Q: How does a security geek maintain a brain dump of hard-to-remember processes without running hella-vulnerable blogging software?
A: Bulleted lists, written in Plain ol' HTML*.
The below contain procedural documentation at varying degrees of detail. Sometimes, you'll get a Big Writeup™, sometimes you'll get just the bullet list. Sometimes, you'll just get a pile of *nix commands. Caveat lector/use at your own risk/here be dragons, etc.