. This will create the myKeystore file on disk. 

Then, create a self-signed test certificate as follows: 
keytool -selfcert -alias myself -keystore myKeystore 
This will prompt for the password. Generating the certificate takes a few minutes. 

Check to make sure that everything is ok. To list the contents of the keystore, use the command: 
keytool -list -keystore myKeystore 
It should list something like: 
Keystore type: jks
Keystore provider: SUN

Your keystore contains 1 entry:

myself, Tue Jan 23 19:29:32 PST 2001, keyEntry,
Certificate fingerprint (MD5):
C2:E9:BF:F9:D3:DF:4C:8F:3C:5F:22:9E:AF:0B:42:9D

Finally, sign the JAR file with the test certificate as follows: 
jarsigner -keystore myKeystore test.jar myself 
Repeat this step on all of your JAR files. 

Please note that a self-signed test certificate should only be used for internal testing, since it does not provide any guarantees about the identity of the user and therefore cannot be trusted. A trust-worthy certificate can be obtained from a certificate authority, such as VeriSign, and should be used when the application is put into production. 

Converting JNLP files to work with this release
The JNLP file format has changed significantly since the 0.4 early access release.  Below is a list of the most common modifications that needs to be applied to a 0.4 JNLP file to make it compatible with Java Web Start 1.0: 
Set spec attribute to 1.0. 
Rename the unrestricted element to all-permissions. 
Rename the jre element to j2se and move this element inside the resources element (i.e., make j2se a subelement of resources). 
Converting JNLP files used with the 1.0-beta or 1.0-rc release only requires updating the spec attribute to "1.0". 

Descriptions of new JNLP file features can be found below. 

JNLP File Syntax
The format used in this release correspond to the format specified in the Java Network Launching Protocol and API (JNLP) Specification, v1.0. This document describes the most commonly used elements of the JNLP file. Refer to the specification for a complete description of the format. 
The JNLP file is an XML document. The following shows a complete example of a JNLP file: 

<?xml version="1.0" encoding="utf-8"?> 
<!-- JNLP File for SwingSet2 Demo Application --> 
<jnlp 
  spec="1.0+" 
  codebase="http://javaweb.eng.com/jaws/apps" 
  href="swingset2.jnlp"> 
  <information> 
    <title>SwingSet2 Demo Application</title> 
    <vendor>Sun Microsystems, Inc.</vendor> 
    <homepage href="docs/help.html"/> 
    <description>SwingSet2 Demo Application</description> 
    <description kind="short">A demo of the capabilities of the Swing Graphical User Interface.</description> 
    <icon href="images/swingset2.jpg"/> 
    <offline-allowed/> 
  </information> 
  <security> 
      <all-permissions/> 
  </security> 
  <resources> 
    <j2se version="1.3"/> 
    <jar href="lib/SwingSet2.jar"/> 
  </resources> 
  <application-desc main-class="SwingSet2"/> 
</jnlp> 

The example shows the basic outline of the document. The root element is jnlp, which has four subelements: information, security, resources, and application-desc. In addition, Java Web Start also supports launching Applets by using the applet-desc element. The elements are described in more detail below. 

The JNLP Element
spec attribute: This attribute must be 1.0 or higher to work with this release. The default value is "1.0+". Thus, it can typically be omited. 

codebase attribute: All relative URLs specified in href attributes in the JNLP file is using this URL as a base. 

href attribute: This is a URL pointing to the location of the JNLP file itself. Java Web Start requires this attribute to be set in order for the application to be included in the Application Manager. 

The Information Element
title element: The name of the application. 
vendor element: The name of the vendor of the application. 

homepage element: Contains a single attribute, href, which is a URL locating the home page for the Application. It is used by the Application Manager to point the user to a Web page where they can find more information about the application. 

description element: A short statement about the application. Description elements are optional. The kind attribute defines how the description should be used, it can have one of the following values: 

one-line: If a reference to the application is going to appear on one row in a list or a table, this description will be used. 
short: If a reference to the application is going to be displayed in a situation where there is room for a paragraph, this description is used. 
tooltip: A description of the application intended to be used as a tooltip. 
Only one description element of each kind can be specified. A description element without a kind is used as a default value. Thus, if Java Web Start needs a description of kind short, and it is not specified in the JNLP file, then the text from the description without an attribute is used 
All descriptions contain plain text. No formatting, such as HTML tags is supported. 

icon element: Contains an HTTP URL to an image file in either GIF or JPEG format. The icons are used to represents the application when Java Web Start presents the application to the user during launch, in the Application Manager, and in desktop shortcuts. A 64x64 icon is shown during download and a 32x32 for desktop icons and in the application manager. Java Web Start automatically resizes an icon to the appropriate size. 

