diff --git a/.gitignore b/.gitignore index 016b59e..2defe4b 100644 --- a/.gitignore +++ b/.gitignore @@ -22,3 +22,8 @@ pnpm-debug.log* # jetbrains setting folder .idea/ + +# NTFY Info +.env +.env.local +.env.*.local diff --git a/astro.config.mjs b/astro.config.mjs index 95a3e28..fb2275d 100644 --- a/astro.config.mjs +++ b/astro.config.mjs @@ -1,10 +1,13 @@ import { defineConfig } from 'astro/config'; +import dotenv from 'dotenv'; // Environment detection const isProd = process.env.NODE_ENV === 'production'; +dotenv.config(); + export default defineConfig({ - output: 'static', // Change to 'server' if you need SSR + output: 'server', // Change to 'server' if you need SSR // Development server settings server: { diff --git a/gitlab b/gitlab new file mode 100644 index 0000000..4d22a8f --- /dev/null +++ b/gitlab @@ -0,0 +1,7 @@ +-----BEGIN OPENSSH PRIVATE KEY----- +b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW +QyNTUxOQAAACCTnX0c4xJ+dGcxwpOGy5JEy2s4JSA5hApwVcb8bYh1SQAAAJjmO6dU5jun +VAAAAAtzc2gtZWQyNTUxOQAAACCTnX0c4xJ+dGcxwpOGy5JEy2s4JSA5hApwVcb8bYh1SQ +AAAECpxXyF2dbZF3ni/0IyxAE8jZV4rWWpzXapq9dTvPCJ3pOdfRzjEn50ZzHCk4bLkkTL +azglIDmECnBVxvxtiHVJAAAAEmdpdGxhYkBqdWNoYXR6LmNvbQECAw== +-----END OPENSSH PRIVATE KEY----- diff --git a/gitlab.pub b/gitlab.pub new file mode 100644 index 0000000..4d54199 --- /dev/null +++ b/gitlab.pub @@ -0,0 +1 @@ +ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJOdfRzjEn50ZzHCk4bLkkTLazglIDmECnBVxvxtiHVJ gitlab@juchatz.com diff --git a/logs/contact-messages.log b/logs/contact-messages.log new file mode 100644 index 0000000..26d2ec8 --- /dev/null +++ b/logs/contact-messages.log @@ -0,0 +1,30 @@ + +=== New Message 2025-05-20T20:32:50.812Z === +From: asd (asd@asd.cd) +Subject: assdaa + +aszsdasd +============================== + +=== New Message 2025-05-20T20:35:50.709Z === +From: Stephan (stephan@juchatz.com) +Subject: Help + +Please +============================== + +=== New Message 2025-05-20T20:41:07.707Z === +From: Stephan (saeijou@asd.com) +Phone: 12311123 +Subject: Hello + +how much? +============================== + +=== New Message 2025-05-20T20:41:42.118Z === +From: asd;asd (asda@asd.com) +Phone: Not provided +Subject: sdafsdf + +sdfsdfsdf +============================== diff --git a/package-lock.json b/package-lock.json index c65424b..953bc58 100644 --- a/package-lock.json +++ b/package-lock.json @@ -8,7 +8,9 @@ "name": "irregular-inclination", "version": "0.0.1", "dependencies": { - "astro": "^5.7.13" + "@astrojs/node": "^9.2.1", + "astro": "^5.7.13", + "dotenv": "^16.5.0" } }, "node_modules/@astrojs/compiler": { @@ -49,6 +51,20 @@ "vfile": "^6.0.3" } }, + "node_modules/@astrojs/node": { + "version": "9.2.1", + "resolved": "https://registry.npmjs.org/@astrojs/node/-/node-9.2.1.tgz", + "integrity": "sha512-kEHLB37ooW91p7FLGalqa3jVQRIafntfKiZgCnjN1lEYw+j8NP6VJHQbLHmzzbtKUI0J+srGiTnGZmaHErHE5w==", + "license": "MIT", + "dependencies": { + "@astrojs/internal-helpers": "0.6.1", + "send": "^1.1.0", + "server-destroy": "^1.0.1" + }, + "peerDependencies": { + "astro": "^5.3.0" + } + }, "node_modules/@astrojs/prism": { "version": "3.2.0", "resolved": "https://registry.npmjs.org/@astrojs/prism/-/prism-3.2.0.tgz", @@ -1394,6 +1410,7 @@ "version": "5.7.13", "resolved": "https://registry.npmjs.org/astro/-/astro-5.7.13.tgz", "integrity": "sha512-cRGq2llKOhV3XMcYwQpfBIUcssN6HEK5CRbcMxAfd9OcFhvWE7KUy50zLioAZVVl3AqgUTJoNTlmZfD2eG0G1w==", + "license": "MIT", "dependencies": { "@astrojs/compiler": "^2.11.0", "@astrojs/internal-helpers": "0.6.1", @@ -1814,6 +1831,15 @@ "resolved": "https://registry.npmjs.org/defu/-/defu-6.1.4.tgz", "integrity": "sha512-mEQCMmwJu317oSz8CwdIOdwf3xMif1ttiM8LTufzc3g6kR+9Pe236twL8j3IYT1F7GfRgGcW6MWxzZjLIkuHIg==" }, + "node_modules/depd": { + "version": "2.0.0", + "resolved": "https://registry.npmjs.org/depd/-/depd-2.0.0.tgz", + "integrity": "sha512-g7nH6P6dyDioJogAAGprGpCtVImJhpPk/roCzdb3fIh61/s/nPsfR6onyMwkCAR/OlC3yBC0lESvUoQEAssIrw==", + "license": "MIT", + "engines": { + "node": ">= 0.8" + } + }, "node_modules/dequal": { "version": "2.0.3", "resolved": "https://registry.npmjs.org/dequal/-/dequal-2.0.3.tgz", @@ -1882,6 +1908,18 @@ "resolved": "https://registry.npmjs.org/dlv/-/dlv-1.1.3.tgz", "integrity": "sha512-+HlytyjlPKnIG8XuRG8WvmBP8xs8P71y+SKKS6ZXWoEgLuePxtDoUEiH7WkdePWrQ5JBpE6aoVqfZfJUQkjXwA==" }, + "node_modules/dotenv": { + "version": "16.5.0", + "resolved": "https://registry.npmjs.org/dotenv/-/dotenv-16.5.0.tgz", + "integrity": "sha512-m/C+AwOAr9/W1UOIZUo232ejMNnJAJtYQjUbHoNTBNTJSvqzzDh7vnrei3o3r3m9blf6ZoDkvcw0VmozNRFJxg==", + "license": "BSD-2-Clause", + "engines": { + "node": ">=12" + }, + "funding": { + "url": "https://dotenvx.com" + } + }, "node_modules/dset": { "version": "3.1.4", "resolved": "https://registry.npmjs.org/dset/-/dset-3.1.4.tgz", @@ -1890,11 +1928,26 @@ "node": ">=4" } }, + "node_modules/ee-first": { + "version": "1.1.1", + "resolved": "https://registry.npmjs.org/ee-first/-/ee-first-1.1.1.tgz", + "integrity": "sha512-WMwm9LhRUo+WUaRN+vRuETqG89IgZphVSNkdFgeb6sS/E4OrDIN7t48CAewSHXc6C8lefD8KKfr5vY61brQlow==", + "license": "MIT" + }, "node_modules/emoji-regex": { "version": "10.4.0", "resolved": "https://registry.npmjs.org/emoji-regex/-/emoji-regex-10.4.0.tgz", "integrity": "sha512-EC+0oUMY1Rqm4O6LLrgjtYDvcVYTy7chDnM4Q7030tP4Kwj3u/pR6gP9ygnp2CJMK5Gq+9Q2oqmrFJAz01DXjw==" }, + "node_modules/encodeurl": { + "version": "2.0.0", + "resolved": "https://registry.npmjs.org/encodeurl/-/encodeurl-2.0.0.tgz", + "integrity": "sha512-Q0n9HRi4m6JuGIV1eFlmvJB7ZEVxu93IrMyiMsGC0lrMJMWzRgx6WGquyfQgZVb31vhGgXnfmPNNXmxnOkRBrg==", + "license": "MIT", + "engines": { + "node": ">= 0.8" + } + }, "node_modules/entities": { "version": "6.0.0", "resolved": "https://registry.npmjs.org/entities/-/entities-6.0.0.tgz", @@ -1950,6 +2003,12 @@ "@esbuild/win32-x64": "0.25.4" } }, + "node_modules/escape-html": { + "version": "1.0.3", + "resolved": "https://registry.npmjs.org/escape-html/-/escape-html-1.0.3.tgz", + "integrity": "sha512-NiSupZ4OeuGwr68lGIeym/ksIZMJodUGOSCZ/FSnTxcrekbvqrgdUxlJOMpijaKZVjAJrWrGs/6Jy8OMuyj9ow==", + "license": "MIT" + }, "node_modules/escape-string-regexp": { "version": "5.0.0", "resolved": "https://registry.npmjs.org/escape-string-regexp/-/escape-string-regexp-5.0.0.tgz", @@ -1969,6 +2028,15 @@ "@types/estree": "^1.0.0" } }, + "node_modules/etag": { + "version": "1.8.1", + "resolved": "https://registry.npmjs.org/etag/-/etag-1.8.1.tgz", + "integrity": "sha512-aIL5Fx7mawVa300al2BnEE4iNvo1qETxLrPI/o05L7z6go7fCw1J6EQmbK4FmJ2AS7kgVF/KEZWufBfdClMcPg==", + "license": "MIT", + "engines": { + "node": ">= 0.6" + } + }, "node_modules/eventemitter3": { "version": "5.0.1", "resolved": "https://registry.npmjs.org/eventemitter3/-/eventemitter3-5.0.1.tgz", @@ -2030,6 +2098,15 @@ "unicode-trie": "^2.0.0" } }, + "node_modules/fresh": { + "version": "2.0.0", + "resolved": "https://registry.npmjs.org/fresh/-/fresh-2.0.0.tgz", + "integrity": "sha512-Rx/WycZ60HOaqLKAi6cHRKKI7zxWbJ31MhntmtwMoaTeF7XFH9hhBp8vITaMidfljRQ6eYWCKkaTK+ykVJHP2A==", + "license": "MIT", + "engines": { + "node": ">= 0.8" + } + }, "node_modules/fsevents": { "version": "2.3.3", "resolved": "https://registry.npmjs.org/fsevents/-/fsevents-2.3.3.tgz", @@ -2270,6 +2347,22 @@ "resolved": "https://registry.npmjs.org/http-cache-semantics/-/http-cache-semantics-4.2.0.tgz", "integrity": "sha512-dTxcvPXqPvXBQpq5dUr6mEMJX4oIEFv6bwom3FDwKRDsuIjjJGANqhBuoAn9c1RQJIdAKav33ED65E2ys+87QQ==" }, + "node_modules/http-errors": { + "version": "2.0.0", + "resolved": "https://registry.npmjs.org/http-errors/-/http-errors-2.0.0.tgz", + "integrity": "sha512-FtwrG/euBzaEjYeRqOgly7G0qviiXoJWnvEH2Z1plBdXgbyjv34pHTSb9zoeHMyDy33+DWy5Wt9Wo+TURtOYSQ==", + "license": "MIT", + "dependencies": { + "depd": "2.0.0", + "inherits": "2.0.4", + "setprototypeof": "1.2.0", + "statuses": "2.0.1", + "toidentifier": "1.0.1" + }, + "engines": { + "node": ">= 0.8" + } + }, "node_modules/import-meta-resolve": { "version": "4.1.0", "resolved": "https://registry.npmjs.org/import-meta-resolve/-/import-meta-resolve-4.1.0.tgz", @@ -2279,6 +2372,12 @@ "url": "https://github.com/sponsors/wooorm" } }, + "node_modules/inherits": { + "version": "2.0.4", + "resolved": "https://registry.npmjs.org/inherits/-/inherits-2.0.4.tgz", + "integrity": "sha512-k/vGaX4/Yla3WzyMCvTQOXYeIHvqOKtnqBduzTHpzpQZzAskKMhZ2K+EnBiSM9zGSoIFeMpXKxa4dYeZIQqewQ==", + "license": "ISC" + }, "node_modules/iron-webcrypto": { "version": "1.2.1", "resolved": "https://registry.npmjs.org/iron-webcrypto/-/iron-webcrypto-1.2.1.tgz", @@ -3169,6 +3268,27 @@ } ] }, + "node_modules/mime-db": { + "version": "1.54.0", + "resolved": "https://registry.npmjs.org/mime-db/-/mime-db-1.54.0.tgz", + "integrity": "sha512-aU5EJuIN2WDemCcAp2vFBfp/m4EAhWJnUNSSw0ixs7/kXbd6Pg64EmwJkNdFhB8aWt1sH2CTXrLxo/iAGV3oPQ==", + "license": "MIT", + "engines": { + "node": ">= 0.6" + } + }, + "node_modules/mime-types": { + "version": "3.0.1", + "resolved": "https://registry.npmjs.org/mime-types/-/mime-types-3.0.1.tgz", + "integrity": "sha512-xRc4oEhT6eaBpU1XF7AjpOFD+xQmXNB5OVKwp4tqCuBpHLS/ZbBDrc07mYTDqVMg6PfxUjjNp85O6Cd2Z/5HWA==", + "license": "MIT", + "dependencies": { + "mime-db": "^1.54.0" + }, + "engines": { + "node": ">= 0.6" + } + }, "node_modules/mrmime": { "version": "2.0.1", "resolved": "https://registry.npmjs.org/mrmime/-/mrmime-2.0.1.tgz", @@ -3271,6 +3391,18 @@ "resolved": "https://registry.npmjs.org/ohash/-/ohash-2.0.11.tgz", "integrity": "sha512-RdR9FQrFwNBNXAr4GixM8YaRZRJ5PUWbKYbE5eOsrwAjJW0q2REGcf79oYPsLyskQCZG1PLN+S/K1V00joZAoQ==" }, + "node_modules/on-finished": { + "version": "2.4.1", + "resolved": "https://registry.npmjs.org/on-finished/-/on-finished-2.4.1.tgz", + "integrity": "sha512-oVlzkg3ENAhCk2zdv7IJwd/QUD4z2RxRwpkcGY8psCVcCYZNq4wYnVWALHM+brtuJjePWiYF/ClmuDr8Ch5+kg==", + "license": "MIT", + "dependencies": { + "ee-first": "1.1.1" + }, + "engines": { + "node": ">= 0.8" + } + }, "node_modules/oniguruma-parser": { "version": "0.12.1", "resolved": "https://registry.npmjs.org/oniguruma-parser/-/oniguruma-parser-0.12.1.tgz", @@ -3449,6 +3581,15 @@ "resolved": "https://registry.npmjs.org/radix3/-/radix3-1.1.2.tgz", "integrity": "sha512-b484I/7b8rDEdSDKckSSBA8knMpcdsXudlE/LNL639wFoHKwLbEkQFZHWEYwDC0wa0FKUcCY+GAF73Z7wxNVFA==" }, + "node_modules/range-parser": { + "version": "1.2.1", + "resolved": "https://registry.npmjs.org/range-parser/-/range-parser-1.2.1.tgz", + "integrity": "sha512-Hrgsx+orqoygnmhFbKaHE6c296J+HTAQXoxEF6gNupROmmGJRoyzfG3ccAveqCBrwr/2yxQ5BVd/GTl5agOwSg==", + "license": "MIT", + "engines": { + "node": ">= 0.6" + } + }, "node_modules/readdirp": { "version": "4.1.2", "resolved": "https://registry.npmjs.org/readdirp/-/readdirp-4.1.2.tgz", @@ -3726,6 +3867,40 @@ "node": ">=10" } }, + "node_modules/send": { + "version": "1.2.0", + "resolved": "https://registry.npmjs.org/send/-/send-1.2.0.tgz", + "integrity": "sha512-uaW0WwXKpL9blXE2o0bRhoL2EGXIrZxQ2ZQ4mgcfoBxdFmQold+qWsD2jLrfZ0trjKL6vOw0j//eAwcALFjKSw==", + "license": "MIT", + "dependencies": { + "debug": "^4.3.5", + "encodeurl": "^2.0.0", + "escape-html": "^1.0.3", + "etag": "^1.8.1", + "fresh": "^2.0.0", + "http-errors": "^2.0.0", + "mime-types": "^3.0.1", + "ms": "^2.1.3", + "on-finished": "^2.4.1", + "range-parser": "^1.2.1", + "statuses": "^2.0.1" + }, + "engines": { + "node": ">= 18" + } + }, + "node_modules/server-destroy": { + "version": "1.0.1", + "resolved": "https://registry.npmjs.org/server-destroy/-/server-destroy-1.0.1.tgz", + "integrity": "sha512-rb+9B5YBIEzYcD6x2VKidaa+cqYBJQKnU4oe4E3ANwRRN56yk/ua1YCJT1n21NTS8w6CcOclAKNP3PhdCXKYtQ==", + "license": "ISC" + }, + "node_modules/setprototypeof": { + "version": "1.2.0", + "resolved": "https://registry.npmjs.org/setprototypeof/-/setprototypeof-1.2.0.tgz", + "integrity": "sha512-E5LDX7Wrp85Kil5bhZv46j8jOeboKq5JMmYM3gVGdGH8xFpPWXUMsNrlODCrkoxMEeNi/XZIwuRvY4XNwYMJpw==", + "license": "ISC" + }, "node_modules/sharp": { "version": "0.33.5", "resolved": "https://registry.npmjs.org/sharp/-/sharp-0.33.5.tgz", @@ -3822,6 +3997,15 @@ "url": "https://github.com/sponsors/wooorm" } }, + "node_modules/statuses": { + "version": "2.0.1", + "resolved": "https://registry.npmjs.org/statuses/-/statuses-2.0.1.tgz", + "integrity": "sha512-RwNA9Z/7PrK06rYLIzFMlaF+l73iwpzsqRIFgbMLbTcLD6cOao82TaWefPXQvB2fOC4AjuYSEndS7N/mTCbkdQ==", + "license": "MIT", + "engines": { + "node": ">= 0.8" + } + }, "node_modules/string-width": { "version": "7.2.0", "resolved": "https://registry.npmjs.org/string-width/-/string-width-7.2.0.tgz", @@ -3890,6 +4074,15 @@ "url": "https://github.com/sponsors/SuperchupuDev" } }, + "node_modules/toidentifier": { + "version": "1.0.1", + "resolved": "https://registry.npmjs.org/toidentifier/-/toidentifier-1.0.1.tgz", + "integrity": "sha512-o5sSPKEkg/DIQNmH43V0/uerLrpzVedkUh8tGNvaeXpfpuwjKenlSox/2O/BTlZUtEe+JG7s5YhEz608PlAHRA==", + "license": "MIT", + "engines": { + "node": ">=0.6" + } + }, "node_modules/tr46": { "version": "0.0.3", "resolved": "https://registry.npmjs.org/tr46/-/tr46-0.0.3.tgz", diff --git a/package.json b/package.json index fc9faee..7f656ef 100644 --- a/package.json +++ b/package.json @@ -9,6 +9,8 @@ "astro": "astro" }, "dependencies": { - "astro": "^5.7.13" + "@astrojs/node": "^9.2.1", + "astro": "^5.7.13", + "dotenv": "^16.5.0" } -} \ No newline at end of file +} diff --git a/src/components/Header.astro b/src/components/Header.astro new file mode 100644 index 0000000..39c4f11 --- /dev/null +++ b/src/components/Header.astro @@ -0,0 +1,50 @@ +--- +// Header.astro +--- + +
+ +
diff --git a/src/components/Layout.astro b/src/components/Layout.astro new file mode 100644 index 0000000..ad315a9 --- /dev/null +++ b/src/components/Layout.astro @@ -0,0 +1,32 @@ +--- +// Layout.astro +import '../styles/styles.css'; +import Header from './Header.astro'; +import Sidebar from './Sidebar.astro'; + +interface Props { + title: string; +} + +const { title } = Astro.props; +--- + + + + + + + {title} - My Website + + +
+
+ +
+
+ +
+
+
+ + diff --git a/src/components/Sidebar.astro b/src/components/Sidebar.astro new file mode 100644 index 0000000..b5dc30e --- /dev/null +++ b/src/components/Sidebar.astro @@ -0,0 +1,64 @@ +--- +// Sidebar.astro +--- + + + + diff --git a/src/components/Welcome.astro b/src/components/Welcome.astro deleted file mode 100644 index 52e0333..0000000 --- a/src/components/Welcome.astro +++ /dev/null @@ -1,210 +0,0 @@ ---- -import astroLogo from '../assets/astro.svg'; -import background from '../assets/background.svg'; ---- - -
- -
-
- Astro Homepage -

