<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Andy J Blog - Trials of an IT Engineer</title><link>https://blog.ajolnet.com/</link><description>Personal Projects</description><generator>Hugo</generator><language>en-us</language><copyright>© 2025 Andrew Jones. All rights reserved.</copyright><lastBuildDate>Sat, 28 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://blog.ajolnet.com/categories/ssh/" rel="self" type="application/rss+xml"/><item><title>Unifi SSH Guide</title><link>https://blog.ajolnet.com/posts/unifi-ssh-guide/</link><pubDate>Sat, 28 Mar 2026 00:00:00 +0000</pubDate><guid>https://blog.ajolnet.com/posts/unifi-ssh-guide/</guid><description>&lt;h1 id="ssh-access-methods-for-unifi-devices"&gt;SSH Access Methods for UniFi Devices&lt;/h1&gt;
&lt;p&gt;SSH behaviour across the UniFi product family is not consistent. The UNAS Pro runs a full Debian-based Linux environment. UniFi switches run a proprietary firmware with a limited shell. UniFi gateways (UDM, UDM Pro, UXG) run a locked-down Linux environment with their own persistence model. Each requires a different approach and carries different caveats around authentication, key storage, and what survives a reboot or firmware update.&lt;/p&gt;</description></item><item><title>UNAS Pro Custom Fan Control via systemd</title><link>https://blog.ajolnet.com/posts/unas-pro-custom-fan-control-via-systemd/</link><pubDate>Sun, 08 Mar 2026 00:00:00 +0000</pubDate><guid>https://blog.ajolnet.com/posts/unas-pro-custom-fan-control-via-systemd/</guid><description>&lt;h1 id="unas-pro-custom-fan-control-via-systemd"&gt;UNAS Pro Custom Fan Control via systemd&lt;/h1&gt;
&lt;p&gt;The UNAS Pro&amp;rsquo;s stock fan control tends to run fans aggressively or inconsistently under modest loads. This documents replacing stock fan behaviour with a community-maintained PWM script that runs as a persistent systemd service, with temperature targets tuned for Seagate IronWolf drives.&lt;/p&gt;
&lt;p&gt;Script source: &lt;a href="https://github.com/hoxxep/UNAS-Pro-fan-control"&gt;hoxxep/UNAS-Pro-fan-control&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;I have also included a section on manual control, for cases where you are not filling all drive bays
and want to set a static fan speed. Personally I use this method as the device sits in a normal room
rather than a climate-controlled rack, and I am only running 2x HDD — it works well under those conditions.&lt;/p&gt;</description></item><item><title>Secure Hardware Telemetry with Caddy</title><link>https://blog.ajolnet.com/posts/secure-hardware-telemetry-with-caddy-reverse-proxy/</link><pubDate>Thu, 05 Feb 2026 00:00:00 +0000</pubDate><guid>https://blog.ajolnet.com/posts/secure-hardware-telemetry-with-caddy-reverse-proxy/</guid><description>&lt;h2 id="overview"&gt;Overview&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;The convergence of home lab infrastructure, remote systems administration, and Zero Trust networking principles has necessitated robust solutions for exposing internal telemetry without compromising security. This guide provides a comprehensive implementation for securing LibreHardwareMonitor using Caddy as a reverse proxy and Tailscale as the transport layer.&lt;/p&gt;
&lt;p&gt;The architecture moves beyond simple port forwarding, utilizing an overlay network (Tailscale) to render the service invisible to the public internet, while employing application-layer encryption (TLS) via Caddy. Version 5.0 adds HTTP Basic Authentication and granular firewall rule management, adhering to the principle of Defence in Depth.&lt;/p&gt;</description></item><item><title>ASCII Art Generator - Bitmap-Based Image to Character Conversion</title><link>https://blog.ajolnet.com/posts/ascii-art-generator/</link><pubDate>Sun, 25 Jan 2026 00:00:00 +0000</pubDate><guid>https://blog.ajolnet.com/posts/ascii-art-generator/</guid><description>&lt;h1 id="ascii-art-generator---image-to-character-bitmap-conversion"&gt;ASCII Art Generator - Image to Character Bitmap Conversion&lt;/h1&gt;
&lt;p&gt;&lt;em&gt;The resurrection of an old project that I have not touched for a very long time, this version is much improved. It can be used to make interesting images that are highly detailed and most importantly easy to use and maintain.&lt;/em&gt;&lt;/p&gt;
&lt;h2 id="overview"&gt;Overview&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;A Python script that converts images into coloured ASCII art using bitmap-based character matching.
