Hi I am Liam, welcome to my blog

Streamlining IT Workflows How to Set Up a FOG Server for Enterprise Grade Imaging and Deployment

How to Set Up FOG Server for Windows 10 Imaging and Deployment This guide walks you through installing and configuring a FOG (Free Open-source Ghost) server to capture and deploy Windows 10 images across networked machines. Prerequisites Before starting, ensure you have the following: Windows Server 2019 with the DHCP Server role enabled. Ubuntu Server (20.04 LTS or later) for hosting FOG. Two Windows 10 Client Machines: Reference Machine: To capture the base Windows 10 image. Target Machine: To deploy the captured image. All devices must be on the same network. Step 1: Install FOG on Ubuntu Server 1. Install Git Open a terminal on your Ubuntu server and run: ...

February 2, 2025 · 3 min

Setting Up Bitlocker With Windows AD

What is BitLocker? BitLocker is a tool used to encrypt Windows computers. It can use a password, PIN, or/and TPM in your computer. This is useful in case your computer gets stolen or someone tries to boot from another drive. It ensures that if someone inserts a USB flash drive with Linux on it, the attacker can’t read the files on the Windows drive or, more importantly, access the SAM file (where password hashes are stored). ...

January 11, 2025 · 3 min

Unfi IoT Firewall Rules

What is the goal? The goal is to set up basic firewall rules to stop networks from communicating with each other and, more importantly, to stop IoT devices from talking to other devices. The reason we want to do this is because IoT devices are horrible for security. This is because vendors don’t update the devices or don’t update them often. If something has technology in it, it CAN AND WILL be hacked. It is a question of when and not if. So to stop other devices from being affected, just cut them off from the network. ...

January 3, 2025 · 2 min

Vulnerabilities Scan With OpenVAS

What is OpenVAS? OpenVAS (Open Vulnerability Assessment System) is a comprehensive vulnerability scanner and security assessment tool. It’s part of Greenbone Security Manager and performs network security testing by scanning systems for thousands of known vulnerabilities and misconfigurations. The tool uses a regularly updated feed of Network Vulnerability Tests (NVTs) to detect security issues, provides detailed reports, and can be managed through a web interface. OpenVAS is popular among security professionals and system administrators because it’s open-source and offers capabilities similar to commercial vulnerability scanners. ...

January 1, 2025 · 2 min

ACL

What are ACLs? ACL (Access Control List) is a technology that allows administrators to control access to the network by filtering packets based on source/destination IP, layer 4 ports, etc. This is set on the interface either inbound or outbound. The list is processed from top to bottom. So if you have a list that goes 2,3,1, the order of processing would be 2 then 3 then 1. Types of ACL There are two types: extended and standard. The difference is that standard ACLs are only based on source IP address, but extended ACLs are based on source/destination IP addresses or port numbers. Standard ACLs can only use numbers 1-99 or 1300-1999. ...

December 28, 2024 · 2 min