Writing
All Articles
Thoughts, write-ups, and explorations in cyber security.
Showing 39 articles
PL/SQL Packages: Organizing Code in Real Systems
A short look at how PL/SQL packages keep related procedures, functions, and variables organized in one place.
Read article →Procedures vs Functions in PL/SQL
An easy comparison of PL/SQL procedures and functions, including what each one is used for and when to pick them.
Read article →Working with Variables in PL/SQL
A simple guide to PL/SQL variables, the data they hold, and how they help database code make decisions.
Read article →How PL/SQL Code Actually Runs: Understanding Blocks
A beginner-friendly explanation of PL/SQL blocks and how they structure logic, variables, and exceptions.
Read article →Why SQL Alone Is Not Enough (And Where PL/SQL Fits In)
A clear explanation of why SQL handles data well, but PL/SQL is needed when database work needs more logic.
Read article →nmap: The Network Mapper
A practical overview of how nmap finds hosts, scans ports, and helps map out systems on a network.
Read article →tcpdump: Packet Capture From the Command Line
A simple look at how tcpdump captures packets from the command line and why it is useful on remote systems.
Read article →Packet Analysis: Reading the Wire
A beginner-friendly introduction to packet analysis and what captured traffic can reveal about real network behavior.
Read article →Getting Started with Wireshark
An introduction to Wireshark and how it turns live packet captures into something easier to read and follow.
Read article →ICMP: More Than Just Ping
A simple explanation of ICMP, from ping basics to the wider role it plays in troubleshooting networks.
Read article →DNS Explained: How the Internet Finds Hostnames
A straightforward look at how DNS turns hostnames into IP addresses so the internet can route traffic correctly.
Read article →How DHCP Works: Automatic IP Address Assignment
A simple breakdown of how DHCP automatically gives devices IP addresses and keeps network setup manageable.
Read article →ARP: Bridging IP Addresses and MAC Addresses
A clear explanation of how ARP matches IP addresses to MAC addresses so devices can communicate locally.
Read article →Understanding TCP/IP: How Connections Are Built and Broken
A simple guide to how TCP/IP handles addressing, delivery, and the basic flow of network communication.
Read article →Linux File Systems and Storage: Permissions, Links, and Disk Analysis
A hands-on look at Linux permissions, links, and storage tools used to understand filesystems and disk usage.
Read article →Linux Processes Continued: Deadlocks, Pipes, and Memory Monitoring
A follow-up Linux process guide covering deadlocks, pipes, and basic ways to watch memory use.
Read article →Linux Process States, Zombie Processes, Orphan Processes, and Pipes
An introduction to Linux process states, zombie and orphan processes, and simple process communication.
Read article →Using Group Policy for Security Hardening and Auditing
A practical look at how Group Policy can harden Windows systems, enforce rules, and support auditing.
Read article →Active Directory in Practice: Users, Passwords, and Real Admin Tasks
A practical look at everyday Active Directory admin tasks like managing users, passwords, computers, and policies.
Read article →Centralized Patch Management with WSUS and Group Policy
An overview of how WSUS and Group Policy help centralize updates and keep Windows systems patched.
Read article →Active Directory Basics: How Windows Networks Actually Work
A simple explanation of domains, domain controllers, OUs, and the core ideas behind Active Directory.
Read article →PowerShell for DHCP, DNS, and Print Server Security
A practical look at using PowerShell to configure and secure DHCP, DNS, and print services.
Read article →Building a CPU Monitoring Agent in PowerShell
A walkthrough of building a PowerShell script that tracks CPU usage, logs events, and reacts automatically.
Read article →What Reverse Engineers Look for First in a Binary
A readable guide to the first clues reverse engineers look for when they begin analyzing a binary.
Read article →Understanding How Debuggers Help You Read a Program (Using Immunity Debugger)
A simple explanation of how debuggers help you step through code, inspect state, and understand behavior.
Read article →Why Ghidra Makes Binaries Easier to Understand
A simple look at why Ghidra makes reverse engineering easier by making binary structure easier to read.
Read article →How Memory and Program Flow Work Inside a Running Program
A simple explanation of memory layout, control flow, and what is happening while a program runs.
Read article →Understanding SQL Injection: From Attack to Defence
A practical breakdown of how SQL injection works, why it is dangerous, and how safer queries stop it.
Read article →Understanding Cloud Computing: From On-Premise to the Cloud
A beginner-friendly explanation of cloud computing and how it compares to running systems on-premise.
Read article →Understanding CSRF: When a Website Tricks Your Browser
A simple explanation of CSRF, how it abuses trusted browser sessions, and how websites defend against it.
Read article →How Programs Really Run: A Simple Look Inside Software
A simple look at what happens behind the scenes when software is loaded and run on a computer.
Read article →Phishing: How Attackers Trick Users Into Giving Access
A simple guide to how phishing works, why it succeeds so often, and the warning signs that help spot it.
Read article →Setting Up a Home Lab for Penetration Testing
A practical guide to building a safe home lab for security practice using virtual machines and test networks.
Read article →Cross-Site Scripting (XSS): Injecting Code Into a Website
A clear explanation of XSS, how injected scripts reach the browser, and the basic ways to prevent it.
Read article →AES-256 Explained: Why Symmetric Encryption Matters
A straightforward explanation of AES-256 and why symmetric encryption still matters in modern security.
Read article →Broken Authentication: When Login Systems Fail
A simple look at broken authentication and how small login weaknesses can lead to account takeover.
Read article →Encryption vs Hashing: What's the Difference?
A simple comparison of encryption and hashing, what each one is for, and why mixing them up causes problems.
Read article →IDOR: Accessing Data You Should Not See
A simple explanation of IDOR, how changing IDs can expose data, and why authorization checks matter.
Read article →How Passwords Are Actually Stored (Hashing Explained)
A simple explanation of how passwords are stored more safely with hashing, salt, and slower algorithms.
Read article →