Blog
I also post some of my security research.
The Rise of DeepSeek
Introduction In the fast-paced world of artificial intelligence, a new player has emerged from China, sending shockwaves across the tech industry and financial markets. DeepSeek, an AI model devel...
How Kerberos Works (Part 2)
Today, I’ll dive into Kerberos in detail. If you haven’t read my previous post about how Kerberos works on a high level, check it out here. How Kerberos Works Here’s a diagram of the entire Kerber...
How Kerberos Works (Part 1)
Introduction Authentication is a critical part of keeping networks secure. Kerberos, a protocol that’s been around since the 1980s, is still a key player in today’s enterprise environments. Though...
Hello World!
Hello! Welcome to my website! I’m thrilled to have you here. This website is where I share my thoughts, projects, and updates on various topics like cybersecurity and Information Technology. Whet...