Комментарии:
you are the greatest man, made a module in university 10x easier, I love you man
ОтветитьHames Gosling
Ответитьi am sorry but i try to implement your code , i understood everything but this setNextHandler is not right becouse you will always set the last handler in witch case you will have only one handler
ОтветитьI realize that this is outside the scope of the video; however, it's poor security protocol to tell a (possibly malicious) user weather or not the username exists. This gives the adversary extra information to use in the attack. If you send, "wrong password" the adversary now knows that the username exists and they should try more passwords. If you just send, "Invalid login information," the adversary doesn't know if the username is wrong or the password is wrong. This is particularly an issue when people reuse passwords and/or usernames (or variants thereof).
ОтветитьThese videos are fantastic!
ОтветитьWhy chain of responsibility is a behaviour design pattern? Plz ans me.
ОтветитьThank you for the this amazing videos ! you are the best Sir !
ОтветитьThanks, for the effort creating those well explained videos and for the well choosen examples
Ответитьthank you😍😍
ОтветитьThanks for these clear explanations. I'm actually a programmer several years now (mobile game industry), but where I have been working, we haven't had any strict rules so everybody just implemented things as they saw fit. Now that I'm thinking of moving to another company, I realize I lack some fundamental programming skills and your lessons are quite helpful. Clearer than other tutorials I've seen. Thanks!
Ответить