This script analyzes images pixel-by-pixel and matches each region to ASCII characters based on visual similarity. It uses OpenCV for image processing, PIL for font rendering, and NumPy for bitmap comparison operations.&lt;/p&gt;</description></item><item><title>Linux Double-Lock Deletion Protection - SOP</title><link>https://blog.ajolnet.com/posts/anti-rm--rf/</link><pubDate>Sun, 25 Jan 2026 00:00:00 +0000</pubDate><guid>https://blog.ajolnet.com/posts/anti-rm--rf/</guid><description>&lt;h1 id="the-evil-command"&gt;The Evil Command&lt;/h1&gt;
&lt;p&gt;&lt;em&gt;A single command, or a slight variation of it, has led to the death of thousands of innocent servers. The most frustrating part? It is entirely preventable. I consider the following setup a mandatory part of any deployment process—even for non-production systems. For a sobering reminder of the absolute worst-case scenario, &lt;a href="https://www.reddit.com/r/cscareerquestions/comments/1qjsfv8/accidentally_rm_rfd_a_production_server/"&gt;read this account&lt;/a&gt; of a production server being wiped in an instant.&lt;/em&gt;&lt;/p&gt;
&lt;h2 id="standard-operating-procedure-the-double-lock"&gt;Standard Operating Procedure: The &amp;ldquo;Double-Lock&amp;rdquo;&lt;/h2&gt;
&lt;hr&gt;
&lt;blockquote&gt;
&lt;p&gt;This SOP establishes a redundant protection system for Debian-based servers to prevent catastrophic data loss caused by accidental &lt;code&gt;rm -rf /&lt;/code&gt; execution.&lt;/p&gt;</description></item><item><title>Windows 11 Pro Installation - Bypassing BIOS Embedded Home Key</title><link>https://blog.ajolnet.com/posts/windows-home-autopilot-bypass-guide/</link><pubDate>Tue, 20 Jan 2026 00:00:00 +0000</pubDate><guid>https://blog.ajolnet.com/posts/windows-home-autopilot-bypass-guide/</guid><description>&lt;p&gt;Guide for installing Windows 11 Pro on devices with OEM Home edition keys embedded in BIOS/UEFI firmware.&lt;/p&gt;
&lt;h2 id="problem-overview"&gt;Problem Overview&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;Many OEM devices (Dell, HP, Lenovo, etc.) have Windows Home product keys embedded in the BIOS MSDM table. During Windows Setup, this key is detected automatically and forces Home edition installation, bypassing edition selection entirely.&lt;/p&gt;
&lt;p&gt;This causes issues for:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Autopilot deployments (Home cannot join Entra ID)&lt;/li&gt;
&lt;li&gt;Enterprise environments requiring Pro features&lt;/li&gt;
&lt;li&gt;Domain join scenarios&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="solution-methods"&gt;Solution Methods&lt;/h2&gt;
&lt;hr&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Method&lt;/th&gt;
&lt;th&gt;Best For&lt;/th&gt;
&lt;th&gt;Requires&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;ISO Modification&lt;/td&gt;
&lt;td&gt;Future deployments, multiple devices&lt;/td&gt;
&lt;td&gt;AnyBurn or 7-Zip, ISO access&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Post-Install Upgrade&lt;/td&gt;
&lt;td&gt;Immediate need, single device&lt;/td&gt;
&lt;td&gt;Time for reset cycle&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h2 id="method-1-iso-modification-recommended"&gt;Method 1: ISO Modification (Recommended)&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;Inject ei.cfg and pid.txt into the Windows ISO to force Pro edition selection.&lt;/p&gt;</description></item><item><title>Microsoft Intune Autopilot and Windows LAPS Deployment Guide</title><link>https://blog.ajolnet.com/posts/microsoft-intune-autopilot-and-windows-laps-deployment-guide/</link><pubDate>Sat, 17 Jan 2026 00:00:00 +0000</pubDate><guid>https://blog.ajolnet.com/posts/microsoft-intune-autopilot-and-windows-laps-deployment-guide/</guid><description>&lt;p&gt;This guide documents the complete process for deploying Windows devices via Autopilot with integrated Windows LAPS password management. All configurations have been lab-verified on Windows 11 25H2 in a pure Azure AD/Entra joined environment.&lt;/p&gt;
&lt;p&gt;The guide covers tenant configuration from scratch, custom local administrator account naming, passphrase-based passwords, BitLocker key escrow, and troubleshooting common policy conflicts.&lt;/p&gt;
&lt;h2 id="prerequisites-and-licensing"&gt;Prerequisites and Licensing&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;Before configuring Autopilot, LAPS, or BitLocker, the tenant must have appropriate licensing. Missing licenses cause silent failures during OOBE deployment.&lt;/p&gt;</description></item><item><title>Deep NAT OpenVPN Lab Access: Troubleshooting Silent Firewall Failures</title><link>https://blog.ajolnet.com/posts/deep-nat-openvpn-lab-access/</link><pubDate>Sun, 04 Jan 2026 00:00:00 +0000</pubDate><guid>https://blog.ajolnet.com/posts/deep-nat-openvpn-lab-access/</guid><description>&lt;h2 id="overview"&gt;Overview&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;I have been working on putting together a Lab following an excellent guide that can be found at the end of the paragraph.&lt;br&gt;
I am not taking any credit for the amazing work demonstrated by David Varghese but I would like to promote it in the hope that others who have a keen interest to learn new and exciting skills can follow along.
I digress; my current setup is really geared as an adaptation of the Lab topology that I picked up from David Varghese’s website. During this process of adaptation I really wanted to learn about PKI - Public Key Infrastructure and building my own VPN tunnel from scratch via Easy-RSA this is used to generate the PKI certificate chain in a Windows environment, this project was not simple and I did run into small issues along the way but when trying to test external connectivity from the internet using my mobile device I ran into an issue that I could not resolve. this article documents my solution.
Link to David’s Lab guide - &lt;a href="https://blog.davidvarghese.net/posts/building-home-lab-part-1/"&gt;https://blog.davidvarghese.net/posts/building-home-lab-part-1/&lt;/a&gt;&lt;/p&gt;</description></item><item><title>Solving Cloudflare DDNS in Double NAT Environments</title><link>https://blog.ajolnet.com/posts/ddns-double-nat/</link><pubDate>Sun, 28 Dec 2025 00:00:00 +0000</pubDate><guid>https://blog.ajolnet.com/posts/ddns-double-nat/</guid><description>&lt;h2 id="the-problem"&gt;The Problem&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;I needed remote VPN access to my home network. The setup seemed straightforward: configure OpenVPN on my UniFi Dream Router, set up Cloudflare DDNS to handle my dynamic IP, and connect from anywhere. Simple enough, right?&lt;/p&gt;
&lt;p&gt;Not quite.&lt;/p&gt;
&lt;p&gt;I am very aware that this is not the ideal setup but since my Vigor-130 has not yet arrived I needed a good solution that would work in the mean time. This is what I came up with, the UDR is more than capable of doing this but only using PPOE passthrough as my WAN link is only VDSL. I do a lot of labs that need VPNs to work and the below solution works very well.&lt;/p&gt;</description></item><item><title>Microsoft Intune Application Deployment: The Complete Enterprise Guide</title><link>https://blog.ajolnet.com/posts/intune/</link><pubDate>Thu, 27 Nov 2025 00:00:00 +0000</pubDate><guid>https://blog.ajolnet.com/posts/intune/</guid><description>&lt;h2 id="introduction-modern-application-management-with-intune"&gt;Introduction: Modern Application Management with Intune&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;Microsoft Intune represents a fundamental shift in how enterprises deploy and manage applications. Moving from traditional on-premises solutions like SCCM (System Center Configuration Manager) to cloud-based mobile device management (MDM) and mobile application management (MAM), Intune provides unified endpoint management for devices across Windows, macOS, iOS, Android, and Linux platforms.&lt;/p&gt;
&lt;p&gt;This guide provides enterprise-grade implementation strategies, best practices, and troubleshooting procedures for application deployment through Microsoft Intune. Whether you&amp;rsquo;re migrating from SCCM, implementing Intune for the first time, or optimizing an existing deployment, this comprehensive reference covers everything you need.&lt;/p&gt;</description></item><item><title>QtScrcpy: Professional Android Screen Mirroring and Remote Control</title><link>https://blog.ajolnet.com/posts/mobile-rdp/</link><pubDate>Thu, 27 Nov 2025 00:00:00 +0000</pubDate><guid>https://blog.ajolnet.com/posts/mobile-rdp/</guid><description>&lt;h2 id="executive-summary"&gt;Executive Summary&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;QtScrcpy is a free, open-source Android screen mirroring and control application that enables real-time display and control of Android devices from Windows, macOS, and Linux computers. Built on top of the highly regarded scrcpy project from Genymobile, QtScrcpy enhances the original with a Qt-based graphical interface, advanced features like custom key mapping, batch device control, and enterprise-grade performance specifications including sub-30ms latency and support for managing 500+ devices simultaneously.&lt;/p&gt;</description></item><item><title>Tailscale: The Zero-Trust Network That Changed How I Manage Infrastructure</title><link>https://blog.ajolnet.com/posts/tailscale/</link><pubDate>Sun, 23 Nov 2025 00:00:00 +0000</pubDate><guid>https://blog.ajolnet.com/posts/tailscale/</guid><description>&lt;h2 id="introduction-rethinking-network-access"&gt;Introduction: Rethinking Network Access&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;For years, managing remote access to my infrastructure followed the same tired pattern: OpenVPN configurations that broke after updates, port forwarding that exposed services to the internet, or restrictive firewalls that made simple SSH access feel like navigating a maze.&lt;/p&gt;
&lt;p&gt;I currently still use a VPN that I manage and run via the old methodology, peer management, server etc but as a form of redundancy Tailscale is, for me, the gold standard.&lt;/p&gt;</description></item><item><title>Building a Safe WireGuard Peer Management Script</title><link>https://blog.ajolnet.com/posts/wiregaurd/</link><pubDate>Thu, 20 Nov 2025 00:00:00 +0000</pubDate><guid>https://blog.ajolnet.com/posts/wiregaurd/</guid><description>&lt;h2 id="the-problem-with-manual-wireguard-management"&gt;The Problem with Manual WireGuard Management&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;Managing WireGuard peers manually can be error-prone. After accidentally deleting an active peer with my old management script, I needed something better - a tool that would never overwrite existing configurations and always create backups before making changes. This makes adding new devices to my personal network much easier. Also it is worth mentioning that this allows you to set the parameters for you specific devices in accordance to the use case without the need to do this manually.&lt;/p&gt;</description></item><item><title>Linux User Management, Permissions, and Navigation Guide</title><link>https://blog.ajolnet.com/posts/linux-user-management/</link><pubDate>Wed, 19 Nov 2025 00:00:00 +0000</pubDate><guid>https://blog.ajolnet.com/posts/linux-user-management/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;This comprehensive guide covers everything you need to know about Linux user management, file permissions, system navigation, and file operations. Whether you&amp;rsquo;re a beginner or an experienced user, this reference will help you master Linux system administration. Also a good application that you can use after you grasp the basics is Midnight Commander - &lt;a href="https://midnight-commander.org"&gt;https://midnight-commander.org&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;A highly regarded tool to make file management easier and more like working within a regular desktop environment.&lt;/p&gt;</description></item><item><title>Joining the War for Team Blue</title><link>https://blog.ajolnet.com/posts/joining-the-war/</link><pubDate>Sun, 16 Nov 2025 00:00:00 +0000</pubDate><guid>https://blog.ajolnet.com/posts/joining-the-war/</guid><description>&lt;h2 id="my-digital-wake-up-call"&gt;My Digital Wake-Up Call&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;I&amp;rsquo;m new to the reality of the internet as a battleground—though maybe it always was one. I&amp;rsquo;ve recently taken the plunge, striving to learn as much as I can and develop my skills in multiple areas simultaneously, especially cybersecurity.&lt;/p&gt;
&lt;p&gt;This journey has led me to a much more serious consideration of internet-facing security and the severe implications of ignoring it.&lt;/p&gt;
&lt;p&gt;Waking up to personal security alerts screaming that my infrastructure was under attack was a peculiar experience. Yet, it became a valuable learning opportunity. I decided not just to follow the automated tool&amp;rsquo;s recommendations, but to go beyond them.&lt;/p&gt;</description></item><item><title>Improved Backup Script Usage Guide</title><link>https://blog.ajolnet.com/posts/improved-backup-script-usage-guide/</link><pubDate>Sat, 08 Nov 2025 10:00:00 +0000</pubDate><guid>https://blog.ajolnet.com/posts/improved-backup-script-usage-guide/</guid><description>&lt;h1 id="improved-backup-script-usage-guide"&gt;Improved Backup Script Usage Guide&lt;/h1&gt;
&lt;hr&gt;
&lt;p&gt;This comprehensive guide covers the enhanced backup script with advanced features like compression, incremental backups, and automated reporting. Whether you&amp;rsquo;re a system administrator or a developer managing server backups, this guide will help you implement reliable backup strategies with performance optimization and verification capabilities.&lt;/p&gt;
&lt;h2 id="overview"&gt;Overview&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;The improved backup script provides good backup capabilities with enhanced features for modern system administration needs. Built on robust technologies like rsync and tar with optional parallel compression, it offers both full system backups and space-efficient incremental backups while maintaining data integrity through verification processes.&lt;/p&gt;</description></item><item><title>Basic Penetration Testing Kali Linux</title><link>https://blog.ajolnet.com/posts/remote-penetration-testing-kali-linux/</link><pubDate>Sat, 08 Nov 2025 00:00:00 +0000</pubDate><guid>https://blog.ajolnet.com/posts/remote-penetration-testing-kali-linux/</guid><description>&lt;h1 id="remote-penetration-testing-guide-kali-linux"&gt;Remote Penetration Testing Guide: Kali Linux&lt;/h1&gt;
&lt;hr&gt;
&lt;p&gt;&lt;strong&gt;Hacking your own infrastructure with Kali Linux.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This is an example of a script I created for very basic testing to practice my Linux scripting and to make sure my VPS servers remain secure. It is not an in-depth attempt to break things, but it is an attempt to gain more experience with a side of IT that I have little, to no experience in beyond some basic Steganography, which I did in university. Even then that was not related to pen testing but to cryptography. The simple truth is I am lazy and so instead of spending ages collecting all the commands needed to mount an attack / vulnerability scan. I can save a lot of time by automating this process, the below shell script is the result. It works when testing and has given me some ideas. But please be advised it is on the extreme end of simple.&lt;/p&gt;</description></item><item><title>Network Topology Report Generator</title><link>https://blog.ajolnet.com/posts/network-topology-report-generator/</link><pubDate>Sat, 08 Nov 2025 00:00:00 +0000</pubDate><guid>https://blog.ajolnet.com/posts/network-topology-report-generator/</guid><description>&lt;h1 id="network-topology-report-generator"&gt;Network Topology Report Generator&lt;/h1&gt;
&lt;p&gt;&lt;strong&gt;Brief introduction:&lt;/strong&gt; The Network Topology Report Generator is a comprehensive bash script that automatically documents your entire network infrastructure. Whether you&amp;rsquo;re managing VPS servers, home labs, or enterprise networks, this tool creates detailed reports covering interfaces, routing, VPN connections, firewall rules, Docker networks, and active services. Perfect for troubleshooting, documentation, compliance audits, or understanding inherited infrastructure.&lt;/p&gt;
