亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? java web start 1.0 developer's guide (2).txt

?? 這是一本很好的Java開發書籍
?? TXT
字號:
作者:diego lynn
日期:2001-3-25 10:54:32
Application Development Considerations
Developing applications that can be deployed with Java Web Start are generally the same as developing a stand-alone application for the Java 2 platform. Hence, the entry point for the application is the standard public static void main(String[] argv). 
However, in order to support Web deployment -- automatic download and launching of the application -- and to ensure that an application can run in a secure sandbox, there are a few added considerations: 

An application must be delivered as a set of JAR files. 
  
All application resources, such as files and images must be stored in JAR files; and they must be referred to using the getResource mechanism in the Java 2 platform (see below). 
  
If an application is written to run in a secure sandbox, it must follow these restrictions: 
No access to local disk. 
All JAR files must be downloaded from the same host. 
Network connections are enabled only to the host from which the JAR files are downloaded. 
No security manager can be installed. 
No native libraries. 
Limited access to system properties. The application has read/write access to all system properties defined in the JNLP File, as well as read-only access to the same set of properties than an Applet has access to. 
An application is allowed to use the System.exit call. 
  

An application that needs unrestricted access to the system will need to be delivered in a set of signed JAR files. All entries in each JAR file must be signed. 
Retrieving Resources from JAR files
Java Web Start only transfers JAR files from the Web server to the client machine. It determines where to store the JAR files on the local machine. Thus, an application cannot use disk-relative references to resources such as images and configuration files. 
All application resources must be retrieved from the JAR files specified in the resources section of the JNLP file, or retrieved explicitly using an HTTP request to the Web server. We recommend storing resources in JAR files, since they will be cached on the local machine by Java Web Start. 

The following code example shows how to retrieve images from a JAR file: 

   // Get current classloader 
   ClassLoader cl = this.getClass().getClassLoader(); 
   // Create icons 
   Icon saveIcon  = new ImageIcon(cl.getResource("images/save.gif")); 
   Icon cutIcon   = new ImageIcon(cl.getResource("images/cut.gif")); 
   ... 

The example assumes that the following entries exist in one of the JAR files for the application: 

images/save.gif 
images/cut.gif 

Security and Code Signing
Java Web Start addresses the security issues of: 
Protecting users against malicious code (intentional & unintentional) that may affect local files 
  
Protecting enterprises against code that may attempt to access or destroy data on networks 
Applications launched with Java Web Start are -- by default -- run in a restricted environment where they have limited access to local computing resources, such as storage devices and the local network. In this sandbox environment, Java Web Start can guarantee that a downloaded and potentially untrusted application cannot compromise the security of the local files or the network. 
An additional security feature supported by Java Web Start is digital code signing. If an application being invoked is delivered in one or more signed JAR files, Java Web Start will verify that the contents of the JAR file have not been modified since they were signed. If verification of a digital signature fails, Java Web Start will not run the application, since it may have been compromised by a third-party. 

The support for code signing is important for both users and for application service providers. This service makes it possible for users to verify that an application comes from a trusted source. Because the application service provider signs the code, both can be ensured that no other party can impersonate the application on the Web. A signed application that is trusted by the user can also request additional system privileges, such as access to a local disk. 

Java Web Start presents a dialog displaying the application's origin, based on the signer's certificate, before the application is launched. Thereby allowing the user to make an informed decision whether to grant additional privileges to the downloaded code, or not. 

An application can request full access to a client system when all its JAR files are signed by including the following settings in the JNLP file: 

<security> 
   <all-permissions/> 
</security> 

The implementation of code signing in Java Web Start is based on the security API in the core Java 2 Platform. The Java 2 SE JRE 1.2.x supports code signing with the SHAwithSDA algorithm. Java 2 SE JRE 1.3 also supports MD2withRSA and MD5withRSA. The MD5withRSA is currently the most often used algorithm. 

Developers sign code for use with Java Web Start in the same manner as for Java Applets by using the standard jarsigner tool from the Java 2 SE SDK. The documentation for the jarsigner tool provides examples on how to sign code, create test certificates, and other signing related issues. 

