diff --git a/src/components/Header.astro b/src/components/Header.astro index a864fb8..6073751 100644 --- a/src/components/Header.astro +++ b/src/components/Header.astro @@ -4,17 +4,43 @@
- - diff --git a/src/pages/about.astro b/src/pages/about.astro index e36ca47..420fab4 100644 --- a/src/pages/about.astro +++ b/src/pages/about.astro @@ -4,7 +4,7 @@ import Layout from '../components/Layout.astro';

About Us

-

Welcome to my personal tech services website! I'm Stephan Juchatz, a passionate technology specialist with expertise in networking, system administration, and open-source privacy solutions.

+

Welcome to our tech services website! We're a team of passionate technology specialists with expertise in networking, system administration, and open-source privacy solutions.

Our Vision

@@ -45,13 +45,13 @@ import Layout from '../components/Layout.astro';
-

My Background

-

With over 15 years of experience in the IT industry, I've developed a deep understanding of various technologies and methodologies. My journey began with a curiosity about how computers work and has evolved into a comprehensive skill set that allows me to tackle complex technical challenges while maintaining a strong focus on privacy and security.

+

Our Background

+

With over 15 years of experience in the IT industry, our team has developed a deep understanding of various technologies and methodologies. Our journey began with a curiosity about how computers work and has evolved into a comprehensive skill set that allows us to tackle complex technical challenges while maintaining a strong focus on privacy and security.

-

My Philosophy

-

I believe that privacy isn't just about hiding—it's about empowerment, autonomy, and human dignity. In today's data-driven world, the ability to control who has access to your information is not a luxury but a necessity.

+

Our Philosophy

+

We believe that privacy isn't just about hiding—it's about empowerment, autonomy, and human dignity. In today's data-driven world, the ability to control who has access to your information is not a luxury but a necessity.

-

I firmly believe that:

+

We firmly believe that:

-

My Approach

-

I believe in the power of open-source solutions and privacy-focused technologies. My approach combines technical expertise with a commitment to empowering users through knowledge sharing and transparent practices.

+

Our Approach

+

We believe in the power of open-source solutions and privacy-focused technologies. Our approach combines technical expertise with a commitment to empowering users through knowledge sharing and transparent practices.

-

When working on projects, I prioritize:

+

When working on projects, we prioritize:

-

Why Choose My Services

-

Unlike large service providers that offer one-size-fits-all solutions, I provide personalized services tailored to your specific needs and threat model. I take the time to understand your requirements, preferences, and constraints before recommending and implementing solutions.

+

Why Choose Our Services

+

Unlike large service providers that offer one-size-fits-all solutions, we provide personalized services tailored to your specific needs and threat model. We take the time to understand your requirements, preferences, and constraints before recommending and implementing solutions.

-

My clients appreciate my:

+

Our clients appreciate our:

Get in Touch

-

I'm always happy to discuss potential projects, answer questions, or provide advice on enhancing your digital privacy and security. Feel free to reach out using the contact information below:

+

We're always happy to discuss potential projects, answer questions, or provide advice on enhancing your digital privacy and security. Feel free to reach out using the contact information below:

Email: shop@juchatz.com
Phone: (123) 456-7890

- Contact Me + Contact Us + diff --git a/src/pages/services/adblocker.astro b/src/pages/services/adblocker.astro index b6df54b..6799bc9 100644 --- a/src/pages/services/adblocker.astro +++ b/src/pages/services/adblocker.astro @@ -14,16 +14,16 @@ import Layout from '../../components/Layout.astro';

Unlike traditional browser-based ad blockers that only work in specific browsers and require installation on each device, network-level ad blocking filters unwanted content at your router or network gateway. This approach provides ad blocking protection to all devices on your network simultaneously—computers, phones, smart TVs, and even devices that cannot normally run ad blockers.

Our Ad Blocking Solutions

-

I offer several implementation options based on your specific needs:

+

We offer several implementation options based on your specific needs:

Pi-hole Implementation

-

Pi-hole is a powerful network-wide ad blocker that can run on a Raspberry Pi or other small computer. I'll set up a dedicated Pi-hole server on your network, configure it with comprehensive filter lists, and integrate it with your existing router to provide immediate ad blocking across all devices.

+

Pi-hole is a powerful network-wide ad blocker that can run on a Raspberry Pi or other small computer. We'll set up a dedicated Pi-hole server on your network, configure it with comprehensive filter lists, and integrate it with your existing router to provide immediate ad blocking across all devices.

