Skip to main content

Privacy Policy

Last updated: May 19, 2026

This Privacy Policy explains how IT Random Stuff, available at https://itrandomstuff.blogspot.com/, collects, uses and protects information when you visit this blog.

IT Random Stuff is a personal technical blog about Linux, homelabs, computer security, Docker, UFW, Fail2ban, Lynis, honeypots, old hardware, laptops and sysadmin experiments.

By using this blog, you agree to the terms described in this Privacy Policy.

Information this blog may collect

This blog may collect limited information in the following ways:

  • Information automatically collected by Blogger, Google services, analytics tools or advertising services.
  • Information you voluntarily provide, such as when leaving a comment or contacting the blog owner.
  • Technical information such as browser type, device type, referring pages, approximate location, pages visited, time spent on pages and other basic usage data.

This blog does not intentionally collect sensitive personal information such as government identification numbers, financial details, health information or precise location data.

Comments

If comments are enabled, visitors may leave comments on posts. When you leave a comment, Blogger or related Google services may collect information such as your display name, profile, comment text, date, time and other technical information needed to publish and manage the comment.

Comments may be moderated, edited or deleted if they contain spam, abuse, malware links, illegal content, offensive material or anything unrelated to the discussion.

Please do not post private, sensitive or confidential information in comments.

Cookies

This blog may use cookies and similar technologies. Cookies are small files stored on your device that help websites and third-party services remember preferences, measure traffic, improve functionality and deliver relevant content or advertisements.

Cookies may be used for purposes such as:

  • keeping Blogger and Google services working correctly;
  • measuring blog traffic and performance;
  • remembering visitor preferences;
  • detecting spam or abuse;
  • serving advertisements;
  • personalizing ads, where permitted by law and user consent.

You can disable cookies through your browser settings. However, some parts of the blog may not work correctly if cookies are disabled.

Google Blogger

This blog is hosted on Google Blogger. Blogger may collect and process information according to Google’s own privacy practices and terms.

You can read Google’s Privacy Policy here:

https://policies.google.com/privacy

Google Analytics and traffic statistics

This blog may use Google Analytics, Blogger statistics or similar tools to understand how visitors use the site. These tools may collect information such as pages visited, browser type, device type, referring websites, approximate location and time spent on pages.

This information is used to improve the blog, understand which posts are useful and make better content decisions.

You can learn more about how Google uses information from sites and apps here:

https://policies.google.com/technologies/partner-sites

Google AdSense and advertising

This blog may display advertisements through Google AdSense or other third-party advertising networks.

Third-party vendors, including Google, may use cookies to serve ads based on a visitor’s previous visits to this blog or other websites. Google’s use of advertising cookies enables Google and its partners to serve ads to visitors based on their visit to this blog and/or other sites on the internet.

Visitors may opt out of personalized advertising by visiting Google Ads Settings:

https://www.google.com/settings/ads

Visitors can also learn more about advertising cookies and opt-out choices through:

https://www.aboutads.info/choices/

Google and other ad technology providers may collect or receive information from this blog and other websites and use that information to provide measurement services and personalized ads, where allowed by law.

Affiliate links

This blog may include affiliate links in the future. This means that if you click a link and purchase a product or service, the blog owner may earn a small commission at no additional cost to you.

Affiliate links may be used for products or services related to Linux, homelabs, hardware, laptops, storage, networking, books, hosting or other technical topics.

Any affiliate links will be included only where they are relevant to the content. The presence of an affiliate link does not change the editorial opinion of the blog.

External links

This blog contains links to external websites, tools, documentation, software projects, vendors and other resources.

IT Random Stuff is not responsible for the privacy practices, content, security or policies of external websites. When you leave this blog, you should review the privacy policy of the external site you visit.

Embedded content

Posts may include embedded content such as videos, images, code snippets, social media posts, GitHub resources or other external material.

Embedded content from other websites behaves in the same way as if you visited those websites directly. Those websites may collect data, use cookies, embed third-party tracking and monitor your interaction with the embedded content.

How information is used

Information collected through this blog may be used to:

  • operate and maintain the blog;
  • improve content and user experience;
  • understand which posts are useful to readers;
  • detect spam, abuse or technical issues;
  • respond to comments or messages;
  • display advertisements;
  • measure advertising and content performance.

Data sharing

IT Random Stuff does not sell personal information directly to third parties.

However, third-party services such as Google Blogger, Google Analytics, Google AdSense, spam protection tools, embedded content providers or affiliate platforms may collect and process information according to their own privacy policies.

