Nov 7, 2025
10 min read
My Hugo Site
(#10 of 10)
How I use GitHub Actions to build and deploy my Hugo site to GitHub Pages. This is my first real CI/CD pipeline.
Oct 20, 2025
4 min read
How I fixed the issue with non-intel trasceiver not working with Intel X520 network card. Intel trying to be smart and how to tell the card to get over itself.
Oct 12, 2025
8 min read
Testing out some hugo internal image render hooks and to what extent custom styling can be added to images
Oct 11, 2025
6 min read
My Hugo Site
(#9 of 10)
How I organise, reference, and render images in my Hugo site using page bundles, the static folder, and shortcodes. Use standard markdown or extended attributes.
Oct 9, 2025
4 min read
My Hugo Site
(#8 of 10)
How I made external links open in a new tab, added security attributes and appended an icon, without touching Markdown content
Oct 2, 2025
5 min read
My Hugo Site
(#7 of 10)
In implementing a list pagination feature for my site, I pivoted from complex custom code to using Hugo’s robust built-in template. This saved development time, which was better spent styling the default HTML output with custom CSS.
Sep 27, 2025
6 min read
My Hugo Site
(#6 of 10)
Getting breadcrumbs to work using Hugo shortcodes is doable with some effort and a lot of CSS. But it might not work as expected. Let me explain
Sep 25, 2025
6 min read
My Hugo Site
(#5 of 10)
This is how I display the four most recent articles as styled cards on the homepage by extend Hugo functionality using custom shortcodes and calling them in markdown files and CSS.
Sep 9, 2025
3 min read
Introduction to Cyber Security
(#17 of 17)
This article looks CIRP beyond being a reactive plan and implementing it is a measurable and proactive component of a security strategy. It outlines how a CIRP reduces the impact of a breach and discusses key metrics for continuous improvement.
Sep 2, 2025
4 min read
Introduction to Cyber Security
(#16 of 17)
Exploring in more detail the different types of discrepancies that can undermine control effectiveness, including issues with implementation, training, and a changing threat landscape. It provides practical insights into how to detect these gaps and offers a clear, action-oriented remediation checklist to ensure continuous improvement in cybersecurity defences.