Skip to main content

Posts

Wi-Fi: How It Works, Security, and Best Practices
The article introduces Wi-Fi, how it works, and its main security risks. It also gives tips to protect networks, such as using WPA3 and strong passwords.
Building a Complete CI/CD Pipeline: Introduction
Step-by-step explanation of a full CI/CD pipeline, illustrated with my self-hosted homelab setup.
Path Dependency: How Yesterday’s Choices Shape Tomorrow’s Risks
Path dependency shows how past decisions influence current architectures, governance, and security strategies, and why awareness is critical for building a safer, more adaptable future.