- To get started, open the
src/pages
directory in your project. -

- -
-
- - - -

What's New in Astro 5.0?

-

- From content layers to server islands, click to learn more about the new features and - improvements in Astro 5.0 -

-
-
- - diff --git a/src/pages/about.astro b/src/pages/about.astro index 7416772..e36ca47 100644 --- a/src/pages/about.astro +++ b/src/pages/about.astro @@ -1,123 +1,126 @@ --- -import '../styles/styles.css'; +import Layout from '../components/Layout.astro'; --- - - - - - - About - My Website - - -
-
- -
- - - -
-
-

About Us

-

Welcome to my personal tech services website! I'm a passionate technology specialist with expertise in networking, system administration, and open-source solutions.

- -

My Background

-

With over [X] years of experience in the IT industry, I've developed a deep understanding of various technologies and methodologies. My journey began with a curiosity about how computers work and has evolved into a comprehensive skill set that allows me to tackle complex technical challenges.

- -

I hold certifications in [relevant certifications] and continuously update my knowledge to stay current with the rapidly evolving tech landscape.

- -

My Approach

-

I believe in the power of open-source solutions and privacy-focused technologies. My approach combines technical expertise with a commitment to empowering users through knowledge sharing and transparent practices.

- -

When working on projects, I prioritize:

-
    -
  • Security - Implementing robust security measures to protect your data and systems
  • -
  • Privacy - Respecting and enhancing your digital privacy
  • -
  • Reliability - Building solutions that work consistently and require minimal maintenance
  • -
  • Knowledge Transfer - Ensuring you understand how your systems work
  • -
- -

Why Choose My Services

-

Unlike large service providers that offer one-size-fits-all solutions, I provide personalized services tailored to your specific needs. I take the time to understand your requirements, preferences, and constraints before recommending and implementing solutions.

- -

My clients appreciate my:

-
    -
  • Attention to detail and thoroughness
  • -
  • Clear communication and jargon-free explanations
  • -
  • Commitment to finding the right solution, not just the easiest one
  • -
  • Ongoing support and availability for questions
  • -
- -

Get in Touch

-

I'm always happy to discuss potential projects, answer questions, or provide advice. Feel free to reach out using the contact information below:

- -

Email: your-email@example.com
- Phone: (123) 456-7890

- - Contact Me -
-
+ +

About Us

+

Welcome to my personal tech services website! I'm Stephan Juchatz, a passionate technology specialist with expertise in networking, system administration, and open-source privacy solutions.

+ +
+

Our Vision

+

A world where digital privacy and security are accessible to everyone, where individuals have meaningful control over their personal data, and where technology empowers rather than exploits.

+ +

Our Mission

+

To empower individuals and businesses with the knowledge, tools, and support they need to reclaim their digital privacy, enhance their security posture, and make informed decisions about their digital lives.

+
+ +
+

Why Privacy Matters

+

Privacy is about power, and it's critical that this power ends up in the right hands—yours. In today's digital landscape, your personal data has become the most valuable commodity, harvested by corporations to build detailed profiles for targeted advertising while your digital identity is continuously tracked across the web.

+ +

Privacy isn't about having "something to hide"—it's about human dignity and autonomy. Just as you close the bathroom door not for secrecy but for privacy, certain aspects of your digital life deserve the same respect and protection.

+ +

Living in an information society means that our information matters. When you shop online, read news, look something up, vote, or seek directions, you're relying on information systems that simultaneously collect data about you. If we care about our ability to be authentic, fulfilled, and free humans, we must care about the rules that apply to information about us.

+ +

The illusion of control through cookie consent forms and privacy settings is often just that—an illusion. True privacy needs to be built into the foundation of your digital life, not added as an afterthought.

+
+ +
+

Understanding Digital Protection

+

Effective digital protection involves three key concepts:

+ +
+

Privacy

+

Ensuring your data is only seen by the parties you intend to view it. For example, end-to-end encrypted messaging ensures only you and your recipient can read your messages.

- - + +
+

Security

+

The ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe from external threats and vulnerabilities.

+
+ +
+

Anonymity

+

The ability to act without a persistent identifier, allowing you to use services without revealing who you are or creating a traceable pattern of activity.

+
+
+ +

My Background

+

With over 15 years of experience in the IT industry, I've developed a deep understanding of various technologies and methodologies. My journey began with a curiosity about how computers work and has evolved into a comprehensive skill set that allows me to tackle complex technical challenges while maintaining a strong focus on privacy and security.

+ +

My Philosophy

+

I believe that privacy isn't just about hiding—it's about empowerment, autonomy, and human dignity. In today's data-driven world, the ability to control who has access to your information is not a luxury but a necessity.

+ +

I firmly believe that:

+ + +

My Approach

+

I believe in the power of open-source solutions and privacy-focused technologies. My approach combines technical expertise with a commitment to empowering users through knowledge sharing and transparent practices.

+ +

When working on projects, I prioritize:

+ + +

Why Choose My Services

+

Unlike large service providers that offer one-size-fits-all solutions, I provide personalized services tailored to your specific needs and threat model. I take the time to understand your requirements, preferences, and constraints before recommending and implementing solutions.

+ +

My clients appreciate my:

+ + +

Get in Touch

+

I'm always happy to discuss potential projects, answer questions, or provide advice on enhancing your digital privacy and security. Feel free to reach out using the contact information below:

+ +

Email: shop@juchatz.com
+ Phone: (123) 456-7890

+ + Contact Me + + +
diff --git a/src/pages/api/send-message.js b/src/pages/api/send-message.js new file mode 100644 index 0000000..0a177b8 --- /dev/null +++ b/src/pages/api/send-message.js @@ -0,0 +1,140 @@ +// src/pages/api/send-message.js +export const prerender = false; + +export const POST = async ({ request }) => { + try { + // Parse the request body + let data; + try { + data = await request.json(); + } catch (parseError) { + return new Response(JSON.stringify({ + error: 'Invalid request format' + }), { + status: 400, + headers: { + 'Content-Type': 'application/json' + } + }); + } + + const { name, email, phone, subject, message } = data; + + // Validate the form data + if (!name || !email || !subject || !message) { + return new Response(JSON.stringify({ + error: 'All fields are required' + }), { + status: 400, + headers: { + 'Content-Type': 'application/json' + } + }); + } + + // Get ntfy configuration from environment variables + const ntfyUrl = import.meta.env.PUBLIC_NTFY_URL; + const ntfyToken = import.meta.env.PUBLIC_NTFY_TOKEN; + + if (!ntfyUrl) { + return new Response(JSON.stringify({ + error: 'Server configuration error' + }), { + status: 500, + headers: { + 'Content-Type': 'application/json' + } + }); + } + + // Format the message in Markdown similar to your Proxmox template + const messageBody = `** Website Contact Form ** + +${subject} + +**Message:** +${message} + +**Details:** +**Time:** ${new Date().toISOString()} +**Name:** ${name} +**Email:** ${email} +**Phone:** ${phone || 'Not provided'}`; + + // Prepare headers with Bearer token authentication + const headers = { + 'Content-Type': 'text/plain', + 'Title': `Website Contact: ${subject}`, + 'Markdown': 'yes', + 'Tags': 'contact,website' + }; + + // Add authentication if token is provided + if (ntfyToken) { + headers['Authorization'] = `Bearer ${ntfyToken}`; + } + + // Send to ntfy + const response = await fetch(ntfyUrl, { + method: 'POST', + headers: headers, + body: messageBody + }); + + if (!response.ok) { + return new Response(JSON.stringify({ + error: 'Failed to send message. Please try again later.' + }), { + status: 500, + headers: { + 'Content-Type': 'application/json' + } + }); + } + + // Add file logging as a backup + try { + const fs = await import('fs'); + const path = await import('path'); + + const logDir = path.default.resolve(process.cwd(), 'logs'); + const logFile = path.default.join(logDir, 'contact-messages.log'); + + if (!fs.default.existsSync(logDir)) { + fs.default.mkdirSync(logDir, { recursive: true }); + } + + const logMessage = ` +=== New Message ${new Date().toISOString()} === +From: ${name} (${email}) +Phone: ${phone || 'Not provided'} +Subject: ${subject} + +${message} +============================== +`; + + fs.default.appendFileSync(logFile, logMessage); + } catch (logError) { + // Continue anyway - this is just a backup + } + + return new Response(JSON.stringify({ + success: true + }), { + status: 200, + headers: { + 'Content-Type': 'application/json' + } + }); + } catch (error) { + return new Response(JSON.stringify({ + error: 'Server error occurred. Please try again later.' + }), { + status: 500, + headers: { + 'Content-Type': 'application/json' + } + }); + } +}; diff --git a/src/pages/contact.astro b/src/pages/contact.astro new file mode 100644 index 0000000..32b1866 --- /dev/null +++ b/src/pages/contact.astro @@ -0,0 +1,104 @@ +--- +import Layout from '../components/Layout.astro'; + +// Environment variables with PUBLIC_ prefix +const ntfyUrl = import.meta.env.PUBLIC_NTFY_URL; +--- + + +

Contact Me

+
+

Stephan Juchatz

+

Phone: (123) 456-7890

+

Email: shop@juchatz.com

+

Feel free to reach out with any questions or inquiries about my services. I'm here to help you with all your technical needs.

+
+ +
+

Send Me a Message

+
+
+ + +
+ +
+ + +
+ +
+ + +
+ +
+ + +
+ +
+ + +
+ + +
+
+
+
+ + diff --git a/src/pages/index.astro b/src/pages/index.astro index d45650a..40d458d 100644 --- a/src/pages/index.astro +++ b/src/pages/index.astro @@ -1,98 +1,75 @@ --- -import '../styles/styles.css'; +import Layout from '../components/Layout.astro'; --- - - - - - - My Website - - -
-
- -
+ +

Welcome to My Digital Privacy & Security Services

+ +
+

Who I Am

+

Hello, I'm Stephan Juchatz, a Computer Science graduate with a passion for digital privacy and security. This website serves as a platform where I offer my expertise to help individuals and businesses protect their digital lives.

+ +

With my background in computer science and years of hands-on experience, I've developed specialized knowledge in networking, system administration, and open-source privacy solutions that can help you reclaim control of your digital footprint.

+
+ +
+

The Issue At Hand

+

In today's digital landscape, your personal data has become the most valuable commodity. Large corporations harvest your information to build detailed profiles for targeted advertising, while your digital identity is continuously tracked across the web.

+ +

Meanwhile, malicious actors and hackers are constantly developing new ways to exploit vulnerabilities in systems and networks, putting your personal information and digital assets at risk.

+ +

The reality is that most people don't realize the extent to which their privacy is compromised or the potential consequences of poor security practices. My mission is to change that by offering accessible, personalized solutions that protect your digital life.

+
+ +
+

How I Can Help

+

From implementing network-wide ad blocking and setting up secure VPN connections to removing invasive telemetry from your devices and migrating to privacy-focused operating systems, I provide comprehensive services designed to enhance your digital privacy and security.

+ +

I believe that robust privacy solutions should be accessible to everyone, not just technical experts. That's why I focus on knowledge transfer and clear communication, ensuring you understand how your systems work and empowering you to maintain them.

+
+ +

Whether you're looking to protect your personal data from prying eyes, secure your home network against intrusions, or transition to more privacy-respecting technologies, I'm here to guide you every step of the way.

+ + +
- - -
-
-

Welcome to My Website

-

Hello, I'm a developer/professional specializing in creating efficient and robust solutions. This website serves as a platform to showcase my work, share insights, and connect with others who share similar interests.

- -

With over X years of experience in the industry, I've developed a deep understanding of various technologies and methodologies that enable me to deliver high-quality results consistently.

- -

My approach combines technical expertise with creative problem-solving, ensuring that each project not only meets but exceeds expectations. I believe in the power of collaboration and continuous learning, which has been instrumental in my professional journey.

- -

Whether you're looking for a partner for your next project, seeking technical advice, or just want to connect with like-minded professionals, you've come to the right place.

- -

Feel free to explore the website to learn more about my services, check out my portfolio, or get in touch to discuss potential collaborations.

- - Get Started -
-
-
- - + diff --git a/src/pages/services.astro b/src/pages/services.astro index b0a14eb..a4a9952 100644 --- a/src/pages/services.astro +++ b/src/pages/services.astro @@ -1,146 +1,115 @@ --- -import '../styles/styles.css'; +import Layout from '../components/Layout.astro'; --- - - - - - - Services - My Website - - -
-
- -
+ +

Our Services

+

We offer a wide range of technical services to help you optimize your digital environment, organized around three core principles: Privacy, Security, and Anonymity. Below you'll find detailed information about each of our service categories.

+ + +

Privacy Services

+

Our privacy services help you regain control over your personal data and minimize digital tracking to protect your information from unwanted collection.

+ +
+

Adblocker Setup

+

Enhance your browsing experience and protect your privacy with our comprehensive ad-blocking solutions. We implement network-wide ad blocking that works across all your devices without requiring individual software installations.

+ Learn More +
+ +
+

Bitwarden Password Manager

+

Take control of your online credentials with a self-hosted Bitwarden password manager. This open-source solution securely stores your passwords, generates strong new ones, and synchronizes across all your devices while keeping your data entirely under your control.

+ Learn More +
+ +
+

Remove Windows Telemetry

+

Enhance your privacy by removing Windows telemetry features that collect and send data to Microsoft. Our service includes identification and disabling of telemetry components while ensuring system stability and functionality.

+ Learn More +
+ + +

Security Services

+

Our security services focus on protecting your data and systems from unauthorized access, ensuring your digital assets remain safe.

+ +
+

OPNsense Firewall

+

Protect your network with a powerful, open-source firewall solution. OPNsense provides enterprise-grade security features including intrusion detection, VPN capabilities, and granular traffic control to defend your network from threats.

+ Learn More +
+ +
+

Wireguard VPN

+

Connect securely to your home network or between multiple sites with Wireguard, a modern VPN protocol known for its simplicity, speed, and strong security. We handle the complete setup and configuration for seamless remote access.

+ Learn More +
+ +
+

VPN Setup

+

Establish secure connections and protect your internet traffic with a properly configured Virtual Private Network. Whether you need a commercial VPN solution or a self-hosted option, we'll implement the right setup for your needs.

+ Learn More +
+ + +

Anonymity Services

+

Our anonymity services help you maintain a lower digital profile and operate online with greater freedom from tracking and surveillance.

