I’m Matthew Hunter, a programmer, sysadmin, and CISSP security officer. I’ve been building software and tinkering with Linux since the late 90s. This site is home to my projects, writings, and occasional musings on gaming, technology, and life.
Ubiquiti U6 Long Range Access Point
The Ubiquiti U6 Long Range
access point makes a bold claim right in its name. After deploying a single ceiling-mounted unit in a 4,000 square foot two-story home, that claim holds up—complete coverage across both floors with no dead spots, handling approximately fifty devices without complaint. Previous access points produced spotty coverage in corners and struggled through walls; those problems simply don’t exist with this unit. The UniFi integration is seamless, roaming between multiple APs is invisible to connected devices, and WiFi 6 efficiency keeps everything stable even when the household is actively streaming, video conferencing, and transferring files simultaneously. Just don’t mount it on your bedroom ceiling—the blue status LED is bright enough to disturb sleep.
Ubiquiti Dream Machine Pro
The Ubiquiti Dream Machine Pro
represents a significant step up from consumer networking gear, offering enterprise-grade features in a package that’s actually manageable for technically-inclined home users. After three years of continuous use, it’s proven itself as the backbone of a demanding home network running four VLANs, approximately fifty devices, nine cameras through Protect, and automatic WAN failover. The centralized management interface handles both networking and Ubiquiti’s camera system from a single console, replacing what would otherwise require command-line configuration or separate tools. The cloud login trend and occasional UI hiccups are annoyances worth noting, but they haven’t undermined three years of reliable operation. If you’re comfortable managing VLANs and understand why IoT devices belong on a separate network, this delivers.
Tin Soldier
By Matthew Hunter
| Jan 7, 2026
|
Tin Soldier
A dark reimagining of a timeless classic
, where love defies the boundaries between metal and mortality.
A one-legged tin soldier glimpses a beautiful one-legged lady in a distant castle and embarks on an impossible journey to reach her. But what begins as a romantic quest becomes a harrowing test of will, sacrifice, and the true meaning of love.
Across treacherous forests, past fearsome creatures, and through encounters with dark magic, the soldier transforms himself—literally and spiritually—in pursuit of his impossible dream. Yet as he discovers the princess he seeks and faces the sorcerer who holds her captive, he must choose between the perfection he’s always desired and the imperfection that makes him who he is.
Cyberleadership Program
By Matthew Hunter
| Oct 16, 2025
| isc2
This eight-week CyberLeadership program
from the CyberLeadership Institute guides experienced security professionals to operate at executive level, ending with a practical board‑facing capstone project that simulates the presentation of a 2-year plan by an incoming CISO to the board. Each week focuses on a distinct leadership domain, and includes practical action items and templates to be incorporated into the capstone. The course offers 40 CPE towards renewing my CISSP
.
Week 1 — The role of a CISO
Week 1 orients participants to the program and the cyber resilience mindset, and introduces the CISO role through lived experience and practical lessons. Participants explore the many variants of the CISO position, clarify their ideal role, and begin building a personal brand and interview readiness. The week covers essential first‑100‑day priorities, ways to engage the C‑suite, and personal resilience practices.
GIAC Forensic Analyst
By Matthew Hunter
| Feb 3, 2025
| giac
I recently took and passed the GCFA certification exam
for forensic analysis. It was an interesting and educational experience, touching on logfile analysis, memory forensics, deep filesystem analysis, and timeline generation. Most of the content focused on Windows (event logs, NTFS filesystem formats, etc); I’m looking forward to finding a matching course with a Linux focus.
apt-cacher-ng
When you manage more than a handful of Debian or Ubuntu systems, you quickly discover that downloading the same packages repeatedly from the internet is both wasteful and slow. Enter apt-cacher-ng, a caching proxy specifically designed for Debian package repositories. It sits between your local machines and the upstream mirrors, storing packages locally after the first download and serving them from cache for subsequent requests.
The beauty of apt-cacher-ng lies in its simplicity. Installation is straightforward: a single apt install apt-cacher-ng on a server, and you have a working proxy listening on port 3142. Client configuration is equally painless – you can either set the proxy in each machine’s apt configuration, or use the auto-detect feature if your network supports it. Once configured, every package fetched by any client is cached, dramatically reducing bandwidth usage and speeding up updates across your network.
Taskfile
Every project accumulates a collection of commands: build the thing, run the tests, deploy to staging, convert images, lint the code. These commands live in README files, shell history, or the developer’s memory. Make has been the traditional solution for decades, but its tab-sensitivity and arcane syntax make it frustrating for simple task running. Taskfile
offers a modern alternative.
Taskfile uses a simple YAML format that feels immediately familiar. Tasks have names, descriptions, and commands. Running task serve executes the serve task. Running task --list shows all available tasks with their descriptions. No tabs-versus-spaces gotchas, no implicit rules to remember, no wrestling with pattern matching when you just want to run a shell command.
CISSP
By Matthew Hunter
| Dec 1, 2024
| isc2
I recently took and passed the ISC2
CISSP
. The certification covered a broad range of topics, most of which I was already familiar with from experience as a software engineer. Those areas I was less familiar with included legal and procedural requirements around risk assessment, physical security, and the theory behind encryption and permissions management.
Cisco Remote Scripts
What I’ve been working on for a while now: Cisco Remote Scripts
With the introduction of Remote Scripts powered by Orbital, a search and response feature of Cisco Secure Endpoint in either the Advantage or the Premier tier, incident responders can respond to sophisticated threats with minimal business
disruption, and administrators can provide an overall safer and better user experience.
Remote scripts harness the power of Orbital Advanced Search capabilities, which provides hundreds of prepared queries
curated by Cisco’s Talos threat intelligence group, allowing you to quickly run complex queries on any endpoint.
find -exec
By Matthew Hunter
| Apr 2, 2023
| cli, unix
One very useful command for locating files and performing operations on them is find with the -exec option.
find [path] [arguments] -exec [command] {} \;
The part that’s tricky to remember is the escaped semicolon at the end.
Per-file vs batch mode
The \; terminator runs the command once per file found:
find . -name "*.log" -exec rm {} \;
# Equivalent to: rm file1.log; rm file2.log; rm file3.log
The + terminator batches files into fewer command invocations, which is faster: