Posts

Tin Soldier

By Matthew Hunter |  Jan 7, 2026  |
Tin Soldier A dark reimagining of a timeless classic, where love defies the boundaries between metal and mortality. A one-legged tin soldier glimpses a beautiful one-legged lady in a distant castle and embarks on an impossible journey to reach her. But what begins as a romantic quest becomes a harrowing test of will, sacrifice, and the true meaning of love. Across treacherous forests, past fearsome creatures, and through encounters with dark magic, the soldier transforms himself—literally and spiritually—in pursuit of his impossible dream.

The Shadowmaze Campaign

By Matthew Hunter |  Jan 1, 2026  |
Welcome to the campaign log for the Shadowmaze. This dark and mysterious labyrinth holds many secrets, dangers, and hopefully, treasures. Follow the adventures of Bancroft, Wyz and his companions as they delve deeper into its depths. This section contains session reports, character notes, and other lore from our ongoing tabletop role-playing game campaign. Recent Adventures

Cyberleadership Program

By Matthew Hunter |  Oct 16, 2025  | isc2
This eight-week CyberLeadership program from the CyberLeadership Institute guides experienced security professionals to operate at executive level, ending with a practical board‑facing capstone project that simulates the presentation of a 2-year plan by an incoming CISO to the board. Each week focuses on a distinct leadership domain, and includes practical action items and templates to be incorporated into the capstone. The course offers 40 CPE towards renewing my CISSP. Week 1 — The role of a CISO Week 1 orients participants to the program and the cyber resilience mindset, and introduces the CISO role through lived experience and practical lessons.

GIAC Forensic Analyst

By Matthew Hunter |  Feb 3, 2025  | giac
I recently took and passed the GCFA certification exam for forensic analysis. It was an interesting and educational experience, touching on logfile analysis, memory forensics, deep filesystem analysis, and timeline generation. Most of the content focused on Windows (event logs, NTFS filesystem formats, etc); I’m looking forward to finding a matching course with a Linux focus.

CISSP

By Matthew Hunter |  Dec 1, 2024  | isc2
I recently took and passed the ISC2 CISSP. The certification covered a broad range of topics, most of which I was already familiar with from experience as a software engineer. Those areas I was less familiar with included legal and procedural requirements around risk assessment, physical security, and the theory behind encryption and permissions management.

Cisco Remote Scripts

By Matthew Hunter |  Oct 24, 2023  | computing
What I’ve been working on for a while now: Cisco Remote Scripts With the introduction of Remote Scripts powered by Orbital, a search and response feature of Cisco Secure Endpoint in either the Advantage or the Premier tier, incident responders can respond to sophisticated threats with minimal business disruption, and administrators can provide an overall safer and better user experience. Remote scripts harness the power of Orbital Advanced Search capabilities, which provides hundreds of prepared queries curated by Cisco’s Talos threat intelligence group, allowing you to quickly run complex queries on any endpoint.

Building_go_with_magefiles

By Matthew Hunter |  Jun 17, 2023  |
Go itself has a built-in set of tools for building go programs and running them. The dependencies and configuration are mostly handled automatically. This makes initial development fast and easy, but eventually, more complex requirements surface and require soome type of automation. I’ve seens lots of different approaches: My work uses a custom-built tool written in go to manage packaging, deployment, signing, etc. This works well but is a lot of effort to write and maintain for a small project, especially multiple small ptojects doing the same thing.

find -exec

By Matthew Hunter |  Apr 2, 2023  |
One very useful command for locating files and performing operations on them is find with the exec option. find [path] [arguments] -exec [command] {} ; I’ve found this to be particularly useful when adjusting permissions to allow group owners to list a directory: find [path] -type d -exec chmod g+x {} ; The part that’s tricky to remember is the escaped semicolon, hence this post. Applying it only to directories avoids issues with normal files being treated as executable.
About
Navigation