Skip to main content

Disclaimer

Disclaimer for IT Random Stuff

Last updated: May 19, 2026

The information on IT Random Stuff is provided for general informational, educational and personal learning purposes only.

This blog covers topics such as Linux, homelabs, computer security, Docker, UFW, Fail2ban, Lynis, honeypots, backups, old hardware, laptops and sysadmin experiments. The content is based on personal notes, research, testing and practical experience.

No professional advice

The content on this blog is not professional, legal, financial, security, compliance or business advice.

You should not rely on this blog as the only source of information when making decisions about production systems, business infrastructure, regulated environments, legal obligations, cybersecurity incidents or critical services.

If you need professional assistance, please consult a qualified expert who can review your specific situation.

Use commands at your own risk

Many posts on this blog include Linux commands, configuration examples, firewall rules, Docker Compose examples, backup commands and security hardening steps.

These examples are provided for learning and testing. They may not be suitable for every system.

Before running any command, you should:

  • understand what the command does;
  • check that it applies to your operating system and version;
  • make backups of important data;
  • test changes carefully;
  • avoid applying changes blindly to production systems.

I am not responsible for data loss, downtime, misconfiguration, security issues, hardware damage, service interruption or any other problem caused by applying information from this blog.

Security content disclaimer

Security-related content on this blog is intended for defensive, educational and lawful use only.

Posts about topics such as firewalls, SSH hardening, Fail2ban, Lynis, Docker security and honeypots are written to help readers understand, monitor and protect systems they own or are authorized to manage.

You are responsible for ensuring that your actions are legal and authorized in your country, organization and environment.

This blog does not encourage or support unauthorized access, exploitation, malware, credential theft, abuse of systems, or attacks against networks, devices or services that you do not own or do not have permission to test.

Accuracy of information

I try to keep the information on this blog useful and accurate, but technology changes quickly.

Commands, package names, configuration paths, software behavior, security recommendations and external links may change over time.

I do not guarantee that all information is always complete, accurate, current or suitable for your specific setup.

If you notice outdated information or an error, you can contact me through the Contact page.

External links

This blog may contain links to external websites, documentation, tools, software projects, products or services.

External links are provided for convenience and additional context. I do not control external websites and I am not responsible for their content, availability, privacy practices, security, accuracy or policies.

Affiliate links and advertising

This blog may display advertising or include affiliate links in the future.

If affiliate links are used, I may earn a commission from qualifying purchases at no additional cost to you.

Any advertising, sponsorship or affiliate relationship does not change the goal of the blog: to provide useful, practical and honest technical content.

Comments

Readers may leave comments on some posts. Comments represent the views of their authors and not necessarily the views of the blog owner.

I may remove comments that are spam, abusive, misleading, illegal, promotional, offensive or unrelated to the topic.

Changes to this disclaimer

This disclaimer may be updated from time to time. Any changes will be posted on this page with an updated date.

Contact

If you have questions about this disclaimer, corrections to suggest, or concerns about content on this blog, please use the Contact page.

Comments

Popular posts from this blog

Honeypot deployment on Linux - OpenCanary

What’s a honeypot what what it’s purpose ? It’s basically a computer or Virtual Machine emulating some services (ex: ssh, ftp, telnet, netbios, https, samba server etc) and accepting, logging and sending warnings of all incoming connections. You can use it as intrusion detection or early warning system but it also might go a little further and allow one to get inside the intruders ”head” since you get to log every interaction. How and where should it be placed? Let’s start with “where”. I usually place them in specific areas to get an idea how/or if the network is tested from outside or inside. So I have about three major areas; behind firewalls, in “sensible zones” where only pre-defined machines should have access and in the “public zone” such as administrative/general network. Placing a honeypot behind firewalls/”sensible zones” will ensure that the firewall is doing it’s and if you get a hit that means you have a miss-configurations or a serious intrusion. Honeypots place...

Lenovo X250 tweeking in linux

Why the Lenovo X250? My needs: a daily driver laptop, very cheap, light, small, upgradable and serviceable. (want to swap hdd, thermal paste etc) and Linux friendly. All things considered, I came up with a bargain on eBay, a 12.5"  Lenovo ThinkPad X250, i5 5300U with 8gb RAM, 128gb SSD, 2 batteries and HD screen with a barely noticeable bruise (which shall be swapped latter) for 130Euro. X250 condition X250 keyboard and screen The Lenovo X250 in 2019 It's preparation for linux daily driver. The batteries, yep no typo --two batteries-- this model has 2, one internal the other external were ~82% capacity each, the screen bruise is somehow noticeable, the fan and thermals were alright, yet first things to do; swap thermal paste for a top of the line one and swap the 128gb SSD for one bigger a 256SSD.  Keep in mind that there's a whitelist of LCD screens, if not on the list no brightness control on windows. So price tag till now: X250 + Postage = 130Euro Gri...

Strong unique passwords

Strategies for creating strong, unique passwords and properly managing them: As more and more of our daily activities and personal information are being conducted and stored online, it's crucial to have strong, unique passwords for all of your online accounts. Not only do strong passwords protect your personal information from potential hackers, but they can also prevent unauthorized access to your accounts and protect your privacy. But with so many different online accounts and passwords to remember, it can be tempting to use the same password for multiple accounts or to create passwords that are easy to remember but not very secure. This is a dangerous practice, as it puts all of your accounts at risk if one password is compromised. Here are some tips for creating strong, unique passwords and properly managing them: Use a mix of letters, numbers, and special characters in your passwords. Avoid using dictionary words or common phrases, as these can be easily guessed or cracked by ...