Things I build, break, fix, and write about

24 April 2026
Network segmentation through VLAN, DNS and firewall strategy

A proper network blueprint is mostly unglamorous discipline, VLANs with a job, DNS that stays in its lane, firewall rules that mean something, and DHCP reservations that do not rely on memory. Get that wrong, and the first odd device will expose it.

24 April 2026
Security Advisory – 23 Apr 2026

Daily security advisory summary for 23 Apr 2026

23 April 2026
Safe methods for Copilot removal across Windows applications

Windows has a habit of putting Copilot back after updates, so I check policy first, then the package itself. If you need to remove Microsoft Copilot...

23 April 2026
Security Advisory – 21 Apr 2026

Daily security advisory summary for 21 Apr 2026

Latest blog posts you might like

23 February 2026
Ninja Foodi MAX Dual Zone Digital AirFryer + 3 more Amazon tech bargains

Explore the Ninja Foodi MAX AirFryer and three more tech deals this week.

21 February 2026
Documenting quality checks in neon sign manufacturing

Neon Sign Automation sets repeatable test sequences, links firmware, test logs, photos and manifests to each job, and flags deviations for root-cause tracking. Use short SOPs and versioned...

21 February 2026
Mitigating security risks from AI recommendation poisoning

Reduce risk from AI recommendation poisoning with practical controls you can apply to your assistant today. Log incoming AI links, block anonymous memory writes, record provenance for every memory...

21 February 2026
Security Advisory – 21 Feb 2026

Daily security advisory summary for 21 Feb 2026, selected for UK homelab and sysadmin readers.

20 February 2026
Understanding Siri's integration issues with home automation

Navigating Siri’s Delays: Lessons for Home Automation and Software Integration Siri delays can break automated flows and erode trust in home automation. This guide shows how to spot delays,...

20 February 2026
Removing compromised Outlook add-ins to protect your account

Securing Your Outlook Add-ins: Lessons from the AgreeTo Hijack A popular Outlook add-in called AgreeTo was abandoned by its developer and remained listed in the Microsoft Marketplace. An attacker...

19 February 2026
Configuring Screenless Devices in Schools

Unlock the potential of screenless devices in education by minimising distractions and enhancing productivity. Discover effective setup and management strategies in this comprehensive guide.

19 February 2026
Establishing firewall rules to mitigate model extraction

Implementing Effective Firewall Rules to Protect AI Models from Extraction Attacks AI models exposed over APIs attract systematic probing. Large volumes of patterned queries can be an attempt at model...

18 February 2026
Integrating AI software configurations in your homelab

Plan and version your homelab so AI software configurations remain reproducible, secure and easy to roll back. You should automate provisioning and testing, segment workloads on separate VLANs and...

18 February 2026
Assessing collision risks for AWS Outpost deployments

You should check telemetry for attitude alerts, sudden shutdowns, thermal spikes and short comms blackouts to identify collision risks for AWS Outpost deployments. Record exact timestamps, correlate...