blog

static/img/blog_imgs/May_18_2025_09_21_31_PM_optimized.png
The 2008 Nitroba University Harassment Scenario is the second case in my digital forensics series, sourced from Digital Corpora. It’s a mock investigation involving a fictional harassment complaint at a university, where I examined a disk image to uncover digital evidence. This case was especially exciting because it gave me the opportunity to use Wireshark again to analyze captured network traffic. It provided a great hands-on challenge in applying real forensic techniques to a simulated but realistic situation.
static/img/blog_imgs/ChatGPT_Image_May_18_2025_12_29_18_AM_optimized.png
This is my first digital forensics report, based on the Jean M57 case from Digital Corpora. Using Autopsy on Kali Linux, I analyzed a Windows XP disk image to determine when a sensitive spreadsheet was created, how it left the system, and who was involved. This report is part of an ongoing series exploring practical forensic investigations.
static/img/blog_imgs/tpp_thumbnail.png
I learned how to make a simple Twitch Plays Pokemon script! The script allows users to type commands in Twitch chat during a livestream to control the game.
static/img/blog_imgs/tcp-chat-server-cover.jpg
While documenting my exploration of cybersecurity fundamentals, I've embarked on creating practical projects. As part of this journey, I've started building a TCP chat server in Python. Currently, it facilitates unsecured communication, but I'm eager to delve into interception methods and fortify it with robust security measures in the future.
static/img/blog_imgs/contactmeformcover.jpg
This tutorial guides you through creating a "contact me" form for Django web apps. With Google Mail SMTP integration and Django Simple Captcha, we ensure secure communication and prevent spam.
static/img/blog_imgs/intro-to-tcp-udp-cover.jpg
This post delves into setting up TCP and UDP servers, marking the first step in my cybersecurity project journey. Exploring fundamental network communication concepts, it offers practical examples and underscores their importance in cybersecurity sandbox environments.