Java Web Start also support use of the Netscape signtool when used with the Java 2 SE JRE 1.3.0. See the Netscape Web site for details: http://developer.netscape.com/software/signedobj/ 

Signing JAR Files with a Test Certificate
Here are the steps needed to sign a JAR file with a test certificate: 

Make sure that you have a JDK 1.2 or JDK 1.3 keytool and jarsigner in your path (located in the J2SE SDK bin directory). 

Create a new key in a new keystore as follows: 
keytool -genkey -keystore myKeystore -alias myself 
You will get prompted for a information about the new key, such as password, name, etc. This will create the myKeystore file on disk. 

Then, create a self-signed test certificate as follows: 
keytool -selfcert -alias myself -keystore myKeystore 
This will prompt for the password. Generating the certificate takes a few minutes. 

Check to make sure that everything is ok. To list the contents of the keystore, use the command: 
keytool -list -keystore myKeystore 
It should list something like: 
Keystore type: jks
Keystore provider: SUN

Your keystore contains 1 entry:

myself, Tue Jan 23 19:29:32 PST 2001, keyEntry,
Certificate fingerprint (MD5):
C2:E9:BF:F9:D3:DF:4C:8F:3C:5F:22:9E:AF:0B:42:9D

Finally, sign the JAR file with the test certificate as follows: 
jarsigner -keystore myKeystore test.jar myself 
Repeat this step on all of your JAR files. 

Please note that a self-signed test certificate should only be used for internal testing, since it does not provide any guarantees about the identity of the user and therefore cannot be trusted. A trust-worthy certificate can be obtained from a certificate authority, such as VeriSign, and should be used when the application is put into production. 

Converting JNLP files to work with this release
The JNLP file format has changed significantly since the 0.4 early access release.  Below is a list of the most common modifications that needs to be applied to a 0.4 JNLP file to make it compatible with Java Web Start 1.0: 
Set spec attribute to 1.0. 
Rename the unrestricted element to all-permissions. 
Rename the jre element to j2se and move this element inside the resources element (i.e., make j2se a subelement of resources). 
Converting JNLP files used with the 1.0-beta or 1.0-rc release only requires updating the spec attribute to "1.0". 

Descriptions of new JNLP file features can be found below. 

JNLP File Syntax
The format used in this release correspond to the format specified in the Java Network Launching Protocol and API (JNLP) Specification, v1.0. This document describes the most commonly used elements of the JNLP file. Refer to the specification for a complete description of the format. 
The JNLP file is an XML document. The following shows a complete example of a JNLP file: 

<?xml version="1.0" encoding="utf-8"?> 
<!-- JNLP File for SwingSet2 Demo Application --> 
<jnlp 
  spec="1.0+" 
  codebase="http://javaweb.eng.com/jaws/apps" 
  href="swingset2.jnlp"> 
  <information> 
    <title>SwingSet2 Demo Application</title> 
    <vendor>Sun Microsystems, Inc.</vendor> 
    <homepage href="docs/help.html"/> 
    <description>SwingSet2 Demo Application</description> 
    <description kind="short">A demo of the capabilities of the Swing Graphical User Interface.</description> 
    <icon href="images/swingset2.jpg"/> 
    <offline-allowed/> 
  </information> 
  <security> 
      <all-permissions/> 
  </security> 
  <resources> 
    <j2se version="1.3"/> 
    <jar href="lib/SwingSet2.jar"/> 
  </resources> 
  <application-desc main-class="SwingSet2"/> 
</jnlp> 

The example shows the basic outline of the document. The root element is jnlp, which has four subelements: information, security, resources, and application-desc. In addition, Java Web Start also supports launching Applets by using the applet-desc element. The elements are described in more detail below. 

The JNLP Element
spec attribute: This attribute must be 1.0 or higher to work with this release. The default value is "1.0+". Thus, it can typically be omited. 

codebase attribute: All relative URLs specified in href attributes in the JNLP file is using this URL as a base. 

href attribute: This is a URL pointing to the location of the JNLP file itself. Java Web Start requires this attribute to be set in order for the application to be included in the Application Manager. 