+ +
+

TOR Network Setup

+

Access the internet with enhanced anonymity through the TOR network. We can set up dedicated TOR nodes, configure browsers for optimal privacy, or implement network-wide routing through TOR to help protect your identity online.

+ Learn More +
+ +
+

Set Up Linux

+

Make the transition to Linux smooth and hassle-free with our comprehensive setup services. We'll help you select the right privacy-focused distribution, handle the installation process, configure your system, and provide guidance on essential software and daily operations.

+ Learn More +
+ + +

Infrastructure Services

+

Our infrastructure services provide the foundation for self-hosted solutions that give you complete control over your digital environment.

+ +
+

OpenWRT Router

+

Upgrade your network with OpenWRT, a powerful open-source router firmware that provides advanced features, improved security, and greater control over your home or small business network.

+ Learn More +
+ +
+

Network Attached Storage

+

Create your own secure data storage solution with a customized NAS setup. Access your files from anywhere while maintaining complete control over your data without relying on cloud services.

+ Learn More +
+ +
+

Proxmox Virtualization

+

Maximize your hardware resources with Proxmox, an enterprise-grade virtualization platform. Run multiple virtual machines and containers on a single server for efficient resource utilization and service isolation.

+ Learn More +
+ +
+

Virtual Private Server

+

Deploy and manage VPS instances for hosting your applications, websites, or services in the cloud. We handle everything from initial setup to ongoing management and security hardening.

+ Learn More +
+
- - -
-
-

Our Services

-

We offer a wide range of technical services to help you optimize your digital environment. Below you'll find detailed information about each of our service categories.

- - -

Networking Services

-

Our networking services help you build a secure, efficient, and reliable network infrastructure tailored to your specific needs.

- -
-

Adblocker Setup

-

Enhance your browsing experience and protect your privacy with our comprehensive ad-blocking solutions. We implement network-wide ad blocking that works across all your devices without requiring individual software installations.

-
- -
-

OpenWRT Configuration

-

Maximize your router's potential with OpenWRT, a powerful open-source firmware that provides enhanced control, security features, and performance improvements. Our experts will configure OpenWRT to optimize your network based on your specific requirements.

-
- -
-

OPNsense Implementation

-

Secure your network with OPNsense, an enterprise-grade firewall and routing platform. We provide complete setup, configuration, and maintenance services to ensure your network remains protected against evolving threats.

-
- -
-

NAS Setup and Optimization

-

Create a centralized storage solution with our Network Attached Storage (NAS) services. We'll help you select the right hardware, implement the appropriate software, and configure backup routines to keep your data safe and accessible.

-
- -
-

Proxmox Virtualization

-

Leverage the power of Proxmox VE to create an efficient virtualization environment. Our services include installation, configuration, VM setup, and ongoing management to ensure optimal resource utilization and system performance.

-
- -
-

Wireguard VPN Setup

-

Implement a modern, secure, and efficient VPN solution with Wireguard. We provide end-to-end setup and configuration services to ensure secure remote access to your network from anywhere in the world.

-
- -
-

VPN Solutions

-

Protect your online privacy and secure your data with our comprehensive VPN solutions. We offer setup, configuration, and troubleshooting services for various VPN protocols to meet your specific security requirements.

-
- -
-

VPS Management

-

Let us handle the setup and management of your Virtual Private Server. From initial configuration to ongoing maintenance and security updates, we ensure your VPS runs smoothly and securely at all times.

-
- - -

Operating System Services

-

Our OS services help you get the most out of your operating system while ensuring security, privacy, and optimal performance.

- -
-

Remove Windows Telemetry

-

Enhance your privacy by removing Windows telemetry features that collect and send data to Microsoft. Our service includes identification and disabling of telemetry components while ensuring system stability and functionality.

-
- -
-

Set Up Linux

-

Make the transition to Linux smooth and hassle-free with our comprehensive setup services. We'll help you select the right distribution, handle the installation process, configure your system, and provide guidance on essential software and daily operations.

-
-
-
-
- - + diff --git a/src/pages/services/adblocker.astro b/src/pages/services/adblocker.astro new file mode 100644 index 0000000..b6df54b --- /dev/null +++ b/src/pages/services/adblocker.astro @@ -0,0 +1,114 @@ +--- +import Layout from '../../components/Layout.astro'; +--- + + +

Adblocker Setup Service

+ +
+

Dramatically improve your browsing experience, protect your privacy, and secure your network with a comprehensive ad-blocking solution that works across all your devices without requiring individual software installations.

+
+ +
+

What is Network-Level Ad Blocking?

+

Unlike traditional browser-based ad blockers that only work in specific browsers and require installation on each device, network-level ad blocking filters unwanted content at your router or network gateway. This approach provides ad blocking protection to all devices on your network simultaneously—computers, phones, smart TVs, and even devices that cannot normally run ad blockers.

+ +

Our Ad Blocking Solutions

+

I offer several implementation options based on your specific needs:

+ +
+

Pi-hole Implementation

+

Pi-hole is a powerful network-wide ad blocker that can run on a Raspberry Pi or other small computer. I'll set up a dedicated Pi-hole server on your network, configure it with comprehensive filter lists, and integrate it with your existing router to provide immediate ad blocking across all devices.

+
+ +
+

AdGuard Home Setup

+

AdGuard Home offers similar functionality to Pi-hole with some additional features. I'll install and configure this solution on appropriate hardware, set up custom filtering rules, and ensure it works seamlessly with your network infrastructure.

+
+ +
+

Router-Based Ad Blocking

+

For compatible routers running OpenWRT or similar firmware, I can implement ad blocking directly on your router, eliminating the need for additional hardware while providing network-wide protection.

+
+ +

Benefits of Network-Wide Ad Blocking

+
    +
  • Enhanced Privacy: Block trackers that monitor your online behavior and build profiles about you
  • +
  • Improved Security: Reduce exposure to malvertising (malicious advertisements) and potential security threats
  • +
  • Faster Browsing: Pages load significantly faster when ads and trackers are blocked
  • +
  • Reduced Bandwidth Usage: Lower your data consumption by eliminating ad content
  • +
  • Better Battery Life: Mobile devices use less energy when they don't have to load and display ads
  • +
  • Universal Protection: Cover all devices on your network, including those that can't run browser-based ad blockers
  • +
  • Detailed Analytics: Gain insights into your network traffic and blocked content
  • +
+ +

Features Included

+

Your network-wide ad blocking solution will include:

+
    +
  • Comprehensive blocking of advertisements across all websites and apps
  • +
  • Tracker blocking to prevent companies from building profiles on your activities
  • +
  • Malware domain filtering for enhanced security
  • +
  • Customizable blocklists and whitelists to fine-tune your experience
  • +
  • Dashboard with detailed statistics on blocked requests
  • +
  • Automatic updates to maintain effectiveness against new ad domains
  • +
  • Optional: DNS over HTTPS/TLS for additional privacy from your ISP
  • +
+ +

My Approach

+

When setting up ad blocking for clients, I take a comprehensive approach that includes:

+
    +
  • Assessment of your current network setup to determine the optimal solution
  • +
  • Installation and configuration of the ad-blocking system
  • +
  • Implementation of carefully selected filter lists to balance effectiveness with compatibility
  • +
  • Network integration to ensure all devices benefit from protection
  • +
  • Testing across various devices and services to ensure everything works properly
  • +
  • Documentation and training so you can manage the system yourself
  • +
  • Configuration of monitoring to alert you of any issues
  • +
+
+ +
+

Enjoy a Cleaner, Faster, More Private Internet

+

Ready to transform your browsing experience with network-wide ad blocking? Contact me today to discuss which solution is right for your home or business network.

+ Contact Me +
+
+ + diff --git a/src/pages/services/bitwarden.astro b/src/pages/services/bitwarden.astro new file mode 100644 index 0000000..8be8222 --- /dev/null +++ b/src/pages/services/bitwarden.astro @@ -0,0 +1,115 @@ +--- +import Layout from '../../components/Layout.astro'; +--- + + +

Bitwarden Password Manager Service

+ +
+

Take control of your passwords and sensitive information with a self-hosted Bitwarden solution that keeps your data private, secure, and exclusively under your control.

+
+ +
+

What is Bitwarden?

+

Bitwarden is an open-source password management solution that securely stores your sensitive information in an encrypted vault. Unlike commercial password managers, the self-hosted version of Bitwarden allows you to maintain complete control over your data by hosting it on your own infrastructure rather than on third-party servers.

+ +

Our Bitwarden Services

+

I offer comprehensive Bitwarden implementation that includes:

+ +
+

Server Setup and Configuration

+

I'll set up a Bitwarden server (Vaultwarden) on your hardware or VPS, ensuring it's properly configured with appropriate security measures, automatic backups, and optional email notifications. The server will be accessible from any of your devices while remaining isolated from third parties.

+
+ +
+

Client Installation and Training

+

I'll help you install Bitwarden clients on all your devices (computers, phones, tablets) and browsers, configure them to connect securely to your self-hosted server, and provide guidance on organizing your passwords effectively. You'll learn how to use the password generator, autofill capabilities, and secure notes features.

+
+ +
+

Migration Assistance

+

If you're currently using another password manager or browser-stored passwords, I'll assist you in securely migrating all your existing passwords and data to your new Bitwarden vault, ensuring nothing is lost in the transition and that your old password stores are properly cleared.

+
+ +

Benefits of Self-Hosted Bitwarden

+
    +
  • Complete Data Ownership: Your passwords and sensitive data remain exclusively on your infrastructure, not on third-party servers
  • +
  • Enhanced Privacy: No tracking, telemetry, or access to your data by outside companies
  • +
  • Zero Subscription Costs: Eliminate ongoing fees while maintaining all premium features
  • +
  • Full Control: Configure security policies and features according to your specific needs
  • +
  • Open-Source Security: Benefit from transparent, audited code that can be verified for security
  • +
  • Cross-Platform Compatibility: Access your passwords securely from any device or browser
  • +
+ +

Features Included

+

Your self-hosted Bitwarden solution will include:

+
    +
  • Secure storage for unlimited passwords, notes, credit cards, and identity information
  • +
  • Strong, customizable password generation
  • +
  • Browser extensions for autofill functionality
  • +
  • Mobile apps for on-the-go access
  • +
  • Two-factor authentication support
  • +
  • Encrypted file attachments
  • +
  • Secure password sharing (optional)
  • +
  • Security audit and weak password identification
  • +
  • Automated backup system
  • +
+ +

My Approach

+

When setting up Bitwarden for clients, I take a comprehensive approach that includes:

+
    +
  • Assessment of your existing password management workflow
  • +
  • Server setup with proper security hardening measures
  • +
  • Configuration of automatic backups to prevent data loss
  • +
  • Setup of secure access methods to your vault from all devices
  • +
  • Hands-on training so you feel comfortable managing your passwords
  • +
  • Documentation for ongoing maintenance and troubleshooting
  • +
  • Best practices for creating and managing strong, unique passwords
  • +
+
+ +
+

Take Control of Your Passwords Today

+

Ready to strengthen your online security with a self-hosted password manager? Contact me to discuss implementing Bitwarden for your personal or business needs.

+ Contact Me +
+
+ + diff --git a/src/pages/services/linux-setup.astro b/src/pages/services/linux-setup.astro new file mode 100644 index 0000000..43753f7 --- /dev/null +++ b/src/pages/services/linux-setup.astro @@ -0,0 +1,131 @@ +--- +import Layout from '../../components/Layout.astro'; +--- + + +

Linux Setup Service

+ +
+

Make the transition to Linux smooth and hassle-free with comprehensive setup and support services tailored to your specific needs, whether you're a complete beginner or looking to optimize an existing system.

+
+ +
+

Why Switch to Linux?

+

Linux offers numerous advantages over proprietary operating systems like Windows or macOS, including enhanced privacy, better security, improved performance (especially on older hardware), freedom from telemetry and tracking, and access to powerful open-source software—all without licensing costs.

