Passion, opinion, questions, chaos. It’s all here.

A single VLAN misconfiguration triggered a full network blackout in my home lab—no router, no hypervisor, no recovery. Even Kali Linux couldn’t save me. But this wasn’t just a technical failure—it was a masterclass in resilience, disaster recovery, and applying CISSP principles in real time. As I prepare for my CISSP exam (Winter 2025), I’m…

A multi-NIC VM in my home lab became unreachable from some VLANs due to asymmetric routing—replying via the wrong interface and triggering security drops. Implementing policy-based routing fixed this by ensuring responses use the same path they arrived on, maintaining strict security without disabling protections like reverse path filtering. This reinforced key CISSP principles like…

After setting up VLANs for a segmented network, I learned the hard way how neglecting DHCP snooping can lead to unexpected IP allocation issues. By properly configuring DHCP snooping, I ensured the network’s security and stability. This experience reinforced the importance of validating every configuration to prevent small mistakes from turning into major issues.

The PowerSchool breach affecting River East Transcona School Division highlights critical failures in cybersecurity and raises urgent questions about the lessons we’re teaching the next generation about digital responsibility.

As a network security grad student, I know the importance of digital privacy. Here are five budget-friendly tips to protect your data: use strong passwords, enable two-factor authentication, keep software updated, use a VPN, and be cautious with personal information. Stay cyber-safe with these easy strategies!

A dedicated macOS user, I rely on my MacBook Air despite owning a Microsoft Surface Book 2 and a Gaming PC. The challenge of limited app availability on M1 chips led me to find solutions that work on macOS with Windows backup. Studying Network Security, I explore C programming with GCC and Visual Studio Code.…