The Information Element
title element: The name of the application. 
vendor element: The name of the vendor of the application. 

homepage element: Contains a single attribute, href, which is a URL locating the home page for the Application. It is used by the Application Manager to point the user to a Web page where they can find more information about the application. 

description element: A short statement about the application. Description elements are optional. The kind attribute defines how the description should be used, it can have one of the following values: 

one-line: If a reference to the application is going to appear on one row in a list or a table, this description will be used. 
short: If a reference to the application is going to be displayed in a situation where there is room for a paragraph, this description is used. 
tooltip: A description of the application intended to be used as a tooltip. 
Only one description element of each kind can be specified. A description element without a kind is used as a default value. Thus, if Java Web Start needs a description of kind short, and it is not specified in the JNLP file, then the text from the description without an attribute is used 
All descriptions contain plain text. No formatting, such as HTML tags is supported. 

icon element: Contains an HTTP URL to an image file in either GIF or JPEG format. The icons are used to represents the application when Java Web Start presents the application to the user during launch, in the Application Manager, and in desktop shortcuts. A 64x64 icon is shown during download and a 32x32 for desktop icons and in the application manager. Java Web Start automatically resizes an icon to the appropriate size. 

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
精品捆绑美女sm三区| 亚洲国产精品一区二区www在线| 国产精品每日更新在线播放网址| 亚洲一级二级三级在线免费观看| 久久国产精品区| 欧美在线观看18| 亚洲国产精品ⅴa在线观看| 日本女人一区二区三区| 91免费国产在线| 久久久久久日产精品| 日本va欧美va精品| 欧美性xxxxx极品少妇| 中文字幕一区不卡| 国产成人无遮挡在线视频| 日韩欧美黄色影院| 水蜜桃久久夜色精品一区的特点| 色先锋资源久久综合| 国产精品黄色在线观看| 国产精品综合在线视频| 精品国产电影一区二区| 欧美bbbbb| 欧美成人bangbros| 蜜臀久久99精品久久久久宅男| 欧美午夜一区二区三区免费大片| 亚洲欧美日韩中文播放| 91丨porny丨国产入口| 国产精品久久久久久久久快鸭 | 欧美性极品少妇| 国产精品电影一区二区| 99久久精品国产网站| 中文字幕高清不卡| eeuss鲁一区二区三区| 亚洲人午夜精品天堂一二香蕉| 99精品偷自拍| 夜夜爽夜夜爽精品视频| 欧美日韩日日夜夜| 免费不卡在线观看| 欧美一区二区三区视频免费播放| 日本怡春院一区二区| 日韩亚洲欧美在线观看| 韩国中文字幕2020精品| 国产欧美日韩在线视频| 成人av电影在线观看| 亚洲精品成a人| 在线91免费看| 激情国产一区二区 | 成人在线视频首页| 国产精品久久久久久久久图文区| 99精品国产视频| 亚洲超碰精品一区二区| 欧美一卡在线观看| 国产乱码精品一区二区三区忘忧草| 久久综合av免费| zzijzzij亚洲日本少妇熟睡| 一区二区激情视频| 欧美一区二区福利视频| 国产99精品国产| 樱花影视一区二区| 日韩一区二区电影在线| 成人妖精视频yjsp地址| 一区二区三国产精华液| 欧美一级高清片在线观看| 国产风韵犹存在线视精品| 亚洲乱码国产乱码精品精小说| 欧美理论在线播放| 成人久久久精品乱码一区二区三区| 依依成人精品视频| 久久视频一区二区| 在线观看亚洲精品视频| 黄色精品一二区| 成人免费在线视频观看| 91精品国产欧美日韩| av午夜一区麻豆| 九九视频精品免费| 一区二区三区欧美日| 久久久午夜电影| 欧美巨大另类极品videosbest| 国产精华液一区二区三区| 亚洲国产一区视频| 欧美国产精品一区二区三区| 欧美美女bb生活片| 色综合久久久久综合| 国产真实乱对白精彩久久| 亚洲国产日韩综合久久精品| 国产精品女主播在线观看| 欧美美女视频在线观看| 色域天天综合网| 国产91丝袜在线播放| 久久精品久久综合| 一区二区不卡在线播放| 中文字幕日本不卡| 国产日韩三级在线| 精品成人a区在线观看| 5月丁香婷婷综合| 欧美色国产精品| 91在线视频官网| www.色综合.com| 成人性生交大片免费 | 奇米四色…亚洲| 亚洲国产精品尤物yw在线观看| 一色屋精品亚洲香蕉网站| 久久免费午夜影院| 欧美成人精品高清在线播放| 日韩天堂在线观看| 91.com视频| 这里只有精品视频在线观看| 欧美日韩一区二区在线视频| 91亚洲国产成人精品一区二区三 | 亚洲视频一二三区| 亚洲欧洲日韩女同| 中文字幕一区二区日韩精品绯色| 亚洲国产成人一区二区三区| 久久精品免费在线观看| 久久久久国产精品麻豆ai换脸| xf在线a精品一区二区视频网站| 精品久久久久香蕉网| 久久综合国产精品| 中文字幕欧美国产| 中日韩免费视频中文字幕| 亚洲欧美怡红院| 亚洲欧美综合另类在线卡通| 亚洲精品欧美二区三区中文字幕| 一区二区三区精品在线| 亚洲最快最全在线视频| 亚洲v中文字幕| 麻豆成人av在线| 国产成人综合亚洲网站| 不卡的av电影| 欧美吞精做爰啪啪高潮| 欧美日产国产精品| 日韩视频不卡中文| 国产人伦精品一区二区| 最新热久久免费视频| 亚洲福中文字幕伊人影院| 日本伊人色综合网| 国产精品自拍毛片| 91在线观看免费视频| 欧美日韩国产影片| 欧美电影精品一区二区| 国产精品乱码人人做人人爱 | 国产一区二区中文字幕| 成人理论电影网| 精品视频免费在线| 精品va天堂亚洲国产| 亚洲视频免费看| 久久机这里只有精品| 99久久99久久精品国产片果冻 | 色婷婷av一区二区三区软件| 91国在线观看| 久久综合九色综合欧美就去吻| 亚洲色图一区二区| 蜜桃传媒麻豆第一区在线观看| 成人黄色电影在线 | 色吧成人激情小说| 精品国产伦理网| 一区二区三区欧美| 国内国产精品久久| 在线这里只有精品| 久久久久久久久蜜桃| 午夜成人免费电影| 99久免费精品视频在线观看| 欧美乱妇20p| 一区二区三区鲁丝不卡| 国产一区二区三区久久悠悠色av| 日本精品一区二区三区四区的功能| 日韩精品一区二区三区swag| 亚洲精品国产精华液| 国产大陆亚洲精品国产| 日韩一区二区不卡| 亚洲成人av在线电影| 成人高清在线视频| 久久先锋影音av鲁色资源网| 亚洲超碰97人人做人人爱| 91网上在线视频| 中文字幕+乱码+中文字幕一区| 蜜臀av一级做a爰片久久| 欧美色成人综合| 亚洲最新视频在线观看| 不卡av在线免费观看| 日本一区免费视频| 麻豆精品视频在线观看| 欧美蜜桃一区二区三区| 亚洲天堂成人网| 不卡av在线免费观看| 国产蜜臀av在线一区二区三区| 国产综合久久久久影院| 日韩视频免费观看高清完整版| 亚洲电影第三页| 在线观看日韩av先锋影音电影院| 国产精品久久久一本精品| 国产原创一区二区三区| 久久综合久久久久88| 久久精品国产澳门| 欧美成人vps| 国产在线精品一区二区夜色| 日韩欧美在线1卡| 久久国内精品自在自线400部| 日韩一卡二卡三卡四卡| 九一九一国产精品| 精品国产乱码久久久久久夜甘婷婷 |