Solved

servlets

Posted on 2000-05-08
6
303 Views
Last Modified: 2013-11-24
how many types of servlets are there
0
Comment
Question by:vinesh_india
  • 3
  • 2
6 Comments
 
LVL 3

Expert Comment

by:rjackman
ID: 2791361
Strickly speaking there is only 1 servlet: Generic servlet but
there is another servlet calledHttpServlet which is based on generic servlet and having some additional functionality
if ur servlet is protocol independent then u  have to inherit from generic servlet where as ig=f u wat to have http properties to ur servlet then u have to inherit from the HttpServlet
RJackman
0
 
LVL 1

Accepted Solution

by:
yogeshr earned 10 total points
ID: 2791422
The basic types of servlets are core servlets, local servlets, signed network servlets, and unsigned network servlets. These servlets are treated differently with respect to security.

The core servlets and local servlets are thought to be trusted and are granted full access to the server's resources. Signed network servlets are granted a limited subset of privileges, as determined by the site administrator. Unsigned servlets are not trusted and are only executed in a restrictive environment, called the server sandbox.



0
 

Author Comment

by:vinesh_india
ID: 2791568
what is an internal servlet
0
3 Use Cases for Connected Systems

Our Dev teams are like yours. They’re continually cranking out code for new features/bugs fixes, testing, deploying, testing some more, responding to production monitoring events and more. It’s complex. So, we thought you’d like to see what’s working for us.

 
LVL 1

Expert Comment

by:yogeshr
ID: 2791776
These are addon servlets that you can add to your application to enable optional functions for that application. e.g : -Application Server Version 3 provides internal (built-in) servlets.
0
 
LVL 1

Expert Comment

by:yogeshr
ID: 2791780
For additinal information about the internal servlets you can use the link
http://www-4.ibm.com/software/webservers/appserv/doc/v30/se/web/doc/whatis/icsrvlet.html#internalsrv
0
 

Author Comment

by:vinesh_india
ID: 2932341
Comment accepted as answer
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Introduction Java can be integrated with native programs using an interface called JNI(Java Native Interface). Native programs are programs which can directly run on the processor. JNI is simply a naming and calling convention so that the JVM (Java…
Introduction This article is the first of three articles that explain why and how the Experts Exchange QA Team does test automation for our web site. This article explains our test automation goals. Then rationale is given for the tools we use to a…
Viewers learn how to read error messages and identify possible mistakes that could cause hours of frustration. Coding is as much about debugging your code as it is about writing it. Define Error Message: Line Numbers: Type of Error: Break Down…
This tutorial covers a step-by-step guide to install VisualVM launcher in eclipse.

861 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

25 Experts available now in Live!

Get 1:1 Help Now