AdGuard Home Setup

-

AdGuard Home offers similar functionality to Pi-hole with some additional features. I'll install and configure this solution on appropriate hardware, set up custom filtering rules, and ensure it works seamlessly with your network infrastructure.

+

AdGuard Home offers similar functionality to Pi-hole with some additional features. We'll install and configure this solution on appropriate hardware, set up custom filtering rules, and ensure it works seamlessly with your network infrastructure.

@@ -54,8 +54,8 @@ import Layout from '../../components/Layout.astro';
  • Optional: DNS over HTTPS/TLS for additional privacy from your ISP
  • -

    My Approach

    -

    When setting up ad blocking for clients, I take a comprehensive approach that includes:

    +

    Our Approach

    +

    When setting up ad blocking for clients, we take a comprehensive approach that includes:

    -

    My Approach

    -

    When setting up Bitwarden for clients, I take a comprehensive approach that includes:

    +

    Our Approach

    +

    When setting up Bitwarden for clients, we take a comprehensive approach that includes:

    -

    My Approach

    -

    When setting up Linux for clients, I take a comprehensive approach that includes:

    +

    Our Approach

    +

    When setting up Linux for clients, we take a comprehensive approach that includes:

    Linux Distributions I Work With

    -

    I have experience with a wide range of Linux distributions, including but not limited to:

    +

    We have experience with a wide range of Linux distributions, including but not limited to:

    NAS Solutions I Work With

    -

    I have experience with various NAS platforms, including:

    +

    We have experience with various NAS platforms, including:

    -

    My Approach

    -

    When setting up a NAS for clients, I take a comprehensive approach that includes:

    +

    Our Approach

    +

    When setting up a NAS for clients, we take a comprehensive approach that includes:

    Storage Considerations

    -

    Proper storage configuration is critical for a reliable NAS. I'll help you navigate considerations such as:

    +

    Proper storage configuration is critical for a reliable NAS. We'll help you navigate considerations such as:

    -

    My Approach

    -

    When implementing OpenWRT for clients, I take a comprehensive approach that includes:

    +

    Our Approach

    +

    When implementing OpenWRT for clients, we take a comprehensive approach that includes:

    -

    I can help you determine if your existing router is compatible or recommend appropriate hardware for your needs and budget.

    +

    We can help you determine if your existing router is compatible or recommend appropriate hardware for your needs and budget.

    Unlock Your Router's Full Potential

    Ready to transform your network with professional-grade features and enhanced security? Contact me today to discuss implementing OpenWRT for your home or business network.

    - Contact Me + Contact Us
    diff --git a/src/pages/services/opnsense.astro b/src/pages/services/opnsense.astro index 5979996..ec3b7bb 100644 --- a/src/pages/services/opnsense.astro +++ b/src/pages/services/opnsense.astro @@ -14,21 +14,21 @@ import Layout from '../../components/Layout.astro';

    OPNsense is a premium open-source firewall and routing platform that combines robust security features with an intuitive interface. It incorporates advanced capabilities like intrusion detection, VPN services, traffic shaping, and application filtering, all managed through a straightforward web interface. As a security-focused platform, it provides enterprise-grade protection for both home and business networks.

    Our OPNsense Services

    -

    I offer several implementation options based on your specific needs:

    +

    We offer several implementation options based on your specific needs:

    Hardware Selection and Setup

    -

    I'll help you select the appropriate hardware platform for your OPNsense deployment, considering factors like network size, desired throughput, and future scalability. Then I'll install and configure the OPNsense software with optimized settings for your specific environment, ensuring proper hardware utilization and reliable operation.

    +

    We'll help you select the appropriate hardware platform for your OPNsense deployment, considering factors like network size, desired throughput, and future scalability. Then We'll install and configure the OPNsense software with optimized settings for your specific environment, ensuring proper hardware utilization and reliable operation.

    Network Security Configuration

    -

    I'll implement a comprehensive security configuration including firewall rules, intrusion detection/prevention settings, web filtering, spam protection, and application control. Your network will be protected from external threats while maintaining appropriate access for legitimate users and applications, with rules tailored to your specific security requirements.

    +

    We'll implement a comprehensive security configuration including firewall rules, intrusion detection/prevention settings, web filtering, spam protection, and application control. Your network will be protected from external threats while maintaining appropriate access for legitimate users and applications, with rules tailored to your specific security requirements.

