This blog’s a mix of what I love—cyber security, tech, design, drones, and whatever else grabs my attention. Sometimes it’s deep, sometimes it’s random, always real. I write about what matters to me, what I’m curious about, and what I feel like unpacking.
Passion, opinion, questions, chaos. It’s all here.

A single VLAN misconfiguration triggered a full network blackout in my home lab—no router, no hypervisor, no recovery. Even Kali Linux couldn’t save me. But this wasn’t just a technical failure—it was a masterclass in resilience, disaster recovery, and applying CISSP principles in real time. As I prepare for my CISSP exam (Winter 2025), I’m…

Qantas cut executive short‑term bonuses by 15% after a cyberattack affecting ~5.7 million customers — a move that redirects the message toward accountability rather than optics.

A multi-NIC VM in my home lab became unreachable from some VLANs due to asymmetric routing—replying via the wrong interface and triggering security drops. Implementing policy-based routing fixed this by ensuring responses use the same path they arrived on, maintaining strict security without disabling protections like reverse path filtering. This reinforced key CISSP principles like…

Troubleshooting complex network issues on a home NAS can be frustrating, especially when VLANs, firewall rules, and SMB services all interplay. In this post, I walk through diagnosing connectivity problems between VLANs and a TrueNAS server, fixing permission errors with Samba, and configuring firewall rules to allow seamless SMB access — all without exposing sensitive…

Encountered a GPG key error while updating your Kali Linux package lists? This step-by-step guide will help you fix the issue by updating the repository GPG key. Follow along to resolve the error and securely update your packages.

After setting up VLANs for a segmented network, I learned the hard way how neglecting DHCP snooping can lead to unexpected IP allocation issues. By properly configuring DHCP snooping, I ensured the network’s security and stability. This experience reinforced the importance of validating every configuration to prevent small mistakes from turning into major issues.

The PowerSchool breach affecting River East Transcona School Division highlights critical failures in cybersecurity and raises urgent questions about the lessons we’re teaching the next generation about digital responsibility.

If you’re noticing blurry images in your WordPress Cover blocks, the issue may lie in WordPress’s default handling of image scaling. Discover how using background-image instead of tags in Cover blocks can create sharp, high-res images across all screen sizes.

As a network security grad student, I know the importance of digital privacy. Here are five budget-friendly tips to protect your data: use strong passwords, enable two-factor authentication, keep software updated, use a VPN, and be cautious with personal information. Stay cyber-safe with these easy strategies!

In cybersecurity, AI holds both promise and peril. Tools like ChatGPT offer convenience but also raise red flags. Requesting code to disable WiFi might yield a functional script capable of breaching security. This highlights the ethical tightrope cybersecurity professionals must walk, balancing innovation with integrity to safeguard digital landscapes from exploitation.