Skip to main content

Start Here

Welcome to IT Random Stuff.

This page is a quick starting point for the Linux, homelab, Docker, firewall, hardening, honeypot and old hardware guides on this blog.

If you are setting up a small Linux home server, self-hosting services with Docker, playing with honeypots, or trying to make old hardware useful again, start here.


Linux Home Server Security

Start with these if you want to harden a Linux home server, check exposed services, protect SSH, configure firewall rules and improve basic security.

Docker and Self-Hosting

These posts are for Docker, containers, exposed ports, homelab services and safer self-hosting habits.

SSH, Passwords and Access Control

Use these posts if you are thinking about SSH access, brute-force protection, password habits and login security.

Honeypots and Security Labs

For lab monitoring, intrusion detection experiments and fake services that help detect unexpected network activity.

Old Hardware and Homelab Builds

Older hardware can still be useful for Linux, homelabs, lightweight servers and experiments.

Suggested Reading Path

If you are new to Linux homelab security, I would read the guides in this order:

  1. Linux Home Server Security Checklist
  2. UFW Firewall Rules for Home Servers
  3. Fail2ban for Beginners
  4. Lynis Hardening Checklist
  5. Docker Security for Homelab Beginners
  6. Backing Up Docker Containers on a Home Server

What This Blog Focuses On

  • Linux home servers
  • Homelab security
  • Docker and self-hosting
  • UFW firewall rules
  • SSH hardening
  • Fail2ban
  • Lynis audits
  • Honeypots
  • Old laptops and cheap server hardware

This is not enterprise security theory. It is practical, hands-on Linux and homelab stuff: commands, mistakes, small improvements, old hardware, and things that are useful when running your own systems at home.

Comments

Popular posts from this blog

Honeypot deployment on Linux - OpenCanary

What’s a honeypot what what it’s purpose ? It’s basically a computer or Virtual Machine emulating some services (ex: ssh, ftp, telnet, netbios, https, samba server etc) and accepting, logging and sending warnings of all incoming connections. You can use it as intrusion detection or early warning system but it also might go a little further and allow one to get inside the intruders ”head” since you get to log every interaction. How and where should it be placed? Let’s start with “where”. I usually place them in specific areas to get an idea how/or if the network is tested from outside or inside. So I have about three major areas; behind firewalls, in “sensible zones” where only pre-defined machines should have access and in the “public zone” such as administrative/general network. Placing a honeypot behind firewalls/”sensible zones” will ensure that the firewall is doing it’s and if you get a hit that means you have a miss-configurations or a serious intrusion. Honeypots place...

Lenovo X250 tweeking in linux

Why the Lenovo X250? My needs: a daily driver laptop, very cheap, light, small, upgradable and serviceable. (want to swap hdd, thermal paste etc) and Linux friendly. All things considered, I came up with a bargain on eBay, a 12.5"  Lenovo ThinkPad X250, i5 5300U with 8gb RAM, 128gb SSD, 2 batteries and HD screen with a barely noticeable bruise (which shall be swapped latter) for 130Euro. X250 condition X250 keyboard and screen The Lenovo X250 in 2019 It's preparation for linux daily driver. The batteries, yep no typo --two batteries-- this model has 2, one internal the other external were ~82% capacity each, the screen bruise is somehow noticeable, the fan and thermals were alright, yet first things to do; swap thermal paste for a top of the line one and swap the 128gb SSD for one bigger a 256SSD.  Keep in mind that there's a whitelist of LCD screens, if not on the list no brightness control on windows. So price tag till now: X250 + Postage = 130Euro Gri...

Strong unique passwords

Strategies for creating strong, unique passwords and properly managing them: As more and more of our daily activities and personal information are being conducted and stored online, it's crucial to have strong, unique passwords for all of your online accounts. Not only do strong passwords protect your personal information from potential hackers, but they can also prevent unauthorized access to your accounts and protect your privacy. But with so many different online accounts and passwords to remember, it can be tempting to use the same password for multiple accounts or to create passwords that are easy to remember but not very secure. This is a dangerous practice, as it puts all of your accounts at risk if one password is compromised. Here are some tips for creating strong, unique passwords and properly managing them: Use a mix of letters, numbers, and special characters in your passwords. Avoid using dictionary words or common phrases, as these can be easily guessed or cracked by ...