Blog
Welcome to the Blog.
C:\ After Midnight: A DOS Chronicle
2026-02-22
There is a particular blue that only old screens know how to make. Not sky blue, not electric blue, not any brand color from modern design systems. It is the blue of waiting, the blue of discipline, the blue of possibility. It is the blue that appears when a machine, after clearing its throat with a POST beep, hands you a bare prompt and says: now it is your turn.
C:\> ... continue
Building Repeatable Triage Kits
2026-02-22
Security triage often fails for a boring reason: every analyst starts from a different local setup. Different aliases, different tool versions, different output assumptions, different artifact paths. The result is inconsistent decisions and hard-to-compare findings.
A repeatable triage kit solves this by packaging workflow, not just binaries. ... continue
Benchmarking with a Stopwatch
2026-02-22
When people imagine benchmarking, they picture automated harnesses, high-resolution timers, and dashboards with percentile charts. Useful tools, absolutely. But many core lessons of performance engineering can be learned with much humbler methods, including one old trick from retro workflows: benchmarking with a stopwatch and disciplined procedure.
On vintage systems, instrumentation was often limited, intrusive, or unavailable. So users built practical measurement habits with what they had: ... continue
Assumption-Led Security Reviews
2026-02-22
Many security reviews fail before they begin because they are framed as checklist compliance rather than assumption testing. Checklists are useful for coverage. Assumptions are where real risk hides.
Every system has assumptions: ... continue
Archive Discipline for the Floppy Era
2026-02-22
People remember floppy disks as inconvenience, but they were also a strict training ground for information discipline. Limited capacity, media fragility, and transfer friction forced users to become intentional about naming, versioning, verification, and recovery. Those habits remain useful even in cloud-heavy workflows.
A floppy-era archive was never just “copy files somewhere.” It was an operating procedure: ... continue