Starting in early 2025, I intend to use this blog to document some of the things I learn as I go about my job. The bulk of the posts will be focused on configuration gaps, abuses, and/or manipulations that a threat actor could leverage or introduce in a Linux environment.