+ +

Our Linux Setup Services

+

I provide end-to-end assistance for transitioning to Linux, with options tailored to your experience level and requirements:

+ +
+

Distribution Selection and Planning

+

I'll help you navigate the many Linux distributions available and select the one that best matches your needs, hardware, and usage patterns. Whether you need a user-friendly system like Linux Mint for everyday use, a security-focused distribution like Qubes OS, or something specialized for particular workloads, I'll guide you to the right choice with a clear explanation of the trade-offs.

+
+ +
+

Installation and System Configuration

+

I'll handle the complete installation process, including disk partitioning, dual-boot setup (if required), driver installation, and initial system configuration. Your system will be set up with proper security settings, optimized performance parameters, and all necessary hardware support to ensure everything works correctly from day one.

+
+ +
+

Software Migration and Setup

+

I'll help identify and install Linux alternatives for your current software, set up compatibility layers for Windows applications when needed, and configure your applications with appropriate settings. This includes transferring your data, documents, emails, browser profiles, and other important information to ensure continuity in your workflow.

+
+ +
+

Personalized Training and Documentation

+

I'll provide hands-on training sessions tailored to your needs, covering daily operations, system maintenance, software installation, troubleshooting, and security practices. You'll receive custom documentation for your specific setup, ensuring you can confidently use and maintain your new Linux system.

+
+ +

Benefits of Using Linux

+
    +
  • Enhanced Privacy: Avoid built-in telemetry and data collection present in commercial operating systems
  • +
  • Improved Security: Benefit from the robust security model, fewer malware threats, and rapid security updates
  • +
  • System Control: Gain complete control over your operating system without artificial limitations
  • +
  • Performance: Experience faster operation, particularly on older hardware that struggles with Windows
  • +
  • Longevity: Extend the useful life of your hardware by avoiding forced obsolescence
  • +
  • Cost Savings: Eliminate licensing costs for both the operating system and much of your software
  • +
  • Customization: Tailor your computing environment to match your exact preferences
  • +
+ +

My Approach

+

When setting up Linux for clients, I take a comprehensive approach that includes:

+
    +
  • Assessing your needs, workflows, and hardware capabilities before recommending solutions
  • +
  • Creating a migration plan that minimizes disruption to your daily activities
  • +
  • Implementing appropriate security measures from the start
  • +
  • Finding the right balance between privacy, security, and ease of use
  • +
  • Ensuring you have alternatives for all your essential software
  • +
  • Providing sufficient training and resources so you feel confident using your new system
  • +
  • Offering follow-up support to address any questions or issues that arise
  • +
+ +

Linux Distributions I Work With

+

I have experience with a wide range of Linux distributions, including but not limited to:

+
    +
  • For Beginners: Linux Mint, Ubuntu, Pop!_OS, Elementary OS
  • +
  • For Privacy Focus: Fedora, Debian, Arch Linux, Qubes OS, Whonix
  • +
  • For Older Hardware: Lubuntu, Xubuntu, Peppermint OS, AntiX
  • +
  • For Specialized Needs: Kali Linux, Ubuntu Studio, Tails
  • +
+ +

What to Expect

+

The Linux setup process typically includes these steps:

+
    +
  1. Initial consultation to understand your needs and expectations
  2. +
  3. Selection of appropriate distribution and creation of a migration plan
  4. +
  5. Backup of your existing data for safety
  6. +
  7. Hardware compatibility verification and potential driver solutions identification
  8. +
  9. Installation and base system configuration
  10. +
  11. Software installation and data migration
  12. +
  13. Security hardening and privacy enhancements
  14. +
  15. Personalized training session(s)
  16. +
  17. Provision of custom documentation
  18. +
  19. Follow-up support to ensure your transition is successful
  20. +
+
+ +
+

Start Your Journey to Digital Freedom

+

Ready to experience the benefits of Linux? Contact me today to discuss how I can help you transition to a more private, secure, and powerful computing environment.

+ Contact Me +
+
+ + diff --git a/src/pages/services/nas.astro b/src/pages/services/nas.astro new file mode 100644 index 0000000..794c238 --- /dev/null +++ b/src/pages/services/nas.astro @@ -0,0 +1,153 @@ +--- +import Layout from '../../components/Layout.astro'; +--- + + +

Network Attached Storage (NAS) Setup Service

+ +
+

Take control of your data with a custom Network Attached Storage (NAS) solution that provides secure, reliable, and private storage accessible from all your devices while keeping your files under your complete control.

+
+ +
+

What is a NAS?

+

A Network Attached Storage (NAS) system is a dedicated file storage server connected to your network that allows multiple users and devices to retrieve and store data from a centralized location. Unlike cloud storage services where your files reside on someone else's servers, a NAS keeps your data local and under your complete control, while still offering many of the same conveniences like remote access and file sharing.

+ +

Our NAS Setup Services

+

I offer comprehensive NAS implementation services tailored to your specific needs:

+ +
+

Hardware Selection and Configuration

+

I'll help you select the right NAS hardware based on your storage needs, performance requirements, and budget. This can range from pre-built NAS devices from manufacturers like Synology or QNAP to custom-built solutions using TrueNAS or other open-source software. Your system will be configured with appropriate storage redundancy to protect against drive failures and data loss.

+
+ +
+

Data Organization and Access Control

+

I'll create an optimal file structure and permission system that organizes your data logically and ensures appropriate access levels for different users and devices. Whether you need simple folder shares or more complex permission structures, your NAS will be configured to provide the right balance of accessibility and security for your specific scenario.

+
+ +
+

Backup Strategy Implementation

+

I'll design and implement a comprehensive backup solution for your important data, potentially including local snapshots, external drive backups, or secure off-site backups to protect against different disaster scenarios. Your backup system will be automated and monitored to ensure your data remains protected with minimal maintenance required.

+
+ +

Benefits of a Personal NAS

+
    +
  • Complete Data Control: Keep your files on hardware you own, under your physical control
  • +
  • Enhanced Privacy: Eliminate reliance on third-party cloud services that may scan or analyze your data
  • +
  • No Subscription Fees: Avoid recurring costs associated with cloud storage services
  • +
  • Centralized Storage: Access your files from any device on your network
  • +
  • Expanded Capacity: Scale your storage capacity based on your needs
  • +
  • Data Redundancy: Protect against drive failures with RAID or similar technologies
  • +
  • Fast Access Speeds: Benefit from local network speeds rather than internet-dependent cloud access
  • +
  • Media Streaming: Stream your personal media library to devices throughout your home
  • +
+ +

Features Available with a NAS

+

Your NAS implementation can include any combination of these powerful features:

+
    +
  • File sharing across Windows, Mac, and Linux computers
  • +
  • Mobile access for iOS and Android devices
  • +
  • Secure remote access when away from home
  • +
  • Automatic photo and video backup from mobile devices
  • +
  • Media server functionality for streaming to smart TVs, game consoles, and other devices
  • +
  • Document synchronization similar to Dropbox or Google Drive
  • +
  • Automated backup of computers and other devices
  • +
  • Multi-user access with granular permissions
  • +
  • Data snapshots for point-in-time recovery
  • +
  • Encryption for sensitive data
  • +
+ +

NAS Solutions I Work With

+

I have experience with various NAS platforms, including:

+
    +
  • Pre-built Commercial NAS: Synology, QNAP, Asustor, TerraMaster
  • +
  • Open-Source NAS Software: TrueNAS Core/Scale, OpenMediaVault, Rockstor
  • +
  • DIY Solutions: Custom-built hardware with Linux-based storage solutions
  • +
  • Raspberry Pi-based: Lightweight NAS solutions for basic needs
  • +
+ +

My Approach

+

When setting up a NAS for clients, I take a comprehensive approach that includes:

+
    +
  • Assessment of your storage needs, usage patterns, and security requirements
  • +
  • Selection of appropriate hardware and software based on your specific situation
  • +
  • Implementation of robust storage configurations with appropriate redundancy
  • +
  • Secure network integration with proper authentication methods
  • +
  • Configuration of automated backup systems for critical data
  • +
  • Setup of remote access with strong security measures
  • +
  • Creation of logical folder structures and permission systems
  • +
  • Performance optimization for your specific usage patterns
  • +
  • Thorough documentation of your system configuration
  • +
  • Training on day-to-day use and basic maintenance procedures
  • +
+ +

Storage Considerations

+

Proper storage configuration is critical for a reliable NAS. I'll help you navigate considerations such as:

+
    +
  • Drive Selection: Choosing between consumer vs. NAS-specific hard drives
  • +
  • Redundancy Level: Determining the right RAID level or alternative like ZFS
  • +
  • Capacity Planning: Estimating current and future storage needs
  • +
  • SSD Caching: Evaluating if SSD caching would benefit your workload
  • +
  • Backup Strategy: Implementing the 3-2-1 backup rule for critical data
  • +
+

Your NAS will be configured to balance performance, capacity, data protection, and cost according to your priorities.

+ +

Common Use Cases

+

A personal NAS is ideal for numerous scenarios, including:

+
    +
  • Home Media Library: Centralized storage for photos, videos, and music
  • +
  • Document Management: Secure storage for important personal and financial documents
  • +
  • Computer Backup: Automated backup of laptops, desktops, and mobile devices
  • +
  • Family File Sharing: Shared folders for family members with appropriate permissions
  • +
  • Media Streaming: Personal Netflix-like experience with Plex or Jellyfin
  • +
  • Home Surveillance: Storage for security camera footage
  • +
  • Small Business Storage: Centralized file server for small office environments
  • +
+
+ +
+

Take Control of Your Digital Storage

+

Ready to establish your own private, secure storage solution? Contact me today to discuss implementing a NAS system customized to your specific needs.

+ Contact Me +
+
+ + diff --git a/src/pages/services/openwrt.astro b/src/pages/services/openwrt.astro new file mode 100644 index 0000000..df375b8 --- /dev/null +++ b/src/pages/services/openwrt.astro @@ -0,0 +1,133 @@ +--- +import Layout from '../../components/Layout.astro'; +--- + + +

OpenWRT Router Service

+ +
+

Transform your network with OpenWRT, a powerful open-source router firmware that provides enterprise-grade features, enhanced security, and complete control over your home or business network.

+
+ +
+

What is OpenWRT?

+

OpenWRT is a highly customizable, Linux-based operating system for routers that transforms consumer-grade hardware into professional networking equipment. By replacing your router's stock firmware with OpenWRT, you gain access to advanced features typically found only in expensive commercial solutions, along with the freedom to customize your network environment precisely to your needs.

+ +

Our OpenWRT Services

+

I offer comprehensive OpenWRT implementation services tailored to your specific networking requirements:

+ +
+

Hardware Selection and Setup

+

I'll help you select the most appropriate router hardware based on your network requirements, budget, and feature needs. I can either configure your existing router (if compatible) or recommend and set up new hardware that offers the best performance and compatibility with OpenWRT. All installation is performed with careful attention to your specific network topology.

+
+ +
+

Custom Firmware Configuration

+

I'll install and configure OpenWRT with optimized settings for your specific needs, including network segmentation with VLANs, advanced Quality of Service (QoS) for bandwidth management, and secure wireless configurations with proper encryption. Your network will be tailored to provide the perfect balance of performance, security, and ease of use.

+
+ +
+

Network Security Hardening

+

I'll implement comprehensive security measures within OpenWRT, including secure firewall rules, intrusion detection systems, network monitoring tools, and DNS-based protection like Pi-hole or AdGuard Home integration. Your network will be protected from common threats while maintaining the flexibility you need.