    VPN and Remote Access Setup

    -

    I'll configure secure VPN services (OpenVPN, WireGuard, or IPsec) for remote access to your network, establish site-to-site connections between multiple locations, and implement appropriate access controls and authentication mechanisms. This enables secure remote work while maintaining protection of your internal resources.

    +

    We'll configure secure VPN services (OpenVPN, WireGuard, or IPsec) for remote access to your network, establish site-to-site connections between multiple locations, and implement appropriate access controls and authentication mechanisms. This enables secure remote work while maintaining protection of your internal resources.

    Benefits of OPNsense

    @@ -55,8 +55,8 @@ import Layout from '../../components/Layout.astro';
  • High availability configuration (for business deployments)
  • -

    My Approach

    -

    When setting up OPNsense for clients, I take a comprehensive approach that includes:

    +

    Our Approach

    +

    When setting up OPNsense for clients, we take a comprehensive approach that includes:

    -

    My Approach

    -

    When implementing Proxmox VE for clients, I take a comprehensive approach that includes:

    +

    Our Approach

    +

    When implementing Proxmox VE for clients, we take a comprehensive approach that includes:

    -

    I can help evaluate your existing hardware or recommend an appropriate configuration based on your specific needs and budget.

    +

    We can help evaluate your existing hardware or recommend an appropriate configuration based on your specific needs and budget.

    Unlock the Power of Virtualization

    Ready to transform your computing infrastructure with a flexible, powerful virtualization platform? Contact me today to discuss implementing Proxmox VE for your specific needs.

    - Contact Me + Contact Us
    diff --git a/src/pages/services/remove-telemetry.astro b/src/pages/services/remove-telemetry.astro index 5352b05..07a2401 100644 --- a/src/pages/services/remove-telemetry.astro +++ b/src/pages/services/remove-telemetry.astro @@ -14,21 +14,21 @@ import Layout from '../../components/Layout.astro';

    Windows telemetry refers to the data collection systems Microsoft has built into Windows operating systems that gather information about your usage patterns, hardware configuration, application usage, and various system metrics. This data is regularly sent to Microsoft's servers, often without clear visibility into exactly what is being collected or how it's being used.

    Our Windows Privacy Service

    -

    I offer a comprehensive approach to reducing or eliminating unwanted data collection in Windows while ensuring your system continues to function properly:

    +

    We offer a comprehensive approach to reducing or eliminating unwanted data collection in Windows while ensuring your system continues to function properly:

    Telemetry Audit and Assessment

    -

    I'll thoroughly analyze your current Windows installation to identify active telemetry components, background services, scheduled tasks, and other mechanisms that may be collecting and transmitting your data. This provides a clear picture of your current privacy exposure.

    +

    We'll thoroughly analyze your current Windows installation to identify active telemetry components, background services, scheduled tasks, and other mechanisms that may be collecting and transmitting your data. This provides a clear picture of your current privacy exposure.

    Customized Telemetry Removal

    -

    Based on your comfort level and specific needs, I'll implement a tailored combination of settings changes, service disabling, and policy modifications to reduce or eliminate telemetry. This can range from minimizing data collection to completely blocking all outbound communication with Microsoft's telemetry servers.

    +

    Based on your comfort level and specific needs, We'll implement a tailored combination of settings changes, service disabling, and policy modifications to reduce or eliminate telemetry. This can range from minimizing data collection to completely blocking all outbound communication with Microsoft's telemetry servers.

    Privacy-Focused System Configuration

    -

    Beyond telemetry, I'll configure your Windows system with privacy-enhancing settings across all aspects of the operating system, including the Start menu, Cortana, Microsoft account integration, app permissions, and Windows Update behavior, creating a more private computing environment.

    +

    Beyond telemetry, We'll configure your Windows system with privacy-enhancing settings across all aspects of the operating system, including the Start menu, Cortana, Microsoft account integration, app permissions, and Windows Update behavior, creating a more private computing environment.