&lt;p&gt;I created this as a vanity project as I really like seeing changes in my network and I had the idea to create it, I am unsure as to it utility outside of my use case but I did have a lot of fun troubleshooting it.&lt;/p&gt;</description></item><item><title>Veeam Application Introduction</title><link>https://blog.ajolnet.com/posts/veeam/</link><pubDate>Sat, 08 Nov 2025 00:00:00 +0000</pubDate><guid>https://blog.ajolnet.com/posts/veeam/</guid><description>&lt;hr&gt;
&lt;h1 id="comprehensive-guide-veeam-agent-level-backups-with-user-self-service"&gt;Comprehensive Guide: Veeam Agent-Level Backups with User Self-Service&lt;/h1&gt;
&lt;h2 id="linux-vms--windows-workstations"&gt;Linux VMs &amp;amp; Windows Workstations&lt;/h2&gt;
&lt;hr&gt;
&lt;hr&gt;
&lt;h2 id="overview"&gt;Overview&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;This guide covers implementing Veeam agent-level backups for Linux VMs and Windows workstations with user self-service capabilities, allowing remote users to initiate and manage their own backups while maintaining centralized control.&lt;/p&gt;
&lt;h3 id="key-capabilities"&gt;Key Capabilities&lt;/h3&gt;
&lt;hr&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Centralized Management&lt;/strong&gt;: Manage agents from Veeam Backup &amp;amp; Replication console&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;User Self-Service&lt;/strong&gt;: Users can initiate backups from their machines&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Flexible Control&lt;/strong&gt;: Choose between full control and read-only modes&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Cross-Platform&lt;/strong&gt;: Unified approach for Linux and Windows systems&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;h2 id="architecture--concepts"&gt;Architecture &amp;amp; Concepts&lt;/h2&gt;
&lt;hr&gt;
&lt;h3 id="agent-operation-modes"&gt;Agent Operation Modes&lt;/h3&gt;
&lt;hr&gt;
&lt;p&gt;&lt;strong&gt;1. Standalone Mode&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>My Role at GMA: A Professional Journey on the Helpdesk</title><link>https://blog.ajolnet.com/posts/my-professional-journey/</link><pubDate>Thu, 30 Oct 2025 14:53:39 +0000</pubDate><guid>https://blog.ajolnet.com/posts/my-professional-journey/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;My journey at GMA Began one year ago when I joined the team as a Helpdesk technician. Little did I know that this role would become one of the most transformative experiences of my professional career, shaping my skills, perspectives, and approach in IT.&lt;/p&gt;
&lt;h2 id="the-company-and-my-role"&gt;The Company and My Role&lt;/h2&gt;
&lt;hr&gt;
&lt;h3 id="about-gma"&gt;About GMA&lt;/h3&gt;
&lt;hr&gt;
&lt;p&gt;GMA is a small-to-medium-sized MSP that operates across all areas of IT. The company runs a lean operation, featuring a remarkably busy helpdesk often referred to as the “coal face.” The workload was consistently high—not rushed, but characterized by a sustained flow of tickets.&lt;/p&gt;</description></item><item><title>Self Hosting a New Blog</title><link>https://blog.ajolnet.com/posts/my-it-journey-begins/</link><pubDate>Thu, 30 Oct 2025 14:53:39 +0000</pubDate><guid>https://blog.ajolnet.com/posts/my-it-journey-begins/</guid><description>&lt;p&gt;Welcome to my new blog! After years working in IT, I&amp;rsquo;ve decided to document my journey, share what I&amp;rsquo;m learning, and create a resource for others in the technology field.&lt;/p&gt;</description></item><item><title>My Current Custom PC Build - 2025</title><link>https://blog.ajolnet.com/posts/current-workstation-custom-built/</link><pubDate>Thu, 30 Oct 2025 10:00:00 +0000</pubDate><guid>https://blog.ajolnet.com/posts/current-workstation-custom-built/</guid><description/></item><item><title>Contact Me</title><link>https://blog.ajolnet.com/contact/</link><pubDate>Wed, 18 Oct 2023 00:00:00 +0000</pubDate><guid>https://blog.ajolnet.com/contact/</guid><description>&lt;h2 id="email--phone"&gt;Email &amp;amp; Phone&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;&lt;strong&gt;Email:&lt;/strong&gt; &lt;a href="mailto:Stoicturk182@protonmail.com"&gt;Stoicturk182@protonmail.com&lt;/a&gt;