+
+ +

Benefits of OpenWRT

+
    +
  • Enhanced Performance: Optimize router performance beyond factory limitations with fine-tuned settings and more efficient resource usage
  • +
  • Improved Security: Implement robust security features and receive timely security updates to protect against vulnerabilities
  • +
  • Network Control: Gain complete visibility and control over your network traffic, devices, and bandwidth allocation
  • +
  • Advanced Features: Access enterprise-grade networking capabilities without expensive hardware investments
  • +
  • Privacy Protection: Implement network-wide ad blocking, tracking prevention, and VPN integration
  • +
  • Extended Hardware Life: Breathe new life into older router hardware that may no longer receive manufacturer updates
  • +
  • Customization: Add exactly the features you need through OpenWRT's package system
  • +
+ +

Features Available with OpenWRT

+

Your OpenWRT implementation can include any combination of these powerful features:

+
    +
  • Network segmentation with VLANs to separate different types of devices and traffic
  • +
  • Quality of Service (QoS) to prioritize important traffic and ensure smooth operation
  • +
  • Guest network with restricted access to your main network
  • +
  • VPN client or server functionality for secure remote access
  • +
  • Network-wide ad blocking and tracking prevention
  • +
  • Advanced wireless settings with multiple SSIDs and access control
  • +
  • Dynamic DNS integration for easy remote access to your network
  • +
  • Traffic monitoring and bandwidth usage statistics
  • +
  • Parental controls and content filtering
  • +
  • Wake-on-LAN and other remote management tools
  • +
+ +

My Approach

+

When implementing OpenWRT for clients, I take a comprehensive approach that includes:

+
    +
  • Assessment of your current network infrastructure and requirements
  • +
  • Thorough hardware evaluation to ensure compatibility and performance
  • +
  • Backup of existing configuration before any changes
  • +
  • Careful installation with fallback options in case of issues
  • +
  • Customized configuration based on your specific needs
  • +
  • Security hardening to protect against common threats
  • +
  • Performance optimization for your specific usage patterns
  • +
  • Thorough testing of all implemented features
  • +
  • Detailed documentation of your network setup
  • +
  • Knowledge transfer so you understand your network configuration
  • +
+ +

Compatible Hardware

+

OpenWRT supports a wide range of router hardware, including popular models from:

+
    +
  • Netgear
  • +
  • TP-Link
  • +
  • ASUS
  • +
  • Linksys
  • +
  • GL.iNet
  • +
  • MikroTik
  • +
  • And many others
  • +
+

I can help you determine if your existing router is compatible or recommend appropriate hardware for your needs and budget.

+
+ +
+

Unlock Your Router's Full Potential

+

Ready to transform your network with professional-grade features and enhanced security? Contact me today to discuss implementing OpenWRT for your home or business network.

+ Contact Me +
+
+ + diff --git a/src/pages/services/opnsense.astro b/src/pages/services/opnsense.astro new file mode 100644 index 0000000..5979996 --- /dev/null +++ b/src/pages/services/opnsense.astro @@ -0,0 +1,116 @@ +--- +import Layout from '../../components/Layout.astro'; +--- + + +

OPNsense Firewall Service

+ +
+

Secure your network with OPNsense, a powerful open-source enterprise-grade firewall and routing platform that provides comprehensive network protection and control.

+
+ +
+

What is OPNsense?

+

OPNsense is a premium open-source firewall and routing platform that combines robust security features with an intuitive interface. It incorporates advanced capabilities like intrusion detection, VPN services, traffic shaping, and application filtering, all managed through a straightforward web interface. As a security-focused platform, it provides enterprise-grade protection for both home and business networks.

+ +

Our OPNsense Services

+

I offer several implementation options based on your specific needs:

+ +
+

Hardware Selection and Setup

+

I'll help you select the appropriate hardware platform for your OPNsense deployment, considering factors like network size, desired throughput, and future scalability. Then I'll install and configure the OPNsense software with optimized settings for your specific environment, ensuring proper hardware utilization and reliable operation.

+
+ +
+

Network Security Configuration

+

I'll implement a comprehensive security configuration including firewall rules, intrusion detection/prevention settings, web filtering, spam protection, and application control. Your network will be protected from external threats while maintaining appropriate access for legitimate users and applications, with rules tailored to your specific security requirements.

+
+ +
+

VPN and Remote Access Setup

+

I'll configure secure VPN services (OpenVPN, WireGuard, or IPsec) for remote access to your network, establish site-to-site connections between multiple locations, and implement appropriate access controls and authentication mechanisms. This enables secure remote work while maintaining protection of your internal resources.

+
+ +

Benefits of OPNsense

+
    +
  • Enhanced Network Security: Protect your network from external threats with advanced firewall capabilities and intrusion detection/prevention systems
  • +
  • Complete Visibility: Gain insights into your network traffic with comprehensive monitoring and reporting tools
  • +
  • Content Filtering: Control access to websites and online services based on categories, domains, or content types
  • +
  • Traffic Management: Optimize bandwidth usage with Quality of Service (QoS) features to prioritize critical applications
  • +
  • Secure Remote Access: Enable secure connections to your network for remote users or between multiple sites
  • +
+ +

Features Included

+

Your OPNsense implementation will include:

+
    +
  • Stateful packet inspection firewall with customized rule sets
  • +
  • Intrusion detection and prevention system (Suricata)
  • +
  • Web proxy and content filtering
  • +
  • VPN capabilities (OpenVPN, WireGuard, IPsec)
  • +
  • Captive portal for guest networks (if needed)
  • +
  • VLAN support for network segmentation
  • +
  • Traffic shaping and bandwidth management
  • +
  • Real-time monitoring and historical reporting
  • +
  • Network address translation (NAT) and port forwarding
  • +
  • High availability configuration (for business deployments)
  • +
+ +

My Approach

+

When setting up OPNsense for clients, I take a comprehensive approach that includes:

+
    +
  • Assessing your current network infrastructure and security requirements
  • +
  • Designing a tailored implementation plan for your specific environment
  • +
  • Selecting and configuring appropriate hardware with performance headroom
  • +
  • Implementing security features with a defense-in-depth strategy
  • +
  • Setting up monitoring and alerting to notify you of potential issues
  • +
  • Creating detailed documentation of your network configuration
  • +
  • Training you or your staff on basic administration and monitoring
  • +
  • Providing recommendations for ongoing security maintenance
  • +
+
+ +
+

Secure Your Network with Enterprise-Grade Protection

+

Ready to enhance your network security with a robust, open-source firewall solution? Contact me today to discuss implementing OPNsense for your home or business network.

+ Contact Me +
+
+ + diff --git a/src/pages/services/proxmox.astro b/src/pages/services/proxmox.astro new file mode 100644 index 0000000..e02a977 --- /dev/null +++ b/src/pages/services/proxmox.astro @@ -0,0 +1,141 @@ +--- +import Layout from '../../components/Layout.astro'; +--- + + +

Proxmox VE Setup Service

+ +
+

Maximize your hardware resources with Proxmox Virtual Environment, a powerful open-source virtualization platform that enables you to run multiple virtual machines and containers on a single physical server.

+
+ +
+

What is Proxmox VE?

+

Proxmox Virtual Environment (Proxmox VE) is an enterprise-grade, open-source server management platform for virtualization. It combines two virtualization technologies—KVM (Kernel-based Virtual Machine) for full virtual machines and LXC (Linux Containers) for lightweight containers—into a single, integrated platform. This allows you to run multiple isolated operating systems and applications on a single physical machine, maximizing hardware utilization and providing flexible resource management.

+ +

Our Proxmox VE Services

+

I offer comprehensive Proxmox implementation services tailored to your specific requirements:

+ +
+

Hardware Assessment and Setup

+

I'll evaluate your existing hardware or help you select appropriate components for a new Proxmox server, focusing on reliability, performance, and compatibility. The installation will include proper system configuration, storage setup with ZFS or other file systems, networking configuration, and initial hardening to ensure your virtualization platform is built on a solid foundation.

+
+ +
+

Virtual Machine and Container Configuration

+

I'll create and configure virtual machines and containers according to your specific needs, whether you're looking to consolidate multiple services, create development environments, or establish isolated network applications. Each virtual environment will be properly sized and optimized for its intended purpose, with appropriate resource allocation and networking setup.

+
+ +
+

Backup and High-Availability Implementation

+

I'll implement a comprehensive backup strategy for your virtual environments, ensuring your data and services can be quickly recovered in case of failure. For systems requiring maximum uptime, I can also configure high-availability setups with multiple Proxmox nodes, allowing automatic failover in case one node experiences problems.

+
+ +

Benefits of Proxmox VE

+
    +
  • Resource Optimization: Run multiple services on a single physical server, maximizing hardware utilization and reducing power consumption
  • +
  • Service Isolation: Keep services separated in their own virtual environments for enhanced security and stability
  • +
  • Simplified Management: Manage all your virtual machines and containers through a single web interface
  • +
  • Flexible Backup Solutions: Create snapshots and backups of entire virtual machines for easy recovery
  • +
  • Live Migration: Move running virtual machines between Proxmox nodes without downtime
  • +
  • Open-Source Freedom: Avoid vendor lock-in and licensing costs associated with proprietary virtualization platforms
  • +
  • Hardware Independence: Abstract your services from the underlying hardware for easier upgrades and maintenance
  • +
+ +

Features Included

+

Your Proxmox VE implementation will include:

+
    +
  • Complete system installation and initial configuration
  • +
  • Storage setup with appropriate redundancy (ZFS, LVM, etc.)
  • +
  • Network configuration including VLANs, bridges, and bonds if needed
  • +
  • Virtual machine creation and template configuration
  • +
  • Container setup with appropriate isolation
  • +
  • Resource management and monitoring tools
  • +
  • Backup strategy implementation
  • +
  • Security hardening of the host system
  • +
  • Documentation of the complete setup
  • +
  • Knowledge transfer and training
  • +
+ +

Common Use Cases for Proxmox

+

Proxmox VE is ideal for various scenarios, including:

+
    +
  • Home Lab: Create a versatile environment for learning, testing, and running home services
  • +
  • Service Consolidation: Combine multiple physical servers into one efficient virtualized environment
  • +
  • Development Environments: Quickly spin up isolated environments for software development and testing
  • +
  • Network Services: Run firewall, VPN, monitoring, and other network services in separate containers
  • +
  • Media Servers: Host Plex, Jellyfin, or other media applications alongside other services
  • +
  • Home Automation: Create dedicated environments for smart home controllers and automation systems
  • +
  • Small Business Infrastructure: Build cost-effective, reliable IT infrastructure for small businesses
  • +
+ +

My Approach

+

When implementing Proxmox VE for clients, I take a comprehensive approach that includes:

+
    +
  • Detailed assessment of your needs and existing infrastructure
  • +
  • Planning the optimal virtualization architecture for your use case
  • +
  • Implementation with best practices for security and performance
  • +
  • Thorough testing of all components and virtual environments
  • +
  • Documentation of the entire setup for future reference
  • +
  • Training sessions to ensure you can manage your virtualization environment
  • +
  • Recommendations for ongoing maintenance and future expansion
  • +
  • Follow-up support to address any questions or issues
  • +
+ +

Hardware Considerations

+

While Proxmox can run on various hardware configurations, certain components are particularly important:

+
    +
  • CPU: Processors with virtualization extensions (Intel VT-x/AMD-V) for best performance
  • +
  • RAM: Sufficient memory to allocate across multiple virtual machines
  • +
  • Storage: Fast, reliable drives configured appropriately for virtualization workloads
  • +
  • Network: Multiple network interfaces for segregated networks or redundancy
  • +
  • Power Management: Reliable power supply with UPS backup for critical systems
  • +
+

I can help evaluate your existing hardware or recommend an appropriate configuration based on your specific needs and budget.

+
+ +
+

Unlock the Power of Virtualization

+

Ready to transform your computing infrastructure with a flexible, powerful virtualization platform? Contact me today to discuss implementing Proxmox VE for your specific needs.

