Things I build, break,
fix, and write about

24 February 2026
AI
Securing your homelab with effective VLAN strategies

Unlock the potential of your homelab with effective VLAN configuration. Learn practical steps to enhance security, streamline management, and ensure smooth network function.

Read more
24 February 2026
Advisories
Security Advisory – 24 Feb 2026

Daily security advisory summary for 24 Feb 2026

Read more
23 February 2026
Deals
Ninja Foodi MAX Dual Zone Digital AirFryer + 3 more Amazon tech bargains

Explore the Ninja Foodi MAX AirFryer and three more tech deals this week.

Read more
21 February 2026
AI
Documenting quality checks in neon sign manufacturing

Neon Sign Automation sets repeatable test sequences, links firmware, test logs, photos and manifests to each job, and flags deviations for root-cause tracking. Use short SOPs and versioned configuration items so you reduce rework, speed troubleshooting and keep a clear audit trail.

Read more
21 February 2026
AI
Mitigating security risks from AI recommendation poisoning

Reduce risk from AI recommendation poisoning with practical controls you can apply to your assistant today. Log incoming AI links, block anonymous memory writes, record provenance for every memory entry, and give users a simple inspector to review and revoke saved preferences; these steps help you detect manipulation and restore reliable recommendations.

Read more
21 February 2026
Advisories
Security Advisory – 21 Feb 2026

Daily security advisory summary for 21 Feb 2026, selected for UK homelab and sysadmin readers.

Read more
20 February 2026
AI
Understanding Siri's integration issues with home automation

Navigating Siri’s Delays: Lessons for Home Automation and Software Integration Siri delays can break automated flows and erode trust in home automation. This guide shows how to spot delays, where they typically occur, how to diagnose root causes, and how to fix and verify Siri software integration with HomeKit and related automation stacks. Use the […]

Read more
20 February 2026
AI
Removing compromised Outlook add-ins to protect your account

Securing Your Outlook Add-ins: Lessons from the AgreeTo Hijack A popular Outlook add-in called AgreeTo was abandoned by its developer and remained listed in the Microsoft Marketplace. An attacker claimed the unowned hosting subdomain, replaced the live content with a phishing kit that mimicked Microsoft sign-in pages, and harvested credentials from roughly 4,000 accounts. Security […]

Read more
19 February 2026
Real Life
Configuring Screenless Devices in Schools

Unlock the potential of screenless devices in education by minimising distractions and enhancing productivity. Discover effective setup and management strategies in this comprehensive guide.

Read more
19 February 2026
AI
Establishing firewall rules to mitigate model extraction

Implementing Effective Firewall Rules to Protect AI Models from Extraction Attacks AI models exposed over APIs attract systematic probing. Large volumes of patterned queries can be an attempt at model extraction, where an attacker reconstructs model behaviour. Apply layered firewall rules and network controls to reduce the attack surface, preserve evidence, and slow or stop […]

Read more