Chapter 3. Using alt-java and java

3.1. Using alt-java

Use “alt-java” for any applications that run untrusted code. However, be aware that it is not a solution to all speculative execution vulnerabilities. For more information refer, Java and Speculative Execution Vulnerabilities.

3.2. Using java

Use the “java” binary for performance-critical tasks in a secure environment. All of the RPMs in a Red Hat Enterprise Linux system except IcedTea-Web use the “java” binary. IcedTea-Web may be used to run untrusted code, so it uses ”alt-java” as its launcher.