    Benefits of Removing Windows Telemetry

    @@ -54,8 +54,8 @@ import Layout from '../../components/Layout.astro';
  • Documentation of all changes made for future reference
  • -

    My Approach

    -

    When removing Windows telemetry for clients, I take a balanced approach that prioritizes:

    +

    Our Approach

    +

    When removing Windows telemetry for clients, we take a balanced approach that prioritizes:

    -

    My Approach

    -

    When setting up TOR for clients, I take a comprehensive approach that includes:

    +

    Our Approach

    +

    When setting up TOR for clients, we take a comprehensive approach that includes:

    VPN Protocols I Work With

    -

    I have experience implementing various VPN technologies to match different needs:

    +

    We have experience implementing various VPN technologies to match different needs:

    -

    My Approach

    -

    When implementing VPN solutions for clients, I take a comprehensive approach that includes:

    +

    Our Approach

    +

    When implementing VPN solutions for clients, we take a comprehensive approach that includes:

    -

    I'll ensure you understand these considerations and how they apply to your specific use case, helping you make informed decisions about your privacy setup.

    +

    We'll ensure you understand these considerations and how they apply to your specific use case, helping you make informed decisions about your privacy setup.

    Take Control of Your Online Privacy

    -

    Ready to enhance your internet privacy and security with a properly implemented VPN solution? Contact me today to discuss your specific requirements and how I can help protect your digital life.

    - Contact Me +

    Ready to enhance your internet privacy and security with a properly implemented VPN solution? Contact me today to discuss your specific requirements and how We can help protect your digital life.

    + Contact Us
    diff --git a/src/pages/services/vps.astro b/src/pages/services/vps.astro index c7dd71c..e614f28 100644 --- a/src/pages/services/vps.astro +++ b/src/pages/services/vps.astro @@ -14,21 +14,21 @@ import Layout from '../../components/Layout.astro';

    A Virtual Private Server (VPS) is a virtualized server that functions as a dedicated server within a shared hosting environment. Unlike shared hosting, a VPS gives you complete control over your server environment, including your own operating system, storage, RAM, and processing power. This allows you to run virtually any software or service you need while maintaining privacy and independence from big tech platforms.

    Our VPS Services

    -

    I offer comprehensive VPS setup and configuration services tailored to your specific needs:

    +

    We offer comprehensive VPS setup and configuration services tailored to your specific needs:

    Provider Selection and Initial Setup

    -

    I'll help you select the most appropriate VPS provider based on your privacy requirements, budget, and geographical preferences. I'll then handle the initial server provisioning, operating system installation, and basic security hardening to create a solid foundation for your digital services. Your server will be configured with secure SSH access, proper user management, and essential security measures from the start.

    +

    We'll help you select the most appropriate VPS provider based on your privacy requirements, budget, and geographical preferences. I'll then handle the initial server provisioning, operating system installation, and basic security hardening to create a solid foundation for your digital services. Your server will be configured with secure SSH access, proper user management, and essential security measures from the start.

    Privacy-Focused Service Implementation

    -

    I'll install and configure the specific services you need on your VPS, such as self-hosted email, cloud storage, VPN endpoints, personal websites, messaging platforms, or other privacy-respecting alternatives to mainstream services. Each service will be optimized for security, performance, and ease of maintenance, with appropriate data segregation and backup strategies.

    +

    We'll install and configure the specific services you need on your VPS, such as self-hosted email, cloud storage, VPN endpoints, personal websites, messaging platforms, or other privacy-respecting alternatives to mainstream services. Each service will be optimized for security, performance, and ease of maintenance, with appropriate data segregation and backup strategies.

    Ongoing Maintenance Planning

    -

    I'll establish automated security updates, monitoring systems, and backup procedures to keep your VPS running smoothly and securely with minimal intervention. You'll receive documentation and training on basic server management tasks, as well as recommendations for routine maintenance to ensure long-term stability and security of your services.

    +

    We'll establish automated security updates, monitoring systems, and backup procedures to keep your VPS running smoothly and securely with minimal intervention. You'll receive documentation and training on basic server management tasks, as well as recommendations for routine maintenance to ensure long-term stability and security of your services.

    Benefits of Running Your Own VPS

    @@ -70,8 +70,8 @@ import Layout from '../../components/Layout.astro';
  • Security-focused web server configuration
  • -

    My Approach

    -

    When setting up a VPS for clients, I take a comprehensive approach that includes:

    +

    Our Approach

    +

    When setting up a VPS for clients, we take a comprehensive approach that includes:

    VPS Providers I Work With

    -

    I can help you set up a VPS with various providers, including privacy-focused options:

    +

    We can help you set up a VPS with various providers, including privacy-focused options:

    -

    My Approach

    -

    When setting up WireGuard for clients, I take a comprehensive approach that includes:

    +

    Our Approach

    +

    When setting up WireGuard for clients, we take a comprehensive approach that includes: