All Articles

Thoughts, write-ups, and explorations in cyber security.

Showing 39 articles

MARCH 25, 2026

PL/SQL Packages: Organizing Code in Real Systems

A short look at how PL/SQL packages keep related procedures, functions, and variables organized in one place.

Databases
Read article →
MARCH 23, 2026

Procedures vs Functions in PL/SQL

An easy comparison of PL/SQL procedures and functions, including what each one is used for and when to pick them.

Databases
Read article →
MARCH 21, 2026

Working with Variables in PL/SQL

A simple guide to PL/SQL variables, the data they hold, and how they help database code make decisions.

Databases
Read article →
MARCH 19, 2026

How PL/SQL Code Actually Runs: Understanding Blocks

A beginner-friendly explanation of PL/SQL blocks and how they structure logic, variables, and exceptions.

Databases
Read article →
MARCH 17, 2026

Why SQL Alone Is Not Enough (And Where PL/SQL Fits In)

A clear explanation of why SQL handles data well, but PL/SQL is needed when database work needs more logic.

Databases
Read article →
MARCH 15, 2026

nmap: The Network Mapper

A practical overview of how nmap finds hosts, scans ports, and helps map out systems on a network.

Networking
Read article →
MARCH 13, 2026

tcpdump: Packet Capture From the Command Line

A simple look at how tcpdump captures packets from the command line and why it is useful on remote systems.

Networking
Read article →
MARCH 11, 2026

Packet Analysis: Reading the Wire

A beginner-friendly introduction to packet analysis and what captured traffic can reveal about real network behavior.

Networking
Read article →
MARCH 9, 2026

Getting Started with Wireshark

An introduction to Wireshark and how it turns live packet captures into something easier to read and follow.

Networking
Read article →
MARCH 7, 2026

ICMP: More Than Just Ping

A simple explanation of ICMP, from ping basics to the wider role it plays in troubleshooting networks.

Networking
Read article →
MARCH 5, 2026

DNS Explained: How the Internet Finds Hostnames

A straightforward look at how DNS turns hostnames into IP addresses so the internet can route traffic correctly.

Networking
Read article →
MARCH 3, 2026

How DHCP Works: Automatic IP Address Assignment

A simple breakdown of how DHCP automatically gives devices IP addresses and keeps network setup manageable.

Networking
Read article →
MARCH 1, 2026

ARP: Bridging IP Addresses and MAC Addresses

A clear explanation of how ARP matches IP addresses to MAC addresses so devices can communicate locally.

Networking
Read article →
FEBRUARY 27, 2026

Understanding TCP/IP: How Connections Are Built and Broken

A simple guide to how TCP/IP handles addressing, delivery, and the basic flow of network communication.

Networking
Read article →
FEBRUARY 25, 2026

Linux File Systems and Storage: Permissions, Links, and Disk Analysis

A hands-on look at Linux permissions, links, and storage tools used to understand filesystems and disk usage.

Linux
Read article →
FEBRUARY 23, 2026

Linux Processes Continued: Deadlocks, Pipes, and Memory Monitoring

A follow-up Linux process guide covering deadlocks, pipes, and basic ways to watch memory use.

Linux
Read article →
FEBRUARY 21, 2026

Linux Process States, Zombie Processes, Orphan Processes, and Pipes

An introduction to Linux process states, zombie and orphan processes, and simple process communication.

Linux
Read article →
FEBRUARY 19, 2026

Using Group Policy for Security Hardening and Auditing

A practical look at how Group Policy can harden Windows systems, enforce rules, and support auditing.

Windows
Read article →
FEBRUARY 18, 2026

Active Directory in Practice: Users, Passwords, and Real Admin Tasks

A practical look at everyday Active Directory admin tasks like managing users, passwords, computers, and policies.

Windows
Read article →
FEBRUARY 17, 2026

Centralized Patch Management with WSUS and Group Policy

An overview of how WSUS and Group Policy help centralize updates and keep Windows systems patched.