&lt;strong&gt;Phone:&lt;/strong&gt; (44) 07990338386
&lt;strong&gt;Location:&lt;/strong&gt; London, UK&lt;/p&gt;
&lt;h2 id="social-media"&gt;Social Media&lt;/h2&gt;
&lt;hr&gt;
&lt;ul&gt;
&lt;li&gt;GitHub: &lt;a href="https://github.com/StoicTurk182"&gt;StoicTurk182&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;LinkedIn: &lt;a href="https://www.linkedin.com/in/andrew-john-j-780177300"&gt;Andrew Jones&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="contact-form"&gt;Contact Form&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;You can also reach me using the form below:&lt;/p&gt;
&lt;form action="https://formspree.io/f/xovppvjo" method="POST"&gt;
&lt;div style="margin-bottom: 1rem;"&gt;
&lt;label for="name" style="display: block; margin-bottom: 0.5rem;"&gt;Your Name:&lt;/label&gt;
&lt;input type="text" id="name" name="name" required style="width: 100%; padding: 0.5rem; border: 0px solid #ccc; border-radius: 4px;"&gt;
&lt;/div&gt;
&lt;div style="margin-bottom: 1rem;"&gt;
&lt;label for="email" style="display: block; margin-bottom: 0.5rem;"&gt;Your Email:&lt;/label&gt;
&lt;input type="email" id="email" name="email" required style="width: 100%; padding: 0.5rem; border: 0px solid #ccc; border-radius: 4px;"&gt;
&lt;/div&gt;
&lt;div style="margin-bottom: 1rem;"&gt;
&lt;label for="message" style="display: block; margin-bottom: 0.5rem;"&gt;Message:&lt;/label&gt;
&lt;textarea id="message" name="message" rows="5" required style="width: 100%; padding: 0.5rem; border: 0px solid #ccc; border-radius: 4px;"&gt;&lt;/textarea&gt;
&lt;/div&gt;
&lt;p&gt;&lt;button type="submit" style="background-color:rgb(34, 39, 45); color: white; padding: 0.75rem 1.5rem; border: none; border-radius: 4px; cursor: pointer;"&gt;Send Message&lt;/button&gt;&lt;/p&gt;</description></item><item><title>Dark Reader</title><link>https://blog.ajolnet.com/tools/dark-reader/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://blog.ajolnet.com/tools/dark-reader/</guid><description>&lt;h1 id="dark-reader"&gt;Dark Reader&lt;/h1&gt;
&lt;p&gt;Dark Reader is an open-source browser extension that inverts bright website colors into high-contrast, easy-to-read dark themes. It reduces eyestrain during night and daily browsing by applying dark modes to websites on the fly.&lt;/p&gt;
&lt;h2 id="overview"&gt;Overview&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;This eye-care extension enables night mode by creating dark themes for websites dynamically. Dark Reader doesn&amp;rsquo;t simply invert colors; it intelligently analyzes website style sheets, background images, and vector graphics to produce optimal visual results. Trusted by over 10 million users, the extension doesn&amp;rsquo;t show ads and doesn&amp;rsquo;t collect or send user data anywhere.&lt;/p&gt;</description></item><item><title>iVentoy PXE Server</title><link>https://blog.ajolnet.com/tools/iventoy-pxe-server/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://blog.ajolnet.com/tools/iventoy-pxe-server/</guid><description>&lt;h1 id="iventoy-pxe-server"&gt;iVentoy PXE Server&lt;/h1&gt;
&lt;p&gt;iVentoy is an enhanced PXE server that allows you to boot and install multiple operating systems simultaneously over the network directly from ISO files, eliminating the need for individual bootable USB drives.&lt;/p&gt;
