1 00:00:02,130 --> 00:00:02,700 Welcome my. 2 00:00:03,210 --> 00:00:07,620 Welcome to this lecture in this lecture will create the and so let our Java. 3 00:00:08,220 --> 00:00:14,910 This will be the Soulik that basically says that that validates the farm fields we have sent from. 4 00:00:15,180 --> 00:00:20,980 We have submitted the farm fields from the NextRadio and we have specified the world of logging, logging 5 00:00:21,000 --> 00:00:22,890 servlet to slash logging. 6 00:00:22,900 --> 00:00:28,560 So we will map this in this mapping to our logging soulik. 7 00:00:29,100 --> 00:00:35,010 Plus the fact before we do that, we will create the logging servlet, our java. 8 00:00:35,040 --> 00:00:36,930 So let us go to Eclipse and do that. 9 00:00:40,400 --> 00:00:41,660 So we're opening my lips. 10 00:00:43,840 --> 00:00:46,900 Here, this is our project, so little practical. 11 00:00:49,060 --> 00:00:56,790 In the we are beginning next hour testimony and in the next hour, testimony, as we have seen earlier, 12 00:00:57,550 --> 00:01:06,360 that we think this this summer button, when it is clicked, it goes to slash login, slow, sodic in 13 00:01:06,930 --> 00:01:07,340 our time. 14 00:01:07,600 --> 00:01:16,480 In our next segment, we will define this map with our class, which will create no water resources 15 00:01:16,930 --> 00:01:17,620 source. 16 00:01:21,050 --> 00:01:23,890 Right, click on Comm Labs servlet. 17 00:01:38,930 --> 00:01:42,440 The class name will be Log-in Soulik. 18 00:01:44,910 --> 00:01:46,380 That's all we can to keep us safe. 19 00:01:46,990 --> 00:01:48,330 And next. 20 00:01:50,500 --> 00:01:55,750 She says that he are mapping will be slashed logging, so like you want it to be like this one day because 21 00:01:55,750 --> 00:02:02,510 it has been specified in the next hour as often as same same case and slash. 22 00:02:02,980 --> 00:02:03,940 So let us do. 23 00:02:07,400 --> 00:02:11,930 So we need to get a new method, we mainly need to post method, which we'll be using. 24 00:02:12,290 --> 00:02:13,610 So finish. 25 00:02:16,810 --> 00:02:19,550 And so has been automatically created. 26 00:02:25,100 --> 00:02:26,960 We go to do post. 27 00:02:28,650 --> 00:02:35,010 Here in Dubost, there is an automatic auto generator to get a quick response method to call whether 28 00:02:35,370 --> 00:02:38,100 you remove deck and now even. 29 00:02:39,710 --> 00:02:44,540 Let's start the steps that we will look to appear at this summit. 30 00:02:45,580 --> 00:02:46,300 First of all. 31 00:02:47,160 --> 00:02:50,760 We will set the U.S. tintype. 32 00:02:55,730 --> 00:02:57,380 From a quest object. 33 00:03:05,120 --> 00:03:13,360 This is what we did in the previous Solaire, so it's obviously created, for example, here in so that 34 00:03:13,460 --> 00:03:16,460 you that's about to head over to look and see what we did over here. 35 00:03:17,300 --> 00:03:24,220 We first created the SEC might contain specs to do the same step in Log-in. 36 00:03:24,240 --> 00:03:25,040 So let us record. 37 00:03:25,340 --> 00:03:26,800 OK, second step. 38 00:03:26,990 --> 00:03:27,920 When you come to an. 39 00:03:30,650 --> 00:03:34,430 So that is the first step, the second step is not actually. 40 00:03:36,500 --> 00:03:40,080 It's not actually the same as the second step over here in Illinois. 41 00:03:40,110 --> 00:03:45,730 So let me just get straight to our response getData. 42 00:03:46,040 --> 00:03:47,460 We don't need this out. 43 00:03:47,990 --> 00:03:49,620 We are not creating an e-mail. 44 00:03:49,640 --> 00:03:50,840 We are not sending it. 45 00:03:50,840 --> 00:03:54,170 And the response party instead we will call a servlet. 