+ Contact Me +
+
+ + diff --git a/src/pages/services/remove-telemetry.astro b/src/pages/services/remove-telemetry.astro new file mode 100644 index 0000000..5352b05 --- /dev/null +++ b/src/pages/services/remove-telemetry.astro @@ -0,0 +1,116 @@ +--- +import Layout from '../../components/Layout.astro'; +--- + + +

Remove Windows Telemetry Service

+ +
+

Reclaim your privacy by minimizing or eliminating the extensive data collection systems built into Windows 10 and 11, while maintaining system stability and functionality.

+
+ +
+

What is Windows Telemetry?

+

Windows telemetry refers to the data collection systems Microsoft has built into Windows operating systems that gather information about your usage patterns, hardware configuration, application usage, and various system metrics. This data is regularly sent to Microsoft's servers, often without clear visibility into exactly what is being collected or how it's being used.

+ +

Our Windows Privacy Service

+

I offer a comprehensive approach to reducing or eliminating unwanted data collection in Windows while ensuring your system continues to function properly:

+ +
+

Telemetry Audit and Assessment

+

I'll thoroughly analyze your current Windows installation to identify active telemetry components, background services, scheduled tasks, and other mechanisms that may be collecting and transmitting your data. This provides a clear picture of your current privacy exposure.

+
+ +
+

Customized Telemetry Removal

+

Based on your comfort level and specific needs, I'll implement a tailored combination of settings changes, service disabling, and policy modifications to reduce or eliminate telemetry. This can range from minimizing data collection to completely blocking all outbound communication with Microsoft's telemetry servers.

+
+ +
+

Privacy-Focused System Configuration

+

Beyond telemetry, I'll configure your Windows system with privacy-enhancing settings across all aspects of the operating system, including the Start menu, Cortana, Microsoft account integration, app permissions, and Windows Update behavior, creating a more private computing environment.

+
+ +

Benefits of Removing Windows Telemetry

+
    +
  • Enhanced Privacy: Significantly reduce the personal and system data shared with Microsoft
  • +
  • Reduced Network Usage: Eliminate background processes that constantly communicate with external servers
  • +
  • Improved Performance: Remove unnecessary services and processes that consume system resources
  • +
  • Greater Control: Understand and manage what information leaves your computer
  • +
  • Peace of Mind: Use your computer without concerns about constant monitoring
  • +
+ +

What's Included

+

My Windows telemetry removal service includes:

+
    +
  • Disabling or limiting the Windows telemetry service and related components
  • +
  • Blocking connection to Microsoft telemetry servers via hosts file or firewall rules
  • +
  • Removing or disabling Cortana and related voice data collection
  • +
  • Configuring privacy settings across Windows and Microsoft applications
  • +
  • Disabling intrusive Windows features like targeted advertising
  • +
  • Installing and configuring additional privacy tools as needed
  • +
  • Adjusting permissions for pre-installed Windows apps
  • +
  • Thorough testing to ensure system stability after modifications
  • +
  • Documentation of all changes made for future reference
  • +
+ +

My Approach

+

When removing Windows telemetry for clients, I take a balanced approach that prioritizes:

+
    +
  • Respecting your individual privacy preferences and threat model
  • +
  • Maintaining system stability and functionality
  • +
  • Ensuring Windows Updates can still be received as needed
  • +
  • Preserving features you use while removing those you don't
  • +
  • Documenting all changes made so they can be reversed if needed
  • +
  • Providing education about the privacy implications of various Windows features
  • +
+ +

Compatibility Considerations

+

While I strive to maintain full system functionality when implementing privacy measures, it's important to understand that some Microsoft services are tightly integrated with telemetry components. I'll clearly explain any potential trade-offs before making changes, ensuring you can make informed decisions about your privacy versus functionality balance.

+
+ +
+

Take Back Control of Your Windows Privacy

+

Ready to stop Windows from collecting and sharing your data? Contact me today to discuss a customized approach to enhancing your Windows privacy.

+ Contact Me +
+
+ + diff --git a/src/pages/services/tor.astro b/src/pages/services/tor.astro new file mode 100644 index 0000000..00ff004 --- /dev/null +++ b/src/pages/services/tor.astro @@ -0,0 +1,107 @@ +--- +import Layout from '../../components/Layout.astro'; +--- + + +

TOR Network Setup Service

+ +
+

Enhance your online anonymity and privacy with a properly configured TOR (The Onion Router) setup customized for your specific needs.

+
+ +
+

What is TOR?

+

The TOR network is a system designed to enable anonymous communication by directing internet traffic through a worldwide overlay network of thousands of relays. This conceals a user's location and usage from surveillance and traffic analysis, providing a valuable layer of privacy and anonymity online.

+ +

Our TOR Network Services

+

Depending on your needs, I offer several TOR implementation options:

+ +
+

TOR Browser Setup

+

The simplest way to access the TOR network. I'll install and configure the TOR Browser on your devices, customize it for optimal privacy, and provide training on safe browsing practices specific to TOR. This setup is ideal for occasional use when you need enhanced privacy.

+
+ +
+

Dedicated TOR Relay

+

For those who want to contribute to the TOR network while gaining privacy benefits. I'll set up a dedicated TOR relay node on your hardware or a VPS, properly configuring it to match your bandwidth capabilities and preferences. This helps strengthen the overall TOR network while allowing you to participate in a meaningful privacy project.

+
+ +
+

Network-Wide TOR Routing

+

For comprehensive protection, I can configure your router or network gateway to route all (or selected) traffic through the TOR network. This provides TOR's anonymity benefits to all connected devices without requiring individual configuration, ideal for heightened privacy concerns or specialized environments.

+
+ +

Benefits of Using TOR

+
    +
  • Enhanced Anonymity: Your internet traffic is routed through multiple relays around the world, making it extremely difficult to trace activities back to your IP address
  • +
  • Circumvention of Censorship: Access content and services that may be blocked or restricted in your location
  • +
  • Protection Against Surveillance: Reduce tracking and monitoring of your online activities by network observers
  • +
  • Access to Onion Services: Reach special .onion sites that are only available within the TOR network and offer additional privacy features
  • +
+ +

Important Considerations

+

While TOR provides significant privacy benefits, it's important to understand its limitations:

+
    +
  • Connection speeds may be slower than regular browsing due to traffic routing through multiple relays
  • +
  • Some websites may block TOR exit nodes or require additional verification
  • +
  • TOR provides anonymity but not necessarily end-to-end encryption (though can be combined with other tools like VPNs)
  • +
  • Certain browsing behaviors can still potentially compromise your anonymity despite using TOR
  • +
+ +

My Approach

+

When setting up TOR for clients, I take a comprehensive approach that includes:

+
    +
  • Discussion of your specific privacy needs and threat model to determine the most appropriate TOR setup
  • +
  • Selection and configuration of the right hardware or software components
  • +
  • Implementation of additional security measures to complement TOR's protections
  • +
  • Thorough testing to ensure the system works correctly while preserving performance
  • +
  • Detailed documentation and training so you understand how to use and maintain your TOR setup
  • +
  • Recommendations for best practices when using TOR to maximize your privacy
  • +
+
+ +
+

Get Started with Enhanced Anonymity

+

Ready to significantly enhance your online privacy with TOR? Contact me today to discuss your specific requirements and how a customized TOR setup can help protect your digital identity.

+ Contact Me +
+
+ + diff --git a/src/pages/services/vpn.astro b/src/pages/services/vpn.astro new file mode 100644 index 0000000..d6d5d5c --- /dev/null +++ b/src/pages/services/vpn.astro @@ -0,0 +1,134 @@ +--- +import Layout from '../../components/Layout.astro'; +--- + + +

VPN Services

+ +
+

Protect your online privacy, secure your data, and access geo-restricted content with professional VPN implementation services tailored to your specific needs and privacy requirements.

+
+ +
+

What are VPN Services?

+

A Virtual Private Network (VPN) creates an encrypted tunnel for your internet traffic, protecting your data from eavesdropping and hiding your IP address from websites and services you access. Modern VPNs can provide robust privacy protection, secure remote access to resources, and the ability to bypass geographical restrictions, all while maintaining good connection speeds.

+ +

Our VPN Services

+

I offer comprehensive VPN solutions designed to meet various privacy and security needs:

+ +
+

Self-Hosted VPN Implementation

+

I'll set up a private VPN server on your chosen hardware or a Virtual Private Server (VPS), giving you complete control over your data and connection point. This eliminates the need to trust third-party VPN providers who might log your activities or compromise your privacy. Options include OpenVPN, WireGuard, and IPsec depending on your specific requirements.

+
+ +
+

Commercial VPN Selection and Configuration

+

If self-hosting isn't ideal for your situation, I'll help you evaluate and select a commercial VPN service that genuinely respects privacy, has been independently audited, and meets your specific needs. I'll then ensure it's properly configured across all your devices for maximum security and performance.

+
+ +
+

Router-Based VPN Setup

+

For network-wide protection, I'll implement VPN services directly on your router, ensuring all connected devices benefit from encryption and privacy protection without requiring individual configuration. This is ideal for securing smart home devices, streaming boxes, and other hardware that doesn't support native VPN clients.

+
+ +

Benefits of Using a VPN

+
    +
  • Enhanced Privacy: Hide your browsing activity from your ISP, network administrators, and websites you visit
  • +
  • Data Security: Encrypt your internet traffic to protect sensitive information, especially on public Wi-Fi networks
  • +
  • IP Address Masking: Conceal your real IP address to reduce tracking and profiling
  • +
  • Geographical Freedom: Access content and services that may be restricted in your location
  • +
  • ISP Throttling Prevention: Avoid selective speed throttling based on content type
  • +
  • Secure Remote Access: Connect to home or business networks safely from anywhere
  • +
+ +

VPN Protocols I Work With

+

I have experience implementing various VPN technologies to match different needs:

+
    +
  • WireGuard: Modern, lightweight protocol offering exceptional performance and security
  • +
  • OpenVPN: Mature, highly configurable open-source solution with broad compatibility
  • +
  • IPsec/IKEv2: Robust protocol with excellent mobile support and automatic reconnection
  • +
  • SoftEther: Versatile multi-protocol VPN server with advanced features
  • +
+ +

Service Features

+

My VPN implementation service includes:

+
    +
  • Assessment of your specific privacy needs and threat model
  • +
  • Selection of the appropriate VPN technology based on your requirements
  • +
  • Secure server configuration with hardened settings
  • +
  • Client setup on all your devices (computers, phones, tablets, etc.)
  • +
  • DNS leak protection to prevent exposure of your queries
  • +
  • Kill switch configuration to prevent unprotected connections
  • +
  • Split tunneling options for selective routing (when appropriate)
  • +
  • Performance optimization for your specific usage patterns
  • +
  • Detailed documentation and knowledge transfer
  • +
+ +

My Approach

+

When implementing VPN solutions for clients, I take a comprehensive approach that includes:

+
    +
  • Understanding your specific privacy concerns and use cases
  • +
  • Evaluating the best hosting options or service providers based on your needs
  • +
  • Implementing appropriate security measures from the ground up
  • +
  • Testing connections across different networks and scenarios
  • +
  • Providing education on best practices when using a VPN
  • +
  • Ensuring you understand how to verify your VPN is working correctly
  • +
  • Creating a maintenance plan for keeping your VPN secure over time
  • +
+ +

Important Considerations

+

While VPNs provide significant privacy benefits, it's important to understand their limitations:

+
    +
  • A VPN encrypts your connection but doesn't provide complete anonymity
  • +
  • Some services may block known VPN IP addresses
  • +
  • The quality of implementation matters significantly for security
  • +
  • Self-hosted VPNs require proper maintenance to remain secure
  • +
+

I'll ensure you understand these considerations and how they apply to your specific use case, helping you make informed decisions about your privacy setup.

+
+ +
+

Take Control of Your Online Privacy

+

Ready to enhance your internet privacy and security with a properly implemented VPN solution? Contact me today to discuss your specific requirements and how I can help protect your digital life.

