2025 Year in Review
2026-02-14
2025 was a year of growth, exhaustion, and distant horizons. I still love being an engineer, but I've realized it's time to start growing for myself.
1135 words
|
6 minutes
How to Conduct a Phishing Simulation Exercise
2025-12-19
Under the premise of legal authorization, phishing simulations are a vital means of assessing an organization's security awareness and defensive capabilities. This article systematically outlines the methodology and practical approach for a standardized, safe, and controlled phishing exercise conducted in 2025, covering information gathering, attack surface analysis, site cloning, platform selection, and data collection.
1026 words
|
5 minutes
(Cybersecurity Tools Vol.2) testssl — Comprehensive SSL/TLS Security Testing for Your Site
2025-12-15
Using testssl.sh to perform comprehensive compliance and security audits on site SSL/TLS configurations.
367 words
|
2 minutes
From Zero to Production:An Engineer's Journal on Building a Mini-IDC
2025-11-17
A deep dive into a 'wild data center' architecture—built with decommissioned servers, 10G fiber optics, enterprise-grade broadband, and custom tunnels. For the past six months, it has reliably hosted automated backups, off-site NAS synchronization, databases, and code repositories, proving that high availability is achievable on a budget.
685 words
|
3 minutes
Weekend Getaway in Kinmen
2025-11-03
Not to escape life, but to rediscover its warmth.
865 words
|
4 minutes
(Cybersecurity Training Vol.1)Security in the Era of Artificial Intelligence
2025-11-03
Training is a cornerstone of the cybersecurity industry. Over time, I have developed a wide range of training presentations, stemming from both professional projects and personal interests. Guided by the principle 'Originate from work, excel through sharing,' I believe that knowledge should not be kept in isolation. I am launching this series to publicly share my PPTs, hoping to support your learning journey.
170 words
|
1 minute
Information Leakage — A Responsibility Software Vendors Must Shoulder
2025-10-16
Behind the frequent occurrence of information leaks lies a continuous blurring of privacy boundaries. Developer negligence, institutional apathy, and user compromise weave a 'naked' digital world. Security has long ceased to be a purely technical issue.
1012 words
|
5 minutes
(Cybersecurity Tools Vol.1) Kscan — A High-Performance Golang Security Scanner
2025-10-14
A practical quick-start guide to Kscan: installation, essential commands, use cases, and best practices.
777 words
|
4 minutes