diff --git a/requested_topics/README.md b/requested_topics/README.md
new file mode 100644
index 0000000..1ccb1a8
--- /dev/null
+++ b/requested_topics/README.md
@@ -0,0 +1,92 @@
+# Requested topics
+
+This is a list of topics that have been requested by the community.
+
+## General
+
+- How did you get into podcasting/linux/geekdom?
+- What podcasts you listen to and can recommend
+- What's in your bag? Tell us what tools/gear/stuff you keep close at hand.
+- What got you into Linux?
+- Your favorite Android applications.
+- Your favorite desktop applications.
+- Your favorite browser extensions.
+- A introduction to Wireshark.
+- How to set up your own blog.
+- Choosing a artistic design for website, business cards etc.
+- Music Theory
+- Installing a VPN to your home network
+- Init and System.d
+- Episodes for the LPI, or the Networking series.
+- Beginning Audio Series for HPR and OSMP Release
+- Hackintosh computers - what are they, why would you want one.
+- Grub 2.0 introduction and customization.
+- FM Transmitter hack to listen into internet streams
+- How I Got Into Accessible Computing
+- How to do knitting
+- How to build a house
+- How to solder hpr1037,
+ hpr1047
+- How to weld
+- How to fix a car
+- Reviews of stream playing software, (for linuxheads who don't want to keep a browser tab open all the time)
+- Reviews of stream ripping software on linux
+- Beginners guide to gnuplot
+- Nagios series, intro, setup, advanced ...
+- How to set up GPG/openPGP
+- What I do with my Raspberry Pi
+- It broke, I fixed it
+- How does coreboot work
+- Introduction to HAM Radio
+- I've moved and they do it like this here
+- How to record a tag team tutorial on a topic
+- Open Street Map new editor
+- etymology
+- functional versus procedural programming
+- sed, awk and grep
+- Setting up imap/smtp (gmail) in a cli mail program
+- Irssi - a sane setup
+- Your view of the future
+- Alternative uses for Bayesian email classifiers (more info)
+- How to use a multimeter, and other basic electronic components like a 555 timer
+- How does Hubble remain fixed on a spot in space while in orbit of the earth
+- Gnu automake system.
+- Any experiences integrating Dell/Wyse thin- and zero- clients into linux networks.
+- What Are the Answers I Need, To the Questions I Don't Know Enough to Ask?
+
+## Networking
+
+### IPv6
+
+- What is an IP address, and what is IPv6 - basic settings. Why can't we just NAT at the ISP level, are there privacy issues in having your MAC address as part of your IP?
+- How to setup IPv6 on Linux, BSD, Windows, Mac, Spark, Android etc
+- IPv6 Addressing terminology , format, shortcuts, address structure, (link local, unique and global), reservations, subnetting, allocation
+- IPv6 Firewall, what to block what to allow
+- Packet structure
+- Troubleshooting IPv6 network issue, using common tools with IPv6, ping icmp, telnet, curl, tcpdump, wireshark,etc
+- How discovery is handled, what is used for dhcp
+- DNS server setup
+- Routing server setup
+- Setting up common services like ssh, apache, nginx
+- Setting up VPN like wireguard
+- Explanation of the new Anycast and why you would use it.
+- Transition plans tips and tricks.
+
+
+## Security
+
+What do we need for a firewall and what are the detection/prevention technologies that we could be implementing?
+Beyond Firewall and an IDS/IPS, what do I need?
+If you were to treat your home network like a corporate server farm, what tools and hardware would it entail to treat your home network like a security professional?
+Should one use a secondary IDS, behind the firewall, to record what the primary defenses missed.
+Where and how do I set that up?
+Beyond firewall and IDS, what other tools should we be running ?
+Where should they be in my network, and how many physical boxes are we talking about ?
+Emphasis should be on low power devices and free as in beer tools.
+
+How to Read Logs and Formulate a Response to an Intrusion.
+What I've learned from SW, is that you can't prevent an intrusion, it's how to respond when you are compromised.
+Again, according to SW, the security manager's job is to detect intrusions, inside 48 hours rather than 48 months.
+How can you protect your proprietary data and customer database?
+Better uses for IPFS and IPNS to get a better understanding of practical use of this.
+