My Archive
Intercepting HTTPS Traffic: A Deep Dive with jSSLKeyLog and Wireshark
Learn how to decrypt Spring Boot HTTPS traffic using jSSLKeyLog and Wireshark. A step-by-step guide for TLS 1.3 secrets from the Java Virtual Machine.
read moreMy Archive
Digging Into the RetroFlag NESPi Case for Ubuntu
Stop risking SD card corruption. This guide walks you through a robust setup to make RetroFlag hardware work perfectly with Ubuntu on Raspberry Pi 4, including the ‘missing’ LED fix.
read moreMy Archive
Can Project Loom Save a 2008 Laptop?
I ran 100,000 tasks on a Core 2 Duo to see if Virtual Threads are truly the ‘Great Equalizer’ for old hardware.
read moreMy Archive
The Ghost in the Machine: 5 Java Bytecode Mysteries Explained
Ever wondered what happens under the hood of the JVM? From the curious case of the double
read moreMONITOREXIT to the fact that booleans don’t actually exist in bytecode, we explore 5 fascinating mysteries revealed by javap that every Java developer should know.My Archive
GraalVM vs. OpenJDK: Can a 2008 EliteBook Handle Java 21?
Exploring the evolution of the Java Virtual Machine: A deep dive into GraalVM’s Graal compiler versus OpenJDK’s C2. We examine Ahead-of-Time (AOT) compilation, polyglot capabilities, and why ‘write once, run anywhere’ is getting a significant performance upgrade.
read more