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
92精品国产成人观看免费| 亚洲视频一区二区免费在线观看 | 99国产麻豆精品| 国产精品久久一级| a4yy欧美一区二区三区| 亚洲精品视频免费观看| 精品视频一区 二区 三区| 日本欧美肥老太交大片| 精品国产免费一区二区三区四区 | 亚洲国产高清不卡| 色先锋资源久久综合| 亚洲一区在线播放| 日韩一二三区视频| 国产成人免费xxxxxxxx| 一区二区三区成人| 日韩免费看的电影| jlzzjlzz国产精品久久| 日韩精品免费专区| 日本一区二区三区免费乱视频| 91色在线porny| 日本va欧美va瓶| 国产精品麻豆网站| 欧美日韩aaa| 国产一区二区h| 亚洲激情成人在线| 精品剧情v国产在线观看在线| 99国产欧美久久久精品| 日韩电影一区二区三区四区| 国产三级三级三级精品8ⅰ区| 色天使色偷偷av一区二区| 狠狠色狠狠色综合系列| 亚洲欧美二区三区| 精品精品国产高清a毛片牛牛| 99久久综合精品| 蜜桃精品视频在线观看| 亚洲视频资源在线| 久久久久久免费网| 欧美色精品在线视频| 福利视频网站一区二区三区| 亚洲成精国产精品女| 国产欧美一区二区精品久导航| 欧美视频在线一区| 福利一区在线观看| 蜜桃在线一区二区三区| 亚洲精品视频观看| 国产精品入口麻豆九色| 欧美一卡二卡三卡| 欧美日韩激情一区二区| 91年精品国产| 成人黄色在线网站| 国产一本一道久久香蕉| 免费人成在线不卡| 婷婷久久综合九色综合伊人色| 国产精品久久久一区麻豆最新章节| 91精品久久久久久久91蜜桃| 欧洲精品视频在线观看| 91免费观看国产| 成人免费av网站| 国产一区二区三区观看| 国产综合成人久久大片91| 亚洲第一综合色| 亚洲一区二区三区自拍| 亚洲另类在线视频| 亚洲图片激情小说| 国产精品久久久久久久蜜臀| 久久久久久久久久久99999| 精品美女在线观看| 日韩美女主播在线视频一区二区三区| 欧美亚洲综合另类| 色嗨嗨av一区二区三区| 91成人网在线| 欧美性受xxxx| 欧美日韩精品系列| 制服丝袜成人动漫| 欧美一区二区三区思思人| 91精品国产欧美日韩| 日韩亚洲欧美成人一区| 日韩一区二区三区av| 日韩欧美一级在线播放| 日韩欧美国产综合一区 | 欧美日本一区二区在线观看| 欧美伊人久久大香线蕉综合69| 欧美在线色视频| 欧美无乱码久久久免费午夜一区| 欧美综合一区二区三区| 欧美放荡的少妇| 欧美岛国在线观看| 国产欧美精品一区| 亚洲天堂av一区| 亚洲愉拍自拍另类高清精品| 亚洲成人精品一区| 精品无码三级在线观看视频| 国产综合色在线视频区| 波多野洁衣一区| 欧美三片在线视频观看| 日韩三级视频在线看| 国产女人aaa级久久久级| 日韩码欧中文字| 天天影视网天天综合色在线播放| 九色综合国产一区二区三区| 国产成人亚洲综合色影视| 99精品久久99久久久久| 在线不卡中文字幕播放| 久久久久久综合| 日韩理论电影院| 蜜桃久久久久久久| 成人免费电影视频| 欧美男人的天堂一二区| 久久久久九九视频| 一区二区三区在线视频观看58| 日韩—二三区免费观看av| 国产一区美女在线| 在线影视一区二区三区| 欧美mv日韩mv国产网站app| 成人免费在线视频| 蜜臀av在线播放一区二区三区| 国产成人免费9x9x人网站视频| 欧美亚洲日本国产| 久久综合成人精品亚洲另类欧美 | 亚洲精品中文字幕在线观看| 日韩中文字幕1| 成人性生交大片| 欧美精品久久99| 国产精品国产a级| 激情综合色综合久久综合| 一本一道波多野结衣一区二区| 欧美一区二区三区日韩视频| 亚洲欧洲性图库| 国产美女精品在线| 欧美日韩午夜在线视频| 国产日本一区二区| 麻豆免费精品视频| 欧美亚洲动漫另类| 国产精品传媒在线| 经典一区二区三区| 欧美日本在线播放| 亚洲精品视频自拍| 成人自拍视频在线观看| 精品国产亚洲一区二区三区在线观看| 亚洲精品视频在线| 99久久伊人精品| 国产视频一区二区在线观看| 日本不卡一二三区黄网| 欧美日韩日日摸| 亚洲精品日日夜夜| 白白色 亚洲乱淫| 久久精品人人爽人人爽| 青青草成人在线观看| 欧美色涩在线第一页| 一区二区三区在线观看国产| av在线播放一区二区三区| 久久久噜噜噜久噜久久综合| 久久精品国产亚洲a| 欧美日韩在线免费视频| 一色屋精品亚洲香蕉网站| 成人av在线影院| 欧美激情综合在线| 国产成人一区在线| 国产视频在线观看一区二区三区| 国内精品在线播放| 欧美r级电影在线观看| 狂野欧美性猛交blacked| 日韩欧美国产一区二区三区 | 精品一区二区三区视频在线观看| 欧美日韩美女一区二区| 亚洲图片欧美色图| 欧美日韩国产高清一区二区| 香蕉av福利精品导航| 欧美日韩精品一区二区三区蜜桃| 亚洲成在人线在线播放| 欧美精品久久一区| 麻豆国产精品一区二区三区 | 色94色欧美sute亚洲线路二| 亚洲免费在线观看| 欧美日韩国产在线播放网站| 午夜视黄欧洲亚洲| 欧美一区二区三区视频免费| 久久精品免费看| 久久色在线观看| 成人午夜电影久久影院| 国产精品久久久99| 在线观看一区二区视频| 午夜久久久久久| 欧美mv日韩mv亚洲| 成人app软件下载大全免费| 亚洲裸体在线观看| 91精品国产麻豆| 国产黄色成人av| 国产精品麻豆一区二区| 91久久精品网| 日本欧美肥老太交大片| www国产成人免费观看视频 深夜成人网| 黑人巨大精品欧美黑白配亚洲| 国产精品入口麻豆原神| 欧美网站一区二区| 国产又粗又猛又爽又黄91精品| 中文字幕在线不卡| 884aa四虎影成人精品一区| 国产成人亚洲综合色影视| 亚洲已满18点击进入久久|