46 00:03:54,620 --> 00:03:59,150 If we are successful, we'll call NASA or discarded intercepted communication. 47 00:04:00,290 --> 00:04:03,640 And if it is not successful, then we will call an audible [REMOVED]. 48 00:04:04,010 --> 00:04:05,330 That is the next step. 49 00:04:05,330 --> 00:04:07,020 And we'll go back to the next issue, David. 50 00:04:07,460 --> 00:04:10,820 So if you are successful, we will call a servlet Malcolm Soulik. 51 00:04:11,240 --> 00:04:15,110 And if we are not successful, we will go back to the index and [REMOVED]. 52 00:04:15,410 --> 00:04:17,940 So that's what we wrote so we don't need out here. 53 00:04:18,950 --> 00:04:24,800 So this is not a step which you would follow then what else? 54 00:04:25,070 --> 00:04:26,120 What else should we do? 55 00:04:26,190 --> 00:04:28,250 Yes, we will get. 56 00:04:29,260 --> 00:04:30,040 Barometer. 57 00:04:33,470 --> 00:04:34,330 Request. 58 00:04:37,830 --> 00:04:40,740 By the way, said Clinton papers not request object it is. 59 00:04:42,230 --> 00:04:48,350 Response to get be will be from a quest object and be. 60 00:04:54,430 --> 00:04:57,100 Username and password. 61 00:04:58,450 --> 00:05:00,520 From from Boston. 62 00:05:05,790 --> 00:05:08,160 So let us do these two steps first. 63 00:05:09,220 --> 00:05:15,030 Security type of response, dart, sec. 64 00:05:16,630 --> 00:05:19,170 We'll wait for auto politics to come up. 65 00:05:27,240 --> 00:05:28,570 But it was basically. 66 00:05:32,990 --> 00:05:33,890 Content type. 67 00:05:39,900 --> 00:05:41,630 Next, SDMI. 68 00:05:46,620 --> 00:05:50,520 We'll get barometers for you to get thing username. 69 00:05:59,110 --> 00:05:59,950 Let us keep it. 70 00:06:03,850 --> 00:06:04,860 In your case, on. 71 00:06:07,110 --> 00:06:09,570 Request dark get. 72 00:06:16,510 --> 00:06:18,910 The meat and poultry based. 73 00:06:20,140 --> 00:06:21,600 This is just one first one. 74 00:06:29,200 --> 00:06:31,800 Now we'll open the index page. 75 00:06:33,280 --> 00:06:40,450 Excellent estimate here we have user name and we have given the name as a user name, so we copy this. 76 00:06:40,450 --> 00:06:41,080 Exactly. 77 00:06:42,670 --> 00:06:43,120 Go to our. 78 00:06:43,770 --> 00:06:46,180 Rick Dajarra. 79 00:06:47,790 --> 00:06:49,680 Sorry, logging some Jova. 80 00:06:50,900 --> 00:06:53,200 It's closed in order to get back at. 81 00:06:55,320 --> 00:07:02,100 Logon to Java, and here we will control based username, the same name which has been given an index 82 00:07:02,100 --> 00:07:07,720 next, the stimulus name that could be used to get the barometer right. 83 00:07:08,130 --> 00:07:11,670 So you certainly know our next starting password. 84 00:07:11,850 --> 00:07:12,750 Password. 85 00:07:22,810 --> 00:07:23,680 Request. 86 00:07:24,680 --> 00:07:28,310 You'll get Fatimata, this one. 87 00:07:32,370 --> 00:07:37,560 We go again to the next hour, testimony, whatever it is given in the name and password. 88 00:07:37,790 --> 00:07:40,020 We have a copy that it's password. 89 00:07:42,210 --> 00:07:48,050 Strait, you can also type it, but there'll be little mistakes if you just simply copy and paste it 90 00:07:48,270 --> 00:07:49,620 exactly as it is. 91 00:07:51,940 --> 00:08:00,280 So we have got the username and password, both as things from get barometer using you and get better 92 00:08:00,580 --> 00:08:01,210 password. 93 00:08:03,720 --> 00:08:07,300 This is all we will do in this lecture, in the next lecture. 94 00:08:07,350 --> 00:08:13,080 We will continue creating dialogue and servlet and continue with these steps. 95 00:08:13,080 --> 00:08:14,790 So see you in the next lecture. 96 00:08:14,940 --> 00:08:15,440 Thank you.