So you’ve decided to dive into the glorious chaos that is network and cybersecurity engineering. And now you’re asking yourself: “Should I get a new laptop?”“Do I need triple monitors?”“Would an RGB keyboard help me hack faster?” Let’s clear that up real quick. A New Computer Just Looks Cool — That’s It Listen, a shiny new computer, ultrawide monitors, and

Read More

During a study break — between subnetting practice and scripting firewall rules (because, yes, I’m trying to become a network and cybersecurity engineer) — I ended up scrolling through old photos of the Philippines. Escolta in its prime. Manila with actual public transport that worked. Filipinos dressed sharp, moving with purpose. It didn’t just feel nostalgic — it felt tragic.

Read More

Let’s face it: learning tech is like trying to teach a cat to use a printer. It’s chaotic, confusing, and occasionally the printer catches fire (metaphorically… we hope). But if you’re a brave soul venturing into the wild world of Linux, cybersecurity, networking, or just want to run five operating systems at once like some kind of digital wizard—VirtualBox is

Read More

As an Ubuntu learner on the noble self-study path, I picked up a tech book that promised enlightenment. A clean path to Linux mastery. Commands, checklists, cheerful screenshots. But within 15 minutes, I realized something was missing. A soul. And more importantly:A “What Can Go Wrong?” page. Because let’s be honest—Ubuntu doesn’t break if. It breaks when, and usually in

Read More

Let me tell you about my on-again, off-again, therapy-worthy relationship with Ubuntu Linux. It’s like being with someone super smart, mysterious, kind of hot (in a nerdy way), but also emotionally unavailable and occasionally deletes your stuff without warning. At First, It Was All Butterflies and Bash The first time I installed Ubuntu, I felt like I’d joined a secret

Read More

So here I am—on a noble quest to become a network and cybersecurity engineer. A digital knight, if you will, except instead of a sword, I wield Wireshark and Python scripts, and instead of dragons, I fight NAT issues and firewall configs that mysteriously delete themselves. And you know what makes this whole journey survivable (and kinda fun)? Two unlikely

Read More