Run Your Own IRC Server

Want a private comms channel without relying on Discord or Slack?
IRC is alive, and you can run your own today.

A small, well-configured IRC server gives you privacy, control, and minimal attack surface – all in a few commands.

Some people think that IRC is dead.
Some of them don’t even know what is it.
They’re young, grew up on modern comms.

IRC is the protocol that laid the foundation of modern chats.

Networks used large footprint ircd daemons for the base.
They registered services daemons for channel and nick retention.
TLS settings were rare and uncomfortable.
SASL authentication was hardly set.

Then new developments appeared.
The old technology got a modern revision.

Continue reading “Run Your Own IRC Server”

The Operator’s KVM Bible

When the enterprise behind one of the widespread hypervisors was acquired:
many sysadmins decided to move on.

  • Most of them chose a Linux-based open-source alternative.
  • Many of them migrated to the Microsoft ecosystem.
  • They chased the same workflow, the same features they had before.

Only a very few operators dared to rework their processes and architecture.

KVM (Kernel-based Virtual Machines) is part of the Linux kernel.
It is a stable and fast hypervisor.

  • A carefully configured host OS for KVM can reduce the attack surface compared to feature-heavy hypervisors.
  • The libvirt API enables secure automation and configuration management.
  • KVM can host Linux, Windows and BSD virtual machines as well.
  • It ships an ecosystem of mature tools for the operators in charge.

KVM is not a downgrade. It’s a sideways step.

Continue reading “The Operator’s KVM Bible”

Gitea – Ansible Installer Role

Automation and configuration management are not just about comfort.
They provide security, auditability and operational freedom.

For this reason Tom’s IT Cafe provides an Ansible role that:

  1. Downloads and installs the Gitea Linux binary
  2. Sets up a system service (as a non-root user)
  3. Sets up PostgreSQL (or SQLite for lightweight setups)
  4. Optionally sets up a reverse proxy with Certbot or self-signed keys
  5. Highly configurable through variables

The role focuses on a small, auditable code base with strong security.

Continue reading “Gitea – Ansible Installer Role”

Gitea – Your Self-Hosted Git Platform

You feel the comfort of the cloud – low maintenance, fast setup.
Your source code, configuration and files are safe.

Or… are they?

You rely on a third party for infrastructure control, security operations and availability.
What would your business continuity plan look like if your SaaS provider became unavailable?

In this article we investigate a self-hosted solution for small businesses.

Continue reading “Gitea – Your Self-Hosted Git Platform”

GPG Basics: Simple, Safe Encryption for Everyday IT Work

When you hear the word encryption, it often sounds like something only security researchers and intelligence agencies deal with. But in reality, every IT professional – even small teams, freelancers, or home users – should understand the basics of protecting sensitive files.

GnuPG (or GPG) is one of the most trusted tools for this. It’s free, open-source, built into every Linux distribution, and works perfectly for encrypting files, verifying downloads, or signing work-related documents.

This guide walks you through a clean, beginner-friendly setup – no advanced OPSEC, no air-gapped machines, no master-key rituals. Just the essentials that anyone at home or at work can start using today.

Continue reading “GPG Basics: Simple, Safe Encryption for Everyday IT Work”

Solo Development Doesn’t Need Corporate Git Workflows

Git is a powerful tool, but solo developers often inherit processes designed for large teams.
Corporate branching strategies solve coordination problems that an individual simply doesn’t have.
When you’re the only developer in the room, heavy processes become friction.
You don’t need gates, ceremonies, or complex merging rules to work effectively.

Continue reading “Solo Development Doesn’t Need Corporate Git Workflows”

Local LLMs for Privacy‑First Workflows A Practical Guide with LMStudio

Why run a language model on your own machine?

  1. Data stays local – No text leaves your computer, so sensitive information can’t be sent to the cloud.
  2. No API limits or costs – Once you have the model file, you’re not paying per request.
  3. Instant response time – The round‑trip latency of an internet call disappears; the model replies in milliseconds.

If you’re a developer, system admin, or just someone who values privacy, these benefits make local LLMs worth a look.

Continue reading “Local LLMs for Privacy‑First Workflows A Practical Guide with LMStudio”