
Welcome to my cybersecurity blog
I’m a technical content creator specializing in cybersecurity. My work covers everything from vulnerability management and password security to Linux hardening, all backed by hands-on experimentation in my home lab. I turn complex security concepts into clear, actionable guides so readers can follow along and apply them in their own environments.
Here are two of my most recent posts:
-

Terminal Tales: PAM Like a Pro. Lock yourself out of your Linux machine, then get back in.
Introduction Welcome to the fortress gate of your Linux box: PAM. This framework silently guards every login, sudo attempt, SSH…
-

Terminal Tales: Securing The User Jungle. A Practical Guide To Linux Account Hardening
This post is part of a Linux Security Blog Series. [View the full series here.] Introduction Before you start patching…
