<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>tomcat | C1G军火库</title>
	<atom:link href="https://blog.c1gstudio.com/archives/tag/tomcat/feed" rel="self" type="application/rss+xml" />
	<link>https://blog.c1gstudio.com</link>
	<description>关注互联网、网页设计、Web开发、服务器运维优化、项目管理、网站运营、网站安全...</description>
	<lastBuildDate>Mon, 10 Dec 2012 01:24:53 +0000</lastBuildDate>
	<language>zh-Hans</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Apache Tomcat FORM身份验证安全绕过漏洞</title>
		<link>https://blog.c1gstudio.com/archives/1582</link>
					<comments>https://blog.c1gstudio.com/archives/1582#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Mon, 10 Dec 2012 01:24:53 +0000</pubDate>
				<category><![CDATA[Tomcat]]></category>
		<category><![CDATA[安全通告]]></category>
		<category><![CDATA[tomcat]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1582</guid>

					<description><![CDATA[<p>发布时间: 2012-12-04 (GMT+0800) 漏洞版本: Apache Group Tomcat 7 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1582">Apache Tomcat FORM身份验证安全绕过漏洞</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1582/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Apache Tomcat DIGEST身份验证多个安全漏洞(CVE-2012-3439)</title>
		<link>https://blog.c1gstudio.com/archives/1571</link>
					<comments>https://blog.c1gstudio.com/archives/1571#comments</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Thu, 08 Nov 2012 07:50:56 +0000</pubDate>
				<category><![CDATA[Tomcat]]></category>
		<category><![CDATA[安全通告]]></category>
		<category><![CDATA[tomcat]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1571</guid>

					<description><![CDATA[<p>发布时间: 2012-11-05 (GMT+0800) 漏洞版本: Apache Group Tomcat 7 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1571">Apache Tomcat DIGEST身份验证多个安全漏洞(CVE-2012-3439)</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1571/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Apache Tomcat 6.0.35前有拒绝服务,信息泄露等漏洞</title>
		<link>https://blog.c1gstudio.com/archives/1434</link>
					<comments>https://blog.c1gstudio.com/archives/1434#comments</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Fri, 20 Apr 2012 09:33:29 +0000</pubDate>
				<category><![CDATA[Tomcat]]></category>
		<category><![CDATA[安全通告]]></category>
		<category><![CDATA[tomcat]]></category>
		<category><![CDATA[安全]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=1434</guid>

					<description><![CDATA[<p>Apache Tomcat 6.0.35前有信息泄露相关的一个漏洞（CVE-2011-3375）， 以及另一个 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/1434">Apache Tomcat 6.0.35前有拒绝服务,信息泄露等漏洞</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/1434/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>使用Oracle JRockit 提高tomcat性能</title>
		<link>https://blog.c1gstudio.com/archives/954</link>
					<comments>https://blog.c1gstudio.com/archives/954#comments</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Tue, 09 Mar 2010 05:07:24 +0000</pubDate>
				<category><![CDATA[Tomcat]]></category>
		<category><![CDATA[技术]]></category>
		<category><![CDATA[jrockit]]></category>
		<category><![CDATA[tomcat]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=954</guid>

					<description><![CDATA[<p>http://www.oracle.com/technology/software/products/jroc [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/954">使用Oracle JRockit 提高tomcat性能</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/954/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Java虚拟机的最大内存限制</title>
		<link>https://blog.c1gstudio.com/archives/941</link>
					<comments>https://blog.c1gstudio.com/archives/941#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Wed, 03 Mar 2010 08:48:26 +0000</pubDate>
				<category><![CDATA[Tomcat]]></category>
		<category><![CDATA[技术]]></category>
		<category><![CDATA[tomcat]]></category>
		<category><![CDATA[内存]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=941</guid>

