Hi I am Liam, weclome to my blog

Step by Step Guide to GPU Passthrough on Proxmox VE

Why You Would Need GPU Passthrough GPU passthrough is essential for scenarios where high-performance graphics are required within virtual machines. This technology allows a VM to leverage the full power of a physical GPU, which is crucial for tasks such as gaming, video editing, 3D rendering, and machine learning. By enabling GPU passthrough, you can achieve near-native performance for these resource-intensive applications, making your virtualized environment much more versatile and powerful....

<span title='2024-07-02 09:22:11 -0500 CDT'>July 2, 2024</span>&nbsp;·&nbsp;2 min

How to Pass CompTIA Security+ 601

Why Get the Security+ Certification If you want a job in the government dealing with sensitive information, you will need the Security+ certification. Jobs like System Administrator, Security Analyst, Network Administrator, or IT Auditor often require it. While it won’t guarantee you the job, it will significantly boost your chances. Besides job opportunities, this certification will also help you build a strong foundation in cybersecurity, which is essential for career growth and development....

<span title='2024-07-02 07:34:26 -0500 CDT'>July 2, 2024</span>&nbsp;·&nbsp;2 min

A Step by Step Guide to Setting Up and Sharing Network Drives Using Group Policy

How to Set-Up-and-Sharing-Network-Drives-Using-Group-Policy Setting up and sharing a network drive can streamline access to resources within your organization, making file sharing more efficient and secure. Whether you’re a small business or a large enterprise, leveraging Group Policy in Windows allows you to manage these shared drives centrally. This guide will walk you through the process step-by-step. Step 1: Create a Shared Folder The first step is to create a folder on your file server that will be shared among users....

<span title='2024-06-18 19:56:21 -0500 CDT'>June 18, 2024</span>&nbsp;·&nbsp;3 min

Installing Wazuh for XDR and SIEM

What is Wazuh? Wazuh is an open-source security monitoring platform designed for threat detection, intrusion detection, vulnerability detection, and security information and event management (SIEM). Why You Need a SIEM in Your Homelab or Company A SIEM (Security Information and Event Management) system is essential for centralizing security monitoring, achieving rapid threat detection, and automating incident responses. SIEMs excel in log management for compliance and forensic analysis. They can be customized to meet your specific needs, bolstering your security posture and keeping you ahead of evolving threats....

<span title='2023-12-06 08:51:21 -0600 CST'>December 6, 2023</span>&nbsp;·&nbsp;1 min

Blueprint of Brilliance: How Documentation Fuels Excellence in IT Operations

The Cornerstone of IT: Unveiling the Importance of Documentation In the bustling realm of Information Technology (IT), the pace at which advancements occur is blistering. Amidst this whirlwind of technological evolution, one factor remains steadfast in its significance - documentation. Documentation is the unsung hero that lays the foundation for robust system management, knowledge preservation, and seamless operational flow. This comprehensive exploration delves into the multi-faceted importance of documentation in IT, shedding light on why it’s an indispensable asset in a tech-driven ecosystem....

<span title='2023-10-24 19:18:51 -0500 CDT'>October 24, 2023</span>&nbsp;·&nbsp;5 min