Windows
Read article →
FEBRUARY 16, 2026

Active Directory Basics: How Windows Networks Actually Work

A simple explanation of domains, domain controllers, OUs, and the core ideas behind Active Directory.

Windows
Read article →
FEBRUARY 15, 2026

PowerShell for DHCP, DNS, and Print Server Security

A practical look at using PowerShell to configure and secure DHCP, DNS, and print services.

PowerShell
Read article →
FEBRUARY 13, 2026

Building a CPU Monitoring Agent in PowerShell

A walkthrough of building a PowerShell script that tracks CPU usage, logs events, and reacts automatically.

PowerShell
Read article →
FEBRUARY 11, 2026

What Reverse Engineers Look for First in a Binary

A readable guide to the first clues reverse engineers look for when they begin analyzing a binary.

Reverse Engineering
Read article →
FEBRUARY 10, 2026

Understanding How Debuggers Help You Read a Program (Using Immunity Debugger)

A simple explanation of how debuggers help you step through code, inspect state, and understand behavior.

Reverse Engineering
Read article →
FEBRUARY 9, 2026

Why Ghidra Makes Binaries Easier to Understand

A simple look at why Ghidra makes reverse engineering easier by making binary structure easier to read.

Reverse Engineering
Read article →
FEBRUARY 8, 2026

How Memory and Program Flow Work Inside a Running Program

A simple explanation of memory layout, control flow, and what is happening while a program runs.

Reverse Engineering
Read article →
FEBRUARY 7, 2026

Understanding SQL Injection: From Attack to Defence

A practical breakdown of how SQL injection works, why it is dangerous, and how safer queries stop it.

Web Security
Read article →
FEBRUARY 6, 2026

Understanding Cloud Computing: From On-Premise to the Cloud

A beginner-friendly explanation of cloud computing and how it compares to running systems on-premise.

Cloud
Read article →
FEBRUARY 6, 2026

Understanding CSRF: When a Website Tricks Your Browser

A simple explanation of CSRF, how it abuses trusted browser sessions, and how websites defend against it.

Web Security
Read article →
FEBRUARY 5, 2026

How Programs Really Run: A Simple Look Inside Software

A simple look at what happens behind the scenes when software is loaded and run on a computer.

Software
Read article →
FEBRUARY 4, 2026

Phishing: How Attackers Trick Users Into Giving Access

A simple guide to how phishing works, why it succeeds so often, and the warning signs that help spot it.

Web Security
Read article →
FEBRUARY 3, 2026

Setting Up a Home Lab for Penetration Testing

A practical guide to building a safe home lab for security practice using virtual machines and test networks.

Networking
Read article →
FEBRUARY 2, 2026

Cross-Site Scripting (XSS): Injecting Code Into a Website

A clear explanation of XSS, how injected scripts reach the browser, and the basic ways to prevent it.

Web Security
Read article →
FEBRUARY 1, 2026

AES-256 Explained: Why Symmetric Encryption Matters

A straightforward explanation of AES-256 and why symmetric encryption still matters in modern security.

Cryptography
Read article →
JANUARY 31, 2026

Broken Authentication: When Login Systems Fail

A simple look at broken authentication and how small login weaknesses can lead to account takeover.

Web Security
Read article →
JANUARY 30, 2026

Encryption vs Hashing: What's the Difference?

A simple comparison of encryption and hashing, what each one is for, and why mixing them up causes problems.

Cryptography
Read article →
JANUARY 29, 2026

IDOR: Accessing Data You Should Not See

A simple explanation of IDOR, how changing IDs can expose data, and why authorization checks matter.

Web Security
Read article →
JANUARY 28, 2026

How Passwords Are Actually Stored (Hashing Explained)

A simple explanation of how passwords are stored more safely with hashing, salt, and slower algorithms.

Cryptography
Read article →