
09/06/2025 · 9 min
Host Your Own API-Accessible LLM with Ollama
A practical guide to self-host an LLM with Ollama, expose it through an API, secure access, and integrate it with Spring Boot.
Knowledge Base
Technical write-ups focused on cybersecurity, software engineering, architecture, and practical tooling.
33 articles visible

09/06/2025 · 9 min
A practical guide to self-host an LLM with Ollama, expose it through an API, secure access, and integrate it with Spring Boot.

28/04/2025 · 14 min
Build a Spring Boot API that scans uploaded files with ClamAV (clamd) before storage, with size validation, streaming scan, scheduled signature updates, and Docker deployment guidance.

13/03/2025 · 4 min
RESTful APIs (Representational State Transfer) are a cornerstone of modern software development. They enable communication between applications over HTTP, offering a scalable and stateless architecture. Whether you're bui

06/03/2025 · 2 min
In modern API design, securing endpoints is a fundamental aspect of development. Using an API key in the header, such as "X-API-KEY," is a common practice for lightweight authentication. Here's how you can implement it in

22/02/2025 · 3 min
Spring Boot simplifies application development by providing powerful integrations with Java frameworks, such as JPA (Java Persistence API). Among JPA’s many capabilities, the Specification API stands out as a robust tool

20/02/2025 · 4 min
Caching is an essential optimization technique for improving the performance and responsiveness of an application. Spring Boot provides a simple way to integrate caching into your project, and by using Caffeine, you can l

30/01/2025 · 5 min
H2 is a fast, open-source, and lightweight database management system written in Java. It is particularly popular in development and testing environments due to its simplicity, small footprint, and the ability to run both

29/01/2025 · 5 min
In Spring Boot applications that use JPA (Java Persistence API), projections provide a powerful mechanism for retrieving only specific parts of an entity’s data. Instead of fetching the entire entity with all its fields,

27/01/2025 · 5 min
Learn best practices for designing RESTful APIs with Java Spring Boot, including correct use of HTTP methods, status codes, HATEOAS, pagination, and error handling.

20/01/2025 · 3 min
PostgreSQL is a powerful, open-source relational database that pairs well with Spring Boot applications. This tutorial guides you through configuring PostgreSQL in a Spring Boot project using Spring Data JPA for seamless

15/01/2025 · 3 min
In the digital age, where online platforms are integral to daily life, cybersecurity threats are evolving at an alarming pace. One such threat is **typosquatting**, a cybercrime tactic that exploits human error to deceive

14/01/2025 · 3 min
The `@Transactional` annotation is a cornerstone of Spring’s declarative transaction management. It allows developers to manage transactions efficiently without having to write verbose code. By simply annotating a method

13/01/2025 · 3 min
In Java Spring Boot development, **DTO** (Data Transfer Object) is a common design pattern used to transfer data between different layers of an application. This pattern is especially useful in complex systems where entit

10/01/2025 · 3 min
When working with Java, you often encounter boilerplate code such as getters, setters, constructors, and equals/hashCode methods. Lombok is a powerful Java library that helps reduce this boilerplate code, making your code

08/01/2025 · 7 min
[Apache Maven](https://maven.apache.org/) is a powerful build automation and dependency management tool widely used in Java development. When working on a Spring Boot project, Maven simplifies project setup, dependency ma

06/01/2025 · 3 min
Swagger, is an essential tool for documenting, describing, and interacting with RESTful APIs. It provides a graphical user interface that simplifies the understanding of endpoints, parameters, responses, and schemas used

30/12/2024 · 4 min
Cross-Origin Resource Sharing (CORS) is a security feature implemented by web browsers to control how resources on a web page can be requested from another domain. While it is essential for protecting users from malicious

28/12/2024 · 2 min
Cybersecurity is constantly evolving, along with the tools that allow professionals to mitigate risks and protect their systems. Among these tools, crt.sh stands out as a powerful and free resource for exploring SSL/TLS c

26/12/2024 · 3 min
In an increasingly interconnected digital world, RESTful APIs serve as the backbone of communication between systems. However, their openness also makes them a prime target for malicious actors. Securing a RESTful API is

26/12/2024 · 3 min
Common Weakness Enumeration (CWE) is a comprehensive repository of software weaknesses that provides a standardized taxonomy for developers, security analysts, and organizations. Developed and maintained by the [MITRE Cor

26/12/2024 · 4 min
In today's digital age, uptime monitoring has become essential for businesses and developers to ensure their websites, services, and applications remain available and reliable. Among the various tools available, **Uptime

26/12/2024 · 3 min
In today’s interconnected digital landscape, credential stuffing has emerged as a prevalent cybersecurity threat. This form of cyberattack exploits the growing issue of password reuse, targeting both individuals and organ

23/12/2024 · 3 min
In the realm of modern application deployment, developers often turn to platforms like Heroku, Netlify, and Vercel for their simplicity and efficiency. However, these services can become expensive or lack the control some

23/12/2024 · 3 min
CI/CD practices streamline software development by automating integration, testing, and deployment, leading to faster cycles, improved code quality, reduced risks, and enhanced collaboration, ultimately delivering value to customers more efficiently.

19/12/2024 · 4 min
Java is a statically typed programming language that supports both primitive data types and objects. While primitive types are fundamental to the language, their object equivalents—known as wrapper classes—are critical fo

19/12/2024 · 6 min
In today’s digital age, cybersecurity is paramount. As organizations increasingly rely on technology, identifying, quantifying, and mitigating vulnerabilities is crucial. Two critical tools in this effort are CVE (Common

11/12/2024 · 4 min
Database migrations are a critical aspect of managing evolving software applications. As the application grows, database schemas often need adjustments such as adding tables, modifying columns, or introducing indexes. **F

04/12/2024 · 5 min
PostgreSQL is a powerful and extensible relational database management system (RDBMS). It supports a wide range of data types that allow precise modeling of diverse information. Below is a detailed overview of PostgreSQL

01/12/2024 · 2 min
Glowroot is an open-source Application Performance Monitoring (APM) tool designed to monitor and analyze the performance of Java applications. Known for its simplicity, lightweight nature, and non-intrusive design, Glowro

29/11/2024 · 5 min
Spring Boot simplifies email sending by integrating JavaMail support through the **spring-boot-starter-mail** module.

25/11/2024 · 4 min
PostgreSQL is a powerful open-source relational database system that supports advanced data types, including **JSON** and **JSONB**. These types allow you to store and query semi-structured data efficiently, combining the

23/11/2024 · 3 min
Practical guide to configure and use Jsoup in a Spring Boot project to fetch and manipulate HTML data.

21/11/2024 · 3 min
The `pgcrypto` module in PostgreSQL provides cryptographic functions for encrypting and decrypting data. It supports both symmetric encryption (using a single key) and public-key encryption (using a pair of keys). It's pa