Posts
All posts from William Zujkowski - security insights, AI/ML projects, and career development
Self-Hosted Password Manager Migration: Bitwarden Deep Dive
Migrating from cloud password managers to self-hosted Bitwarden: setup, security hardening, backup strategies, and why I made the switch
Building a Network Traffic Analysis Lab with Suricata
Setting up Suricata IDS/IPS on homelab for real-time network threat detection—rule management, performance tuning, and integrating with security stack
Container Security Hardening in My Homelab
Practical container security hardening techniques for Docker and K3s in a homelab environment, from base image selection to runtime security monitoring
AI as Cognitive Infrastructure: The Invisible Architecture Reshaping Human Thought
AI is evolving from tools into cognitive infrastructure that shapes how billions think, yet we understand little about its long-term effects
Supercharging Development with Claude-Flow: AI Swarm Intelligence for Modern Engineering
Claude-Flow orchestrates AI agent swarms for development—84.8% SWE-Bench solve rate with neural learning. Here's my experience building with it
Down the MCP Rabbit Hole: Building a Standards Server
The ongoing saga of turning my standards repo into an MCP server for Claude. Spoiler: It's working mostly, and I've only rewritten it three times so far
Exploring Claude CLI Context and Compliance with My Standards Repository
How I built a standards repository that transforms Claude CLI into a context-aware development powerhouse with 90% token reduction and workflow automation
Vulnerability Management at Scale with Open Source Tools
Build an enterprise-grade vulnerability management program using only open source tools. From scanning to remediation tracking, here's how to do it right
Implementing DNS-over-HTTPS (DoH) for Home Networks
Complete guide to deploying DNS-over-HTTPS on home networks for privacy and security, covering Pi-hole, dnscrypt-proxy, and multiple implementation approaches
eBPF for Security Monitoring: A Practical Guide
Using eBPF for real-time Linux security monitoring—syscall tracking, network observability, and production-ready patterns for kernel-level visibility