Articles
Sharing my insights, projects, thoughts, and experiences

Deploying my own website on a home server
Step-by-step guide to self-hosting a Next.js site on a Raspberry Pi with Nginx, SSL, and systemd. Learn how I deployed my portfolio on a £35 home server instead of paying for cloud hosting.

Supporting students as a computer lab assistant
How teaching network security and penetration testing to university students sharpened my ability to explain complex technical concepts to diverse audiences—essential skills for fraud prevention and financial crime analysis.

Competing at the UK Cyber Leaders Challenge
Competing in a national cybersecurity challenge where I designed response strategies for a port cyberattack and presented our solution to government judges. Learned to think like a security professional while communicating with non-technical decision-makers.

Installing Arch Linux on Raspberry Pi 5 and fixing HDMI issues
Installing Arch Linux on Raspberry Pi 5 isn't officially supported yet. Here's how I worked around U-Boot incompatibilities and fixed the HDMI display issue that left me with a booting system but no video output.

Synthetic identities and financial crime
Synthetic identity fraud combines real and fake information to create entirely new identities. Explore how this fast-growing financial crime works and the detection strategies used to catch it.

AML detection in blockchain systems
My final-year project building an ML-powered AML detection system for blockchain networks. Developed algorithms to identify money laundering patterns across Ethereum and TRON transactions.

Network segmentation with VLANs to limit lateral movement
Redesigned a flat network into segmented VLANs to stop attackers from moving laterally. Used router-on-a-stick and ACLs to isolate users, servers, guests, and IoT devices—turning a compromised workstation into a contained threat.

Designing a network security architecture for multiple offices
Coursework project designing a multi-branch network architecture with VPN tunnels, DHCP, NAT, and security policies. Built the complete design in Cisco Packet Tracer to connect offices across the UK.

From Data to Action: Building Fraud Risk Metrics
Building fraud risk metrics that actually drive decisions. Learn how to create BCIs and KRIs that transform raw data into actionable insights for fraud prevention teams.

Acquiring Fraud: Detection and Prevention Strategies
Acquiring fraud targets merchants and payment processors directly. Learn how fraudsters exploit payment systems and the detection strategies used to protect businesses.

Analysing Fraud Patterns: A Data-Driven Approach
Using SQL, Python, and data visualization to hunt for fraud patterns. A data-driven approach to building detection models and uncovering suspicious activity.

Understanding money laundering techniques in digital banking
Exploring how money launderers exploit digital banking through fanout, layering, and mixing patterns—and the detection methods used to identify suspicious transaction flows.

The evolution of issuing fraud in fintech
How card fraud has evolved from simple skimming to sophisticated fintech attacks. Explore the changing threat landscape and modern detection strategies.

Understanding the OWASP Top 10 security risks
Understanding the OWASP Top 10—the most critical web application security risks every developer should know, from injection attacks to broken authentication.

Getting started with penetration testing
A beginner-friendly introduction to penetration testing, covering the fundamentals, essential tools, and how to get started with ethical hacking.

Presenting penetration testing findings to non-technical clients
Security Testing coursework where I performed a penetration test and learned to present technical vulnerabilities to non-technical clients using analogies and business impact—essential skills for fraud prevention and risk communication.
Building a network scanner tool
Building a Python network scanner tool for security assessments, featuring port scanning, service detection, and vulnerability assessment capabilities.
Web application security audit framework
A practical framework for conducting security audits of web applications, covering methodology, tools, and best practices for identifying vulnerabilities.