Build a Cybersecurity Learning Lab
Compare the most common software options and commit to a clean, repeatable stack for cybersecurity study.
Show partsHide parts
- 1
- 2
- 3
Post Series
Explore posts organized by series.
Timeline
See every part in order, with Start and Continue shortcuts.
Compare the most common software options and commit to a clean, repeatable stack for cybersecurity study.
Introduction to the Building a Homelab on a Budget series, with goals, scope, and a practical roadmap.
Part 1 consolidates the mc-platform architecture, v1beta1 CRDs, and the first MinecraftServer controller loop.
Part 1: Bootstrap a 3-master/2-worker RHEL Kubespray-based cluster and define core architecture.
A clear, internal-first introduction to Kubernetes: why it exists, the control plane/data plane split, and the core objects that define desired state.
Part 1 explains how Tor circuits, relay roles, onion routing work, plus the threat model and tradeoffs. It sets up the series path toward crawling through Tor.