This blog may also disclose information if required by law, regulation, legal process or to protect the rights, safety and security of the blog, its owner or visitors.

Data retention

Comments, analytics data, server logs, advertising data and other technical information may be retained for as long as needed for blog operation, analytics, security, legal compliance or service functionality.

Some data may be stored and managed by third-party services such as Google Blogger, Google Analytics or Google AdSense according to their own retention policies.

Your choices

You may control or limit data collection in several ways:

  • Disable or delete cookies in your browser settings.
  • Use browser privacy settings or extensions.
  • Opt out of personalized Google ads through Google Ads Settings.
  • Avoid posting personal information in comments.
  • Contact the blog owner if you want a comment removed.

To manage Google ad personalization, visit:

https://www.google.com/settings/ads

Children’s privacy

This blog is not directed at children under the age of 13. IT Random Stuff does not knowingly collect personal information from children under 13.

If you believe that a child has provided personal information through this blog, please contact the blog owner so that appropriate steps can be taken to remove it.

Security

Reasonable care is taken to keep this blog safe and useful. However, no website, hosting platform, analytics system or internet transmission is completely secure.

Visitors should avoid posting sensitive information in comments or contact messages.

Technical and security content disclaimer

This blog publishes technical content related to Linux, computer security, homelabs, firewalls, Docker, honeypots and system administration.

The information is provided for educational, defensive and personal learning purposes. Commands, configurations and examples should be tested carefully before use. You are responsible for your own systems, data, backups and security decisions.

Changes to this Privacy Policy

This Privacy Policy may be updated from time to time. Any changes will be posted on this page with a new “Last updated” date.

You are encouraged to review this page occasionally to stay informed about how this blog handles privacy-related matters.

Contact

If you have questions about this Privacy Policy or want to request removal of a comment you posted, you can contact the blog owner through the Contact page.

Comments

Popular posts from this blog

Honeypot deployment on Linux - OpenCanary

What’s a honeypot what what it’s purpose ? It’s basically a computer or Virtual Machine emulating some services (ex: ssh, ftp, telnet, netbios, https, samba server etc) and accepting, logging and sending warnings of all incoming connections. You can use it as intrusion detection or early warning system but it also might go a little further and allow one to get inside the intruders ”head” since you get to log every interaction. How and where should it be placed? Let’s start with “where”. I usually place them in specific areas to get an idea how/or if the network is tested from outside or inside. So I have about three major areas; behind firewalls, in “sensible zones” where only pre-defined machines should have access and in the “public zone” such as administrative/general network. Placing a honeypot behind firewalls/”sensible zones” will ensure that the firewall is doing it’s and if you get a hit that means you have a miss-configurations or a serious intrusion. Honeypots place...

Lenovo X250 tweeking in linux

Why the Lenovo X250? My needs: a daily driver laptop, very cheap, light, small, upgradable and serviceable. (want to swap hdd, thermal paste etc) and Linux friendly. All things considered, I came up with a bargain on eBay, a 12.5"  Lenovo ThinkPad X250, i5 5300U with 8gb RAM, 128gb SSD, 2 batteries and HD screen with a barely noticeable bruise (which shall be swapped latter) for 130Euro. X250 condition X250 keyboard and screen The Lenovo X250 in 2019 It's preparation for linux daily driver. The batteries, yep no typo --two batteries-- this model has 2, one internal the other external were ~82% capacity each, the screen bruise is somehow noticeable, the fan and thermals were alright, yet first things to do; swap thermal paste for a top of the line one and swap the 128gb SSD for one bigger a 256SSD.  Keep in mind that there's a whitelist of LCD screens, if not on the list no brightness control on windows. So price tag till now: X250 + Postage = 130Euro Gri...

Strong unique passwords

Strategies for creating strong, unique passwords and properly managing them: As more and more of our daily activities and personal information are being conducted and stored online, it's crucial to have strong, unique passwords for all of your online accounts. Not only do strong passwords protect your personal information from potential hackers, but they can also prevent unauthorized access to your accounts and protect your privacy. But with so many different online accounts and passwords to remember, it can be tempting to use the same password for multiple accounts or to create passwords that are easy to remember but not very secure. This is a dangerous practice, as it puts all of your accounts at risk if one password is compromised. Here are some tips for creating strong, unique passwords and properly managing them: Use a mix of letters, numbers, and special characters in your passwords. Avoid using dictionary words or common phrases, as these can be easily guessed or cracked by ...