Full Time Student
2012–2016Community college, family company IT, and local car wash > detailer to sales, training for assistant manager before moving into corporate IT.
Home Page
IT Technician of 9+ years turned engineer. Primary skills in Linux, Python, and PowerShell. Secondary skills in Gaming, Music, and doom-scrolling on social media.
Community college, family company IT, and local car wash > detailer to sales, training for assistant manager before moving into corporate IT.
Campus Support Technician in education: multiple campuses, inventory, projects, semi‑annual maintenance, preparing for lead technician role.
International company, focused on end‑user experience, scripting, automation, Apple device management, project management, and server admin.
Private sector in NYC: collaboration, scripting, networking, security, and improving end‑user experiences.
Guide to setting up dual Pi-hole with Docker for redundant DNS ad-blocking using two NICs. Covers prerequisites, deployment via Docker Compose, customization, and optimization for resilient networks.
Managing secrets effectively is crucial for secure infrastructure. Infisical is a containerized solution for storing API keys, passwords, etc., securely via Docker. It offers self-hosting, simplicity, and flexibility for all project sizes.
Introduction When it comes to managing and updating Docker containers, it can often feel like a time-consuming process to keep everything running smoothly. That&
Effective logging is crucial for security and system reliability. Graylog, an open-source log management tool, simplifies monitoring and analysis, catering to self-hosting enthusiasts and enterprises alike.
Self-hosting ChatGPT with Ollama offers greater data control, privacy, and security. This open-source application runs locally on MacOS, Windows, and Linux. Interact via Open WebUI and share files securely.
SSH is the backbone of remote server administration, allowing seamless access and secure file transfers in Linux environments. However, without proper security measures, it can become a potential gateway for unauthorized access and malicious activities.
It's almost 2023, now is the time to review your security measures.
Email can be spoofed, even when the domain isn't being used for email services.
Websites can be compromised.
Security through obscurity refers to the idea of obscuring or the state of being unknown as a way to protect against cyber threats.