Skip to main content

About

IT Random Stuff is a personal technical blog about Linux, homelabs, computer security, old hardware, laptops, honeypots, Docker, firewalls and practical sysadmin experiments.

The goal of this blog is simple: document useful IT things in a way that is practical, understandable and based on real-world tinkering.

This is not a corporate security blog. It is not a place for buzzwords, vendor slides or perfect lab conditions. It is a place for notes, guides, checklists and lessons learned while working with Linux systems, home servers, containers, networking tools and older hardware that still has plenty of life left.

What this blog covers

The main topics here include:

  • Linux home server setup and hardening;
  • Docker and self-hosted services;
  • UFW firewall rules and SSH security;
  • Fail2ban, Lynis and other defensive security tools;
  • honeypots and small security labs;
  • backup strategies for home servers and containers;
  • old laptops and workstations used as cheap homelab machines;
  • small fixes, tweaks and experiments that are useful enough to document.

Why I write these posts

A lot of useful IT knowledge comes from small practical problems:

  • Why is this port open?
  • How do I avoid locking myself out of SSH?
  • Where is my Docker container actually storing data?
  • How do I make this old machine useful again?
  • What should I fix first after running a security audit?

When I solve something or find a setup worth keeping, I try to write it down here. Sometimes the result is a checklist. Sometimes it is a command reference. Sometimes it is just a practical guide that future me would want to find again.

Security focus

Many posts on this blog are related to computer security, but the focus is defensive and educational.

The guides here are written for people who want to secure their own systems, understand their home networks, monitor their services, harden Linux servers, experiment safely with honeypots, or learn more about how common tools behave in a real environment.

Nothing here should be treated as professional security advice for critical systems. Always understand a command before running it, test changes carefully, and keep backups before modifying important servers.

Homelab approach

I like practical setups that normal people can actually run:

  • old desktops reused as servers;
  • old laptops running Linux;
  • small Docker stacks;
  • simple monitoring;
  • basic but useful firewall rules;
  • boring backups that actually restore.

Perfect enterprise architecture is nice, but most home labs start with whatever hardware is available and a willingness to learn.

That is the spirit of this blog.

About the content

The posts are written to be practical and easy to follow. I try to include commands, examples, explanations and warnings where something can break.

Technology changes, packages change and distributions change, so always check official documentation when applying something to an important system. If you spot something outdated or incorrect, feel free to get in touch through the contact page.

Start here

If you are new to the blog, a good starting point is the Start Here page. It groups the main Linux, homelab, Docker and security posts into a suggested reading order.

Thanks for reading, and hopefully something here saves you time, prevents a mistake, or gives you an idea for your own setup.

Comments

Popular posts from this blog

Honeypot deployment on Linux - OpenCanary

What’s a honeypot what what it’s purpose ? It’s basically a computer or Virtual Machine emulating some services (ex: ssh, ftp, telnet, netbios, https, samba server etc) and accepting, logging and sending warnings of all incoming connections. You can use it as intrusion detection or early warning system but it also might go a little further and allow one to get inside the intruders ”head” since you get to log every interaction. How and where should it be placed? Let’s start with “where”. I usually place them in specific areas to get an idea how/or if the network is tested from outside or inside. So I have about three major areas; behind firewalls, in “sensible zones” where only pre-defined machines should have access and in the “public zone” such as administrative/general network. Placing a honeypot behind firewalls/”sensible zones” will ensure that the firewall is doing it’s and if you get a hit that means you have a miss-configurations or a serious intrusion. Honeypots place...

Lenovo X250 tweeking in linux

Why the Lenovo X250? My needs: a daily driver laptop, very cheap, light, small, upgradable and serviceable. (want to swap hdd, thermal paste etc) and Linux friendly. All things considered, I came up with a bargain on eBay, a 12.5"  Lenovo ThinkPad X250, i5 5300U with 8gb RAM, 128gb SSD, 2 batteries and HD screen with a barely noticeable bruise (which shall be swapped latter) for 130Euro. X250 condition X250 keyboard and screen The Lenovo X250 in 2019 It's preparation for linux daily driver. The batteries, yep no typo --two batteries-- this model has 2, one internal the other external were ~82% capacity each, the screen bruise is somehow noticeable, the fan and thermals were alright, yet first things to do; swap thermal paste for a top of the line one and swap the 128gb SSD for one bigger a 256SSD.  Keep in mind that there's a whitelist of LCD screens, if not on the list no brightness control on windows. So price tag till now: X250 + Postage = 130Euro Gri...

Strong unique passwords

Strategies for creating strong, unique passwords and properly managing them: As more and more of our daily activities and personal information are being conducted and stored online, it's crucial to have strong, unique passwords for all of your online accounts. Not only do strong passwords protect your personal information from potential hackers, but they can also prevent unauthorized access to your accounts and protect your privacy. But with so many different online accounts and passwords to remember, it can be tempting to use the same password for multiple accounts or to create passwords that are easy to remember but not very secure. This is a dangerous practice, as it puts all of your accounts at risk if one password is compromised. Here are some tips for creating strong, unique passwords and properly managing them: Use a mix of letters, numbers, and special characters in your passwords. Avoid using dictionary words or common phrases, as these can be easily guessed or cracked by ...