+ Contact Me +
+
+ + diff --git a/src/pages/services/vps.astro b/src/pages/services/vps.astro new file mode 100644 index 0000000..c7dd71c --- /dev/null +++ b/src/pages/services/vps.astro @@ -0,0 +1,145 @@ +--- +import Layout from '../../components/Layout.astro'; +--- + + +

VPS Setup Service

+ +
+

Establish your own private digital presence with a professionally configured Virtual Private Server (VPS) that provides enhanced privacy, security, and control over your online services and data.

+
+ +
+

What is a VPS?

+

A Virtual Private Server (VPS) is a virtualized server that functions as a dedicated server within a shared hosting environment. Unlike shared hosting, a VPS gives you complete control over your server environment, including your own operating system, storage, RAM, and processing power. This allows you to run virtually any software or service you need while maintaining privacy and independence from big tech platforms.

+ +

Our VPS Services

+

I offer comprehensive VPS setup and configuration services tailored to your specific needs:

+ +
+

Provider Selection and Initial Setup

+

I'll help you select the most appropriate VPS provider based on your privacy requirements, budget, and geographical preferences. I'll then handle the initial server provisioning, operating system installation, and basic security hardening to create a solid foundation for your digital services. Your server will be configured with secure SSH access, proper user management, and essential security measures from the start.

+
+ +
+

Privacy-Focused Service Implementation

+

I'll install and configure the specific services you need on your VPS, such as self-hosted email, cloud storage, VPN endpoints, personal websites, messaging platforms, or other privacy-respecting alternatives to mainstream services. Each service will be optimized for security, performance, and ease of maintenance, with appropriate data segregation and backup strategies.

+
+ +
+

Ongoing Maintenance Planning

+

I'll establish automated security updates, monitoring systems, and backup procedures to keep your VPS running smoothly and securely with minimal intervention. You'll receive documentation and training on basic server management tasks, as well as recommendations for routine maintenance to ensure long-term stability and security of your services.

+
+ +

Benefits of Running Your Own VPS

+
    +
  • Digital Sovereignty: Maintain complete control over your data and online services rather than relying on third-party platforms
  • +
  • Enhanced Privacy: Keep your data off major tech platforms that may mine it for advertising or other purposes
  • +
  • Customization: Configure services exactly according to your needs without limitations imposed by shared hosting
  • +
  • Consolidation: Host multiple services on a single server, reducing costs and complexity
  • +
  • Learning Opportunity: Develop valuable technical skills in server administration and management
  • +
  • Fixed Costs: Pay a predictable monthly fee rather than escalating costs based on usage
  • +
+ +

Services You Can Host on Your VPS

+

Your VPS can host a wide variety of privacy-respecting services, including:

+
    +
  • Web Hosting: Personal websites, blogs, portfolios, or web applications
  • +
  • Email Server: Private email service under your control with custom domain
  • +
  • Cloud Storage: Your own Nextcloud or Seafile instance for file storage and synchronization
  • +
  • VPN Endpoint: Personal VPN server for secure internet access from anywhere
  • +
  • Password Manager: Self-hosted Bitwarden for secure credential storage
  • +
  • Media Server: Plex, Jellyfin, or similar for your personal media collection
  • +
  • Git Repository: Private code hosting with Gitea or GitLab
  • +
  • Analytics: Privacy-friendly website analytics like Matomo or Plausible
  • +
  • Chat/Communication: Matrix, XMPP, or other secure messaging platforms
  • +
  • RSS Reader: Self-hosted news aggregation with FreshRSS or Miniflux
  • +
+ +

Security Features Included

+

Your VPS setup will include these essential security measures:

+
    +
  • Secure SSH configuration with key-based authentication
  • +
  • Properly configured firewall with restrictive rules
  • +
  • Fail2ban to protect against brute force attacks
  • +
  • Regular security updates through automated processes
  • +
  • TLS/SSL certificate implementation for encrypted connections
  • +
  • User account separation with appropriate permissions
  • +
  • Intrusion detection monitoring
  • +
  • Regular backup system for data protection
  • +
  • Security-focused web server configuration
  • +
+ +

My Approach

+

When setting up a VPS for clients, I take a comprehensive approach that includes:

+
    +
  • Detailed discussion of your needs, technical comfort level, and privacy requirements
  • +
  • Selection of the right VPS provider and plan based on your specific use case
  • +
  • Security-first implementation with defense-in-depth strategies
  • +
  • Clear documentation of all installed services and configurations
  • +
  • Knowledge transfer sessions to ensure you understand your server
  • +
  • Implementation of monitoring and notification systems for early problem detection
  • +
  • Establishment of backup procedures appropriate to your data
  • +
  • Recommendations for ongoing maintenance and management
  • +
+ +

VPS Providers I Work With

+

I can help you set up a VPS with various providers, including privacy-focused options:

+
    +
  • Linode/Akamai
  • +
  • Digital Ocean
  • +
  • Vultr
  • +
  • Hetzner
  • +
  • OVH
  • +
  • Njalla
  • +
  • BuyVM/Frantech
  • +
  • Netcup
  • +
  • And many others based on your specific requirements
  • +
+
+ +
+

Take Control of Your Digital Presence

+

Ready to establish your own independent online presence with a secure, privacy-focused VPS? Contact me today to discuss how a custom-configured VPS can meet your specific needs.

+ Contact Me +
+
+ + diff --git a/src/pages/services/wireguard.astro b/src/pages/services/wireguard.astro new file mode 100644 index 0000000..fe34fba --- /dev/null +++ b/src/pages/services/wireguard.astro @@ -0,0 +1,125 @@ +--- +import Layout from '../../components/Layout.astro'; +--- + + +

WireGuard VPN Service

+ +
+

Secure your internet connection with WireGuard, a modern, high-performance VPN protocol that offers exceptional speed, security, and simplicity compared to traditional VPN solutions.

+
+ +
+

What is WireGuard?

+

WireGuard is a next-generation VPN protocol designed with simplicity and performance in mind. Unlike older VPN technologies that can be complex and resource-intensive, WireGuard uses state-of-the-art cryptography in a lightweight codebase, resulting in faster connections, lower latency, and better battery life on mobile devices—all while maintaining the highest security standards.

+ +

Our WireGuard Services

+

I offer comprehensive WireGuard implementation services tailored to your specific needs:

+ +
+

Personal VPN Server Setup

+

I'll set up a private WireGuard VPN server on your chosen hardware or cloud provider, giving you complete control over your VPN endpoint. This provides a secure connection point you can trust, without relying on third-party VPN providers that might log your activities or compromise your privacy.

+
+ +
+

Multi-Device Configuration

+

I'll configure WireGuard clients on all your devices—computers, phones, tablets—with properly generated encryption keys and optimized settings. Each device will have its own secure profile, allowing for granular access control while maintaining seamless connectivity across your entire digital ecosystem.

+
+ +
+

Split Tunneling and Advanced Routing

+

I'll implement custom routing configurations that allow you to selectively route traffic through your VPN, giving you the flexibility to choose which applications or destinations use the secure tunnel while others connect directly. This optimizes performance and provides greater control over your network traffic.

+
+ +

Benefits of WireGuard

+
    +
  • Superior Performance: Significantly faster connection speeds and lower latency compared to traditional VPN protocols like OpenVPN or IPsec
  • +
  • Enhanced Security: Modern cryptography with regular security audits and a minimal attack surface due to its small codebase
  • +
  • Better Battery Life: Less resource-intensive, resulting in longer battery life on mobile devices
  • +
  • Reliable Connections: Maintains stable connections even when switching networks or temporarily losing connectivity
  • +
  • Simplified Management: Easier to configure and maintain compared to other VPN technologies
  • +
  • Cross-Platform Support: Available on Windows, macOS, Linux, iOS, Android, and can be embedded in routers
  • +
+ +

Features Included

+

Your WireGuard VPN implementation will include:

+
    +
  • Secure server setup with hardened configuration
  • +
  • Custom client configurations for all your devices
  • +
  • Strong encryption with properly generated key pairs
  • +
  • DNS leak protection to prevent exposure of your queries
  • +
  • Kill switch functionality to prevent unprotected connections
  • +
  • Optional IP forwarding for network-wide protection
  • +
  • Traffic routing optimizations based on your usage patterns
  • +
  • QR codes for easy mobile device configuration
  • +
  • Detailed documentation for future reference
  • +
+ +

Use Cases for WireGuard

+

A personal WireGuard VPN is ideal for:

+
    +
  • Securing Public Wi-Fi: Protect your data when connected to untrusted networks like cafes, hotels, or airports
  • +
  • Privacy Enhancement: Prevent your ISP from monitoring your browsing activities
  • +
  • Accessing Home Resources: Securely connect to your home network while traveling
  • +
  • Geo-Restriction Bypass: Access services that may be limited based on your geographical location
  • +
  • Multi-Site Networking: Connect multiple locations into a secure, unified network
  • +
+ +

My Approach

+

When setting up WireGuard for clients, I take a comprehensive approach that includes:

+
    +
  • Assessment of your specific needs and privacy requirements
  • +
  • Selection of the most appropriate hosting option (self-hosted, VPS, etc.)
  • +
  • Implementation of security best practices from the start
  • +
  • Configuration of all client devices with optimized settings
  • +
  • Thorough testing across different network conditions
  • +
  • Documentation and training so you understand how to use your VPN
  • +
  • Guidance on operational security practices when using a VPN
  • +
+
+ +
+

Experience Next-Generation VPN Technology

+

Ready to improve your online privacy and security with a high-performance, modern VPN solution? Contact me today to discuss implementing WireGuard for your personal or business needs.

+ Contact Me +
+
+ + diff --git a/src/styles/styles.css b/src/styles/styles.css index 60f83cc..e019f8d 100644 --- a/src/styles/styles.css +++ b/src/styles/styles.css @@ -287,6 +287,89 @@ main { margin-top: 0; } +/* Contact page styles */ +.contact-info-section { + margin-bottom: 2rem; + padding: 1.5rem; + background-color: var(--gruvbox-bg-soft); + border-radius: 5px; + border-left: 4px solid var(--gruvbox-blue); +} + +.contact-form-container { + margin-top: 2rem; +} + +.contact-form { + max-width: 700px; +} + +.form-group { + margin-bottom: 1.5rem; +} + +.form-group label { + display: block; + margin-bottom: 0.5rem; + font-weight: bold; + color: var(--gruvbox-fg-alt); +} + +.form-group input, +.form-group textarea { + width: 100%; + padding: 0.75rem; + border: 1px solid var(--gruvbox-bg-alt); + border-radius: 4px; + font-family: inherit; + font-size: 1rem; + background-color: var(--gruvbox-bg-soft); + color: var(--gruvbox-fg); +} + +.form-group textarea { + resize: vertical; +} + +.submit-button { + padding: 0.75rem 1.5rem; + background-color: var(--gruvbox-blue); + color: var(--gruvbox-fg); + border: none; + border-radius: 4px; + cursor: pointer; + font-size: 1rem; + transition: background-color 0.3s; +} + +.submit-button:hover { + background-color: var(--gruvbox-aqua); +} + +.form-status { + margin-top: 1rem; + padding: 1rem; + border-radius: 4px; +} + +.form-status.sending { + background-color: var(--gruvbox-bg-soft); + color: var(--gruvbox-blue); + border-left: 4px solid var(--gruvbox-blue); +} + +.form-status.success { + background-color: var(--gruvbox-bg-soft); + color: var(--gruvbox-green); + border-left: 4px solid var(--gruvbox-green); +} + +.form-status.error { + background-color: var(--gruvbox-bg-soft); + color: var(--gruvbox-red); + border-left: 4px solid var(--gruvbox-red); +} + /* Responsive design */ @media (max-width: 768px) { .container {