Welcome to the blog
This is the first post on the refreshed site — a place for learning in public as I explore systems and cybersecurity.
You’ll see short write-ups on labs I’m running, tools I’m trying, and things I got wrong before I got them right. If a post includes commands or config, it’ll look something like this:
# Example: always verify what a snippet does before you run it
whoami
uname -a
Thanks for reading. The next posts will be less meta and more hands-on.