&lt;h2 id="overview"&gt;Overview&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;iVentoy brings the multi-boot convenience of Ventoy to network deployment. It serves as a central network boot server that can handle over 110 different operating systems without requiring ISO extraction or modification. Originally created by the developer of Ventoy, it&amp;rsquo;s designed for both home labs and enterprise environments.&lt;/p&gt;</description></item><item><title>Process Lasso</title><link>https://blog.ajolnet.com/tools/process-lasso/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://blog.ajolnet.com/tools/process-lasso/</guid><description>&lt;h1 id="process-lasso"&gt;Process Lasso&lt;/h1&gt;
&lt;p&gt;Process Lasso is an innovative system optimization and automation software that improves PC performance, responsiveness, and stability through process priority optimization, CPU affinity management, and proactive system monitoring.&lt;/p&gt;
&lt;h2 id="overview"&gt;Overview&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;Process Lasso works in the background to optimize your system&amp;rsquo;s process scheduling, ensuring that important applications get the CPU resources they need while preventing background processes from degrading system responsiveness. It&amp;rsquo;s particularly effective for gamers, content creators, and power users who demand maximum system performance.&lt;/p&gt;</description></item><item><title>Royal TS</title><link>https://blog.ajolnet.com/tools/royal-ts/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://blog.ajolnet.com/tools/royal-ts/</guid><description>&lt;h1 id="royal-ts"&gt;Royal TS&lt;/h1&gt;
&lt;p&gt;Royal TS is a powerful remote management solution for Windows that provides unified access to various remote connections including RDP, VNC, SSH, web pages, and more through a single, tabbed interface.&lt;/p&gt;
&lt;h2 id="overview"&gt;Overview&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;This professional-grade remote management tool consolidates multiple connection types into one intuitive application, eliminating the need for separate tools for different protocols. Royal TS offers both free and paid versions with enterprise-grade features for IT professionals, system administrators, and power users.&lt;/p&gt;</description></item><item><title>Search</title><link>https://blog.ajolnet.com/search/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://blog.ajolnet.com/search/</guid><description/></item><item><title>Sysinternals Suite</title><link>https://blog.ajolnet.com/tools/sysinterals-suit/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://blog.ajolnet.com/tools/sysinterals-suit/</guid><description>&lt;h1 id="sysinternals-suite"&gt;Sysinternals Suite&lt;/h1&gt;
&lt;p&gt;The Sysinternals Suite is an extensive collection of more than 70 individual utilities, bundled together for IT professionals, system administrators, and developers. These tools provide deep insight into the inner workings of the Windows operating system, allowing for advanced troubleshooting, diagnostic analysis, and system monitoring. Originally created by Mark Russinovich, the suite is now officially maintained by Microsoft.&lt;/p&gt;
&lt;h2 id="key-featured-utilities"&gt;Key Featured Utilities&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;While the suite contains many tools, some of the most powerful and frequently used include[citation:1][citation:5]:&lt;/p&gt;</description></item><item><title>YUMI Multiboot USB Creator</title><link>https://blog.ajolnet.com/tools/yumi-multiboot-usb-creator/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://blog.ajolnet.com/tools/yumi-multiboot-usb-creator/</guid><description>&lt;h1 id="yumi-multiboot-usb-creator"&gt;YUMI Multiboot USB Creator&lt;/h1&gt;
&lt;p&gt;YUMI (Your Universal Multiboot Integrator) is a powerful tool that allows you to create a bootable USB drive containing multiple operating systems, antivirus utilities, disc cloning, diagnostic tools, and more.&lt;/p&gt;
&lt;h2 id="overview"&gt;Overview&lt;/h2&gt;
&lt;hr&gt;
&lt;p&gt;YUMI makes it easy to create a multiboot USB drive that can boot various Linux distributions, Windows installers, and system utilities from a single device. It&amp;rsquo;s the successor to MultibootISOs and uses syslinux to boot extracted distributions from the USB device.&lt;/p&gt;</description></item></channel></rss>