					<description><![CDATA[<p>tomcat有内存限制，增加内存后可能会起不来. tail /opt/tomcat/logs/catalina [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/941">Java虚拟机的最大内存限制</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/941/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CentOs5.2安装tomcat</title>
		<link>https://blog.c1gstudio.com/archives/889</link>
					<comments>https://blog.c1gstudio.com/archives/889#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Mon, 09 Nov 2009 09:54:01 +0000</pubDate>
				<category><![CDATA[Tomcat]]></category>
		<category><![CDATA[技术]]></category>
		<category><![CDATA[tomcat]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=889</guid>

					<description><![CDATA[<p>查看当前版本 java -version java version &#8220;1.4.2&#8221; 卸 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/889">CentOs5.2安装tomcat</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/889/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>tomcat安全设置</title>
		<link>https://blog.c1gstudio.com/archives/865</link>
					<comments>https://blog.c1gstudio.com/archives/865#comments</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Sat, 10 Oct 2009 06:54:16 +0000</pubDate>
				<category><![CDATA[Tomcat]]></category>
		<category><![CDATA[技术]]></category>
		<category><![CDATA[tomcat]]></category>
		<category><![CDATA[安全]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=865</guid>

					<description><![CDATA[<p>1.关闭服务器端口： server.xml默认有下面一行： 这样允许任何人只要telnet到服务器的8005端 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/865">tomcat安全设置</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/865/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>使用 LambdaProbe监控Tomcat</title>
		<link>https://blog.c1gstudio.com/archives/800</link>
					<comments>https://blog.c1gstudio.com/archives/800#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Thu, 06 Aug 2009 05:17:09 +0000</pubDate>
				<category><![CDATA[Tomcat]]></category>
		<category><![CDATA[技术]]></category>
		<category><![CDATA[lambdaprobe]]></category>
		<category><![CDATA[tomcat]]></category>
		<category><![CDATA[监控]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=800</guid>

					<description><![CDATA[<p>Lambda Probe 　Lambda Probe 是基于 Web + AJAX 的强大的免费开源工具,拥有 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/800">使用 LambdaProbe监控Tomcat</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/800/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>优化 tomcat session和thread</title>
		<link>https://blog.c1gstudio.com/archives/796</link>
					<comments>https://blog.c1gstudio.com/archives/796#respond</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Tue, 04 Aug 2009 02:50:23 +0000</pubDate>
				<category><![CDATA[Tomcat]]></category>
		<category><![CDATA[技术]]></category>
		<category><![CDATA[session]]></category>
		<category><![CDATA[thread]]></category>
		<category><![CDATA[tomcat]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=796</guid>

					<description><![CDATA[<p>Server Information Tomcat Version :Apache Tomcat/6.0.16 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/796">优化 tomcat session和thread</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/796/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>用squid缓存jsp加速lucene搜索</title>
		<link>https://blog.c1gstudio.com/archives/348</link>
					<comments>https://blog.c1gstudio.com/archives/348#comments</comments>
		
		<dc:creator><![CDATA[C1G]]></dc:creator>
		<pubDate>Wed, 05 Nov 2008 09:11:54 +0000</pubDate>
				<category><![CDATA[Nginx]]></category>
		<category><![CDATA[Squid/varnish]]></category>
		<category><![CDATA[jsp]]></category>
		<category><![CDATA[nginx]]></category>
		<category><![CDATA[squid]]></category>
		<category><![CDATA[tomcat]]></category>
		<guid isPermaLink="false">http://blog.c1gstudio.com/?p=348</guid>

					<description><![CDATA[<p>前面尝试了使用nginx负载均衡lucene，效果还不错，但更新维护比较麻烦。 搜索来源中大部分是由连接方式过 [&#8230;]</p>
<p>The post <a href="https://blog.c1gstudio.com/archives/348">用squid缓存jsp加速lucene搜索</a> first appeared on <a href="https://blog.c1gstudio.com">C1G军火库</a>.</p>]]></description>
		
					<wfw:commentRss>https://blog.c1gstudio.com/archives/348/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
