top of page
Centralized IT Knowledge Base & Documentation System Implementation
Improving Efficiency, Knowledge Sharing & Self-Service Support Across the Organization 1. Project Overview To reduce repeated queries, improve onboarding efficiency, and establish a more structured IT service environment, I led the implementation of a centralized IT Knowledge Base and documentation system. The goal was to capture critical IT processes, troubleshooting steps, and operational workflows into a standardized and easily accessible platform for both IT teams and emp
KevinsinghJ
Office Infrastructure Consolidation & Network Integration Project
Transitioning Two Offices into One Centralized, Secure and Scalable IT Environment 1. Project Overview As part of an office relocation and operational streamlining initiative, I coordinated the consolidation of IT systems, network infrastructure and digital assets from two office locations into a single unified headquarters. The objective was to ensure a smooth transition with minimal downtime, while standardizing the network architecture, consolidating hardware, decommission
KevinsinghJ
Network Infrastructure & Wi-Fi Optimization Project
Enhancing Connectivity, Security and User Experience through Structured Network Improvemen t 1. Project Overview To address connectivity issues and support a growing workforce, I initiated and coordinated a project to optimize the office network and Wi-Fi infrastructure. This involved assessing existing performance gaps, collaborating with the network engineering team, and executing a structured improvement plan covering coverage, segmentation, security, and reliability. My r
KevinsinghJ
Standardization and Automation of IT Onboarding & Offboarding
1. Project Overview To improve operational efficiency, security, and employee experience, I led an initiative to standardize and partially automate the IT onboarding and offboarding process. The goal was to eliminate manual tasks, reduce delays, ensure consistent access provisioning, and enforce proper offboarding and asset recovery procedures. This project involved building a structured workflow that connected HR, IT, and department managers—ensuring that every new joiner or
KevinsinghJ
Unified Endpoint Management & Secure Remote Access Implementation
1. Project Overview To enhance security, control, and operational efficiency, I led an initiative to deploy an integrated system combining endpoint monitoring, antivirus protection, and secure remote access. This unified approach ensured centralized visibility of company devices, automated patching, enforced compliance, and allowed users to securely access internal systems from any location. 2. Background & Challenges Before implementation, several challenges were impacting o
KevinsinghJ
Top Linux Commands in 2025
In the ever-evolving world of Linux, mastering the command line remains one of the most powerful ways to boost productivity, streamline system management, and take full control of your operating environment. Whether you're a seasoned system administrator, a homelab enthusiast, or a curious learner diving into Linux for the first time, knowing the right commands can dramatically improve your workflow. This guide covers some essential Linux commands every user should be familia
KevinsinghJ
My Tailscale Setup
Tailscale - Personal Setup In a modern hybrid work environment, ensuring the right level of access between your devices is crucial for security and productivity. I have come up with this article to explain how access is structured in my Tailscale-managed network, featuring my home laptop, my office laptop, and critical infrastructure like Proxmox, NGINX, and Pi-hole servers. It also includes a network diagram to help visualize the access permissions that i have set Network Ov
KevinsinghJ
PiHole
In this article, we’ll be outlining on how we can perform the setup of PiHole in Ubuntu and a walkthrough on how it works. PiHole is basically a network-wide ad blocker that works as a DNS sinkhole. It intercepts DNS requests and blocks ads, trackers, and malicious domains for all devices on your network. It is usually installed on Raspberry Pi but you can also install it on any other linux based machines. In our case here, it’d be in virtualized Ubuntu in VirtualBox. So let
KevinsinghJ
Hosting a Simple Hello World Website on Nginx VM through ProxMox
This article would be about setting up a Nginx server inside a VM on Proxmox. What we’ll need to achieve this would be an up and running Proxmox VE, an ISO file (e.g., Ubuntu Server or Debian), in my case would be Ubuntu. I have my Proxmox up and running, to achieve this, you can run it on any old machine too and not necessarily super fancy hardware. As long as there's a 64-bit processor, 8GB of RAM, an SSD for speed and at least 1 network card on the device. So let’s start c
KevinsinghJ
Nessus
In this article, I'll be discussing Nessus. It's a widely used vulnerability scanning tool that helps organizations identify and assess potential security risks in their IT infrastructure. It scans systems, networks, and applications for vulnerabilities, such as missing patches, misconfigurations, or weaknesses that hackers could exploit. Nessus also generates detailed reports that provide insights into potential security issues and their severity, helping IT teams prioritize
KevinsinghJ
Manipulation of Data through Burp Suite’s Proxy
Burp Suite is a popular integrated platform used for web application security testing. It is widely employed by security professionals, penetration testers and ethical hackers to identify vulnerabilities in web applications. Developed by PortSwigger, Burp Suite offers a range of tools that facilitate various aspects of security testing, from mapping an application to exploiting its vulnerabilities. At its heart, Burp Suite is designed to test how a web application interacts w
KevinsinghJ
Access Location, Camera & Mic of any Device via StormBreaker
In this article, i’d be explaining how we can be able to achieve as stated in the title above using a tool called Storm Breaker. To begin, go over to their GitHub’s repo (link below) https://github.com/ultrasecurity/Storm-Breaker As you can see, I'm already accessing their github repo and I'll copy the link. Next i’ll go to my terminal, navigate to the opt directory, that’s where I like to install optional programs (hence the opt) And then i’ll download the tool by simply typ
KevinsinghJ
Shodan
What is Shodan? Shodan (short for "Sentient Hyper-Optimized Data Access Network"), is a search engine that allows users to discover internet-connected devices and systems. Unlike traditional search engines like Google, which index websites, Shodan indexes devices, including servers, routers, webcams, industrial control systems, and IoT (Internet of Things) devices. It collects data by scanning the internet and cataloging publicly available devices and services that are direct
KevinsinghJ
Top Commands of Nmap
Top Commands of Nmap Nmap is short for network mapper. It has been the go to tool for network mapping, port scanning and vulnerability checking. Despite being introduced a few decades ago, it is still a hugely popular and sought after tool. In this article we’ll look at some of the useful commands in it. Scanning a range of IP addresses. In this command a range of IP addresses will be scanned in one go, which in this case would be 10.0.2.15 to 10.0.2.30 Scanni
KevinsinghJ
Wireshark
Wireshark is an open source network analyzer which will capture and display real time network traffic. It provides an in-depth view of all the ongoing network activities. It’s very useful in terms of troubleshooting network issues and in ensuring network security. Main uses of Wireshark would be for network troubleshooting and security, protocol and performance analysis. Below are some clicks from my little walkaround on the tool:- Firstly upon launching the app, you’ll be s
KevinsinghJ
bottom of page