Skip to content
View i-xul's full-sized avatar

Block or report i-xul

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
i-xul/README.md

Hi, I'm Henkka

I build and maintain practical Linux and self-hosted infrastructure, focusing on security, automation, and real-world system operations — from server environments to low-level hardware bring-up.

Areas I work on

  • self-hosted infrastructure design
  • Linux server administration
  • Nginx and Fail2ban hardening
  • backup automation
  • Raspberry Pi projects
  • self-hosted services
  • shell scripting and operational tooling
  • low-level Linux and hardware bring-up (ARM devices, postmarketOS)

Featured Projects

Raspberry Pi Self-Hosted Infrastructure

A multi-node self-hosted environment built on Raspberry Pi devices, including media services, cloud storage, DNS filtering, dashboards, automation workflows, and energy monitoring.

Covers architecture, services, operations, and real-world lessons learned from maintaining a live system.

Nginx + Fail2ban Hardening

A practical hardening setup for a self-hosted Linux web service using Nginx, Fail2ban, custom filters, and layered protection concepts.

Raspberry Pi Backup Automation

An automated SSH-based backup workflow with snapshot rotation, latest-snapshot symlink logic, and notification support.

Fail2ban Telegram Notifier

A lightweight Telegram integration for Fail2ban events to improve real-time visibility into suspicious activity on a self-hosted server.

postmarketOS on Samsung SM-T555

Linux bring-up and documentation for an older ARM tablet using lk2nd, fastboot, and XFCE4 — demonstrating Linux deployment on unsupported consumer hardware.

Multilingual Log Analysis

Python-based security log analysis project that detects suspicious multilingual attack patterns, including Cyrillic-based probes and login attempts in server logs.

How I work

I use AI tools as part of my workflow for ideation, debugging, and documentation, then test and adapt the final result manually in a real environment.

Current Focus

  • improving self-hosted Linux server reliability
  • documenting practical infrastructure projects
  • building a stronger public portfolio on GitHub

Interests

  • Self-hosted infrastructure
  • Security hardening
  • Electronics & analog circuit design (guitar effects, debugging, modifications, live-environment validation)
  • Eastern European history & languages (Finnish, English, some Ukrainian & Swedish)

Background

  • Vocational qualification in Electronics & Telecommunications

Pinned Loading

  1. raspi5-ubuntu-selfhosted-server raspi5-ubuntu-selfhosted-server Public

    Self-hosted Raspberry Pi 5 Ubuntu server with Docker, NFS storage, and real-world troubleshooting insights

  2. nginx-fail2ban-hardening nginx-fail2ban-hardening Public

    Practical Nginx and Fail2ban hardening for a self-hosted Linux server

  3. raspi-security-audit raspi-security-audit Public

    Weekly security audit automation for a Raspberry Pi server with baseline checks and email reporting

    Shell

  4. flask-mini-apps-raspberrypi flask-mini-apps-raspberrypi Public

    Small self-hosted Flask apps on Raspberry Pi with SQLite, Nginx reverse proxy, systemd services, and deployment troubleshooting notes

    HTML

  5. raspi-backup-automation raspi-backup-automation Public

    Automated backup workflow for a Raspberry Pi server with snapshot rotation and status notifications

    Shell

  6. multilingual-log-analysis multilingual-log-analysis Public

    Language-aware security log analysis tool for detecting multilingual attack patterns (Cyrillic, brute-force, suspicious payloads)

    Python