Skip to main content

Contact

Contact IT Random Stuff

Thanks for visiting IT Random Stuff.

This blog is a personal technical blog about Linux, homelabs, computer security, old hardware, laptops, honeypots, Docker, firewalls, backups and practical sysadmin experiments.

If you want to contact me about the blog, you can use the comments section on relevant posts or reach out by email.

Email

You can contact the blog owner at:

Mtr [at] gmail.com

Please replace [at] with @ when sending an email.

What you can contact me about

  • Corrections or updates to a post;
  • Questions about Linux, homelab or security-related posts;
  • Suggestions for future topics;
  • Broken links or outdated commands;
  • Requests to remove or edit a comment you posted;
  • Advertising, sponsorship or affiliate-related questions.

Important note

I may not be able to reply to every message, and I cannot provide emergency technical support through this blog.

If you are dealing with a production system, business server, security incident, data loss, or legal/compliance issue, please contact a qualified professional who can review your specific situation directly.

Security-related messages

If you contact me about security content, please keep it defensive, educational and legal.

This blog focuses on learning, hardening, monitoring and protecting systems. I do not provide help with unauthorized access, abuse, malware, credential theft, or attacking systems that you do not own or have explicit permission to test.

Thank you for reading IT Random Stuff.

Comments

Popular posts from this blog

Honeypot deployment on Linux - OpenCanary

What’s a honeypot what what it’s purpose ? It’s basically a computer or Virtual Machine emulating some services (ex: ssh, ftp, telnet, netbios, https, samba server etc) and accepting, logging and sending warnings of all incoming connections. You can use it as intrusion detection or early warning system but it also might go a little further and allow one to get inside the intruders ”head” since you get to log every interaction. How and where should it be placed? Let’s start with “where”. I usually place them in specific areas to get an idea how/or if the network is tested from outside or inside. So I have about three major areas; behind firewalls, in “sensible zones” where only pre-defined machines should have access and in the “public zone” such as administrative/general network. Placing a honeypot behind firewalls/”sensible zones” will ensure that the firewall is doing it’s and if you get a hit that means you have a miss-configurations or a serious intrusion. Honeypots place...

Lenovo X250 tweeking in linux

Why the Lenovo X250? My needs: a daily driver laptop, very cheap, light, small, upgradable and serviceable. (want to swap hdd, thermal paste etc) and Linux friendly. All things considered, I came up with a bargain on eBay, a 12.5"  Lenovo ThinkPad X250, i5 5300U with 8gb RAM, 128gb SSD, 2 batteries and HD screen with a barely noticeable bruise (which shall be swapped latter) for 130Euro. X250 condition X250 keyboard and screen The Lenovo X250 in 2019 It's preparation for linux daily driver. The batteries, yep no typo --two batteries-- this model has 2, one internal the other external were ~82% capacity each, the screen bruise is somehow noticeable, the fan and thermals were alright, yet first things to do; swap thermal paste for a top of the line one and swap the 128gb SSD for one bigger a 256SSD.  Keep in mind that there's a whitelist of LCD screens, if not on the list no brightness control on windows. So price tag till now: X250 + Postage = 130Euro Gri...

Strong unique passwords

Strategies for creating strong, unique passwords and properly managing them: As more and more of our daily activities and personal information are being conducted and stored online, it's crucial to have strong, unique passwords for all of your online accounts. Not only do strong passwords protect your personal information from potential hackers, but they can also prevent unauthorized access to your accounts and protect your privacy. But with so many different online accounts and passwords to remember, it can be tempting to use the same password for multiple accounts or to create passwords that are easy to remember but not very secure. This is a dangerous practice, as it puts all of your accounts at risk if one password is compromised. Here are some tips for creating strong, unique passwords and properly managing them: Use a mix of letters, numbers, and special characters in your passwords. Avoid using dictionary words or common phrases, as these can be easily guessed or cracked by ...