Things I build, break, fix, and write about

24 April 2026
Security Advisory – 23 Apr 2026

Daily security advisory summary for 23 Apr 2026

23 April 2026
Safe methods for Copilot removal across Windows applications

Windows has a habit of putting Copilot back after updates, so I check policy first, then the package itself. If you need to remove Microsoft Copilot...

23 April 2026
Security Advisory – 21 Apr 2026

Daily security advisory summary for 21 Apr 2026

22 April 2026
Configuration management prevents home lab drift

Cheap kit only stays cheap if the software side stays disciplined. A home lab software stack turns into a mess the moment settings live in web forms...

Latest blog posts you might like

5 April 2026
Process jails and kernel isolation for untrusted agent code

Running untrusted AI agents in standard Docker containers leaves you exposed to kernel exploits that bypass every namespace and policy you've layered on top. MicroVMs add a hardware boundary that...

3 April 2026
Using IP reputation data from Operation Synergia in your

Operation Synergia III sinkholed 45,000 botnet and malware IPs across 72 countries with law enforcement backing. That chain of custody makes the data worth blocking at your firewall; the catch is that...

1 April 2026
Zram and zswap: choosing compression for constrained systems

I've built systems that swap differently depending on what dies first: the CPU or the storage. Zram and zswap solve adjacent problems, and picking the wrong one costs you either write cycles or...

30 March 2026
Blink Outdoor 4 camera + 3 more Amazon tech bargains

Discover the Blink Outdoor 4 camera and three more tech deals this week.

28 March 2026
Azure credits documentation fails to flag marketplace

I deployed Claude via Azure AI Foundry assuming startup credits would cover it. The $1,600 invoice arrived mid-cycle, charged directly to my card. Microsoft's documentation never mentions that...

25 March 2026
Setting up headless Chrome in ARM64 containers without

Google doesn't publish ARM64 Chrome. Chromium fills that gap on Debian-based ARM64 Linux systems, and any CDP automation library works identically against it. Pin the version, fix `/dev/shm`, work...

24 March 2026
Detecting spoofed VPN downloads: a practical approach

The trust UI lies by omission. A valid signature proves only that someone with a private key signed the file, not that the signer is the vendor you intended. Storm-2561 distributes trojanised VPN...

23 March 2026
Stellar Blade (PS5) + 2 more Amazon tech bargains

Check out these top Amazon deals including Stellar Blade for PS5 at £28.6.

22 March 2026
Petabyte leaks start with uncontrolled backup access

A single compromised credential reaching both production and backup storage across the same network boundary turns one day's data loss into months or years. Isolation done badly is barely isolation at...

21 March 2026
Video file naming and structure for decade-scale retrieval

A video archive you cannot read a decade later is just a warm drive waiting to die. Ambiguous filenames and missing verification schedules kill cold storage video archival; fix those two things, and...