Articles

Articles

Sharing my insights, projects, thoughts, and experiences

Deploying my own website on a home server
project4 January 2026
Next.jsRaspberry Pi

Deploying my own website on a home server

Step-by-step guide to self-hosting a Next.js site on a Raspberry Pi with Nginx, SSL, and systemd. Learn how I deployed my portfolio on a £35 home server instead of paying for cloud hosting.

Demo →
Supporting students as a computer lab assistant
experience30 December 2025
Presentation SkillsNetwork Security

Supporting students as a computer lab assistant

How teaching network security and penetration testing to university students sharpened my ability to explain complex technical concepts to diverse audiences—essential skills for fraud prevention and financial crime analysis.

Competing at the UK Cyber Leaders Challenge
experience3 February 2025
Network SecuritySolution Design

Competing at the UK Cyber Leaders Challenge

Competing in a national cybersecurity challenge where I designed response strategies for a port cyberattack and presented our solution to government judges. Learned to think like a security professional while communicating with non-technical decision-makers.

Installing Arch Linux on Raspberry Pi 5 and fixing HDMI issues
project15 January 2025
LinuxRaspberry Pi

Installing Arch Linux on Raspberry Pi 5 and fixing HDMI issues

Installing Arch Linux on Raspberry Pi 5 isn't officially supported yet. Here's how I worked around U-Boot incompatibilities and fixed the HDMI display issue that left me with a booting system but no video output.

Synthetic identities and financial crime
article9 September 2025
Synthetic IdentityIdentity Fraud

Synthetic identities and financial crime

Synthetic identity fraud combines real and fake information to create entirely new identities. Explore how this fast-growing financial crime works and the detection strategies used to catch it.

AML detection in blockchain systems
project2 October 2025
AMLMachine Learning

AML detection in blockchain systems

My final-year project building an ML-powered AML detection system for blockchain networks. Developed algorithms to identify money laundering patterns across Ethereum and TRON transactions.

Network segmentation with VLANs to limit lateral movement
project30 April 2025
Network SecurityNetwork Segmentation

Network segmentation with VLANs to limit lateral movement

Redesigned a flat network into segmented VLANs to stop attackers from moving laterally. Used router-on-a-stick and ACLs to isolate users, servers, guests, and IoT devices—turning a compromised workstation into a contained threat.

Designing a network security architecture for multiple offices
project15 November 2025
Network SecuritySolution Design

Designing a network security architecture for multiple offices

Coursework project designing a multi-branch network architecture with VPN tunnels, DHCP, NAT, and security policies. Built the complete design in Cisco Packet Tracer to connect offices across the UK.

From Data to Action: Building Fraud Risk Metrics
article20 September 2025
Risk MetricsBCIs

From Data to Action: Building Fraud Risk Metrics

Building fraud risk metrics that actually drive decisions. Learn how to create BCIs and KRIs that transform raw data into actionable insights for fraud prevention teams.

Acquiring Fraud: Detection and Prevention Strategies
article5 September 2025
Acquiring FraudMerchant Fraud

Acquiring Fraud: Detection and Prevention Strategies

Acquiring fraud targets merchants and payment processors directly. Learn how fraudsters exploit payment systems and the detection strategies used to protect businesses.

Analysing Fraud Patterns: A Data-Driven Approach
article2 September 2025
Fraud DetectionData Analysis

Analysing Fraud Patterns: A Data-Driven Approach

Using SQL, Python, and data visualization to hunt for fraud patterns. A data-driven approach to building detection models and uncovering suspicious activity.

Understanding money laundering techniques in digital banking
article20 August 2025
Money LaunderingAML

Understanding money laundering techniques in digital banking

Exploring how money launderers exploit digital banking through fanout, layering, and mixing patterns—and the detection methods used to identify suspicious transaction flows.

The evolution of issuing fraud in fintech
article28 July 2025
Issuing FraudCard Fraud

The evolution of issuing fraud in fintech

How card fraud has evolved from simple skimming to sophisticated fintech attacks. Explore the changing threat landscape and modern detection strategies.

Understanding the OWASP Top 10 security risks
article9 May 2025
Network SecurityWeb Security

Understanding the OWASP Top 10 security risks

Understanding the OWASP Top 10—the most critical web application security risks every developer should know, from injection attacks to broken authentication.

Getting started with penetration testing
article1 May 2025
Network SecurityPenetration Testing

Getting started with penetration testing

A beginner-friendly introduction to penetration testing, covering the fundamentals, essential tools, and how to get started with ethical hacking.

Presenting penetration testing findings to non-technical clients
project15 November 2024
Presentation SkillsSecurity Testing

Presenting penetration testing findings to non-technical clients

Security Testing coursework where I performed a penetration test and learned to present technical vulnerabilities to non-technical clients using analogies and business impact—essential skills for fraud prevention and risk communication.

Building a network scanner tool
project10 January 2024
Network SecurityPython

Building a network scanner tool

Building a Python network scanner tool for security assessments, featuring port scanning, service detection, and vulnerability assessment capabilities.

GitHub →
Web application security audit framework
project5 January 2024
Security TestingSolution Design

Web application security audit framework

A practical framework for conducting security audits of web applications, covering methodology, tools, and best practices for identifying vulnerabilities.

GitHub →