Blog

  • Welcome to My Tech Notes — Where Curiosity Meets Cybersecurity

    Welcome to My Tech Notes — Where Curiosity Meets Cybersecurity

    Cybersecurity tech notes

    Welcome to My Tech Notes

    Cybersecurity & IT insights, documented one discovery at a time.

    Hello, and welcome. If you have found your way here, chances are you share the same quiet obsession I do — the kind that keeps you up at 2 AM reading about exploit chains, digging through logs, or tinkering with a lab environment just to see what happens next. This blog is my personal corner of the internet where I document that journey.

    Who Am I?

    My name is Inho Choi. I work in the IT and managed services space, where I spend my days navigating the ever-shifting landscape of cybersecurity, infrastructure, and technology operations. Over the years I have had the privilege of working across a wide range of environments — from small business networks to complex enterprise deployments — and each one has taught me something new.

    Like many people in this field, I learn best by doing. I build, I break, I fix, and then I write it down so I do not have to figure it out a second time. That habit is exactly what gave birth to this blog.


    What This Blog Is About

    Think of this as a living notebook. Not a polished magazine, not a tutorial factory — just honest, practical notes from someone who works in the trenches of IT and cybersecurity every day. The posts here will cover a broad range of topics, including:

    • Cybersecurity concepts & techniques — vulnerability research, threat analysis, penetration testing notes, and defensive strategies.
    • CTF writeups & challenge walkthroughs — step-by-step breakdowns of Capture The Flag competitions and hands-on labs.
    • Tools & tooling — reviews, configurations, and tips for the tools I use day-to-day in security and IT operations.
    • Infrastructure & systems — server setup, network architecture, hardening guides, and lessons learned from real deployments.
    • Scripting & automation — practical scripts, workflows, and automation ideas that save time and reduce human error.
    • Learning resources & certifications — honest reflections on courses, certifications, and study paths worth pursuing.

    Why Tech Notes?

    The name is deliberate. A note implies something written in the moment — raw, direct, and useful. I have always believed that the best technical writing is not the kind that tries to impress, but the kind that actually helps. Whether it is a short command snippet, a configuration that took hours to figure out, or a thorough deep-dive into a security concept, every post here is written with one question in mind: would this have helped me when I was stuck?

    If the answer is yes, it belongs here.


    What to Expect Going Forward

    Posts will arrive one at a time — no content calendar, no artificial deadlines. Quality and clarity over quantity. When I have something worth sharing, it will show up here. I would rather publish one genuinely useful post a month than ten shallow ones a week.

    Topics will shift as my work and interests evolve. Right now I am particularly focused on:

    • Endpoint detection and threat hunting
    • Identity and access management hardening
    • Cloud security (AWS & Azure)
    • Red team and purple team exercises
    • Security automation with Python and PowerShell

    But honestly — follow along and let us both see where it goes.


    A Note on Style

    I write the way I think — plainly and directly. You will not find unnecessary jargon here for the sake of sounding clever. Where technical terms are used, they will be explained. Where commands are shown, context will follow. This blog is for practitioners, students, curious minds, and anyone who has ever Googled something at midnight because a system was misbehaving and the documentation was useless.

    “In security, the most dangerous assumption is that someone else already figured it out.”

    — A reminder I keep on my desk

    Thanks for stopping by. Bookmark this page, check back when you feel like it, and feel free to reach out if anything resonates or sparks a question. The best conversations in this industry happen between people who are genuinely curious — and if you are reading this, I suspect you are exactly that kind of person.

    Here we go.

    — Inho