Things I build, break, fix, and write about

24 April 2026
Network segmentation through VLAN, DNS and firewall strategy

A proper network blueprint is mostly unglamorous discipline, VLANs with a job, DNS that stays in its lane, firewall rules that mean something, and DHCP reservations that do not rely on memory. Get that wrong, and the first odd device will expose it.

24 April 2026
Security Advisory – 23 Apr 2026

Daily security advisory summary for 23 Apr 2026

23 April 2026
Safe methods for Copilot removal across Windows applications

Windows has a habit of putting Copilot back after updates, so I check policy first, then the package itself. If you need to remove Microsoft Copilot...

23 April 2026
Security Advisory – 21 Apr 2026

Daily security advisory summary for 21 Apr 2026

Latest blog posts you might like

16 November 2025
Repurpose SwitchBot button pushers for non-smart devices

Use a SwitchBot button pusher to control your non-smart devices. This guide shows safe mounts, how to measure button travel, scheduling and hub integration. Test alignment, choose non-critical buttons...

15 November 2025
Configuring smart lighting without a neutral wire

Configuring a Smart Lighting System Without a Neutral Wire I’ll walk through practical steps to get smart lighting working where the wall switch has no neutral. This is common in older UK homes. I...

15 November 2025
Using Home Assistant for centralised home control

Integrating Smart Home Devices: A Comprehensive Guide to Central Control Systems I run Home Assistant on a Raspberry Pi as my central controller. I prefer local control and a touchscreen that shows...

14 November 2025
Using scripts for automated login on Sophos systems

Fix captive portal logins with Sophos authentication automation for education networks. You will capture form requests, preserve cookies and tokens, run scripts at boot, and store credentials securely...

14 November 2025
Ensuring proper routing for VLAN traffic over IPSec

Route VLAN traffic through an IPSec Tunnel via head office to a client. You get commands, routing and NAT rules, and test steps to confirm your return paths. Keep configs small; test each change....

13 November 2025
Ensuring secure access via SSL VPN for dual-stack users

SSL VPN Dual Stack can let IPv6 bypass the tunnel and break IP based controls. This guide shows how you can force IPv4, use split DNS, or add IPv6 egress so your remote clients present the office IP...

13 November 2025
Distro hopping: strategies for stability

How to Manage Multiple Linux Distributions Without Losing Your Mind I used to flit between distros every few days. It taught me one thing fast: without rules, the mess grows faster than my patience....

12 November 2025
Navigating the Linux filesystem: tips for former Windows

Navigating Linux File Structures: A Practical Guide for Windows Migrants I switched from Windows long ago and I still get a small kick from the simplicity of the Linux filesystem. The layout is...

12 November 2025
Matching B-roll clips using GPT-5 in n8n

Automating Video Editing: A Practical n8n Workflow for Fast Content Creation I set out to cut the boring bits from short-form editing. I use n8n video editing automation to assemble a first-pass edit...

11 November 2025
Integrating Telegram with n8n workflows for notifications

This guide shows how to integrate Telegram with n8n workflows for notifications. You will set up a bot, store the token securely, and send test messages. It covers error handling, rate limits, and...