<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Craig Wilson&#39;s Blog</title>
    <link>/</link>
    <description>Recent content on Craig Wilson&#39;s Blog</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <managingEditor>me@craigwilson.blog (Craig Wilson)</managingEditor>
    <webMaster>me@craigwilson.blog (Craig Wilson)</webMaster>
    <lastBuildDate>Sat, 14 Mar 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>BlurShield - A Chrome Extension for Masking Sensitive Data</title>
      <link>/post/2026/2026-03-15-blurshield/</link>
      <pubDate>Sat, 14 Mar 2026 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2026/2026-03-15-blurshield/</guid>
      <description>BlurShield - A Chrome Extension for Masking Sensitive Data Screen sharing, live demos, and recording tutorials are routine activities for developers and IT professionals. However, they come with an inherent risk: accidentally exposing sensitive information like API keys, connection strings, and personal data to an audience. BlurShield is a Chrome extension built to solve this problem by automatically detecting and blurring sensitive content on any web page.&#xA;Purpose The primary purpose of BlurShield is to protect credentials, secrets, and personal information from accidental exposure during screen shares, demos, and recordings.</description>
    </item>
    <item>
      <title>Beelink GTR9 Pro AMD Ryzen™ AI Max&#43; 395: From First Impressions to NIC BSODs and the Road to Stability</title>
      <link>/post/2025/2025-09-25-beelink395bsod/</link>
      <pubDate>Thu, 25 Sep 2025 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2025/2025-09-25-beelink395bsod/</guid>
      <description>Beelink GTR9 Pro AMD Ryzen™ AI Max+ 395 Review and Troubleshooting Journey When I ordered the Beelink GTR9 Pro AMD Ryzen™ AI Max+ 395, the plan was clear: to use it as a compact AI workstation for running local models and as a testbed for offline inference workloads. On paper, it looked excellent — AMD’s Ryzen AI MAX 395 CPU, LPDDR5 memory with support for up to 128 GB, PCIe 4.</description>
    </item>
    <item>
      <title>Minecraft Fabric Server Deployments with Bash</title>
      <link>/post/2025/2025-06-22-minecraftserverfabric/</link>
      <pubDate>Sun, 22 Jun 2025 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2025/2025-06-22-minecraftserverfabric/</guid>
      <description>Automating Minecraft Fabric Server Deployments with Bash In the world of Minecraft, setting up a dedicated server provides a persistent world for players to collaborate and build. While rewarding, the manual installation and configuration process is repetitive and prone to error. This article introduces a Bash script designed to automate the deployment of a Minecraft server using the Fabric mod loader on Ubuntu server.&#xA;Purpose The primary purpose of this script is to provide a reliable, repeatable, and automated method for deploying a Minecraft Fabric server.</description>
    </item>
    <item>
      <title>Minecraft Server Deployment: An Automation Primer</title>
      <link>/post/2025/2025-06-21-minecraftserver/</link>
      <pubDate>Sat, 21 Jun 2025 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2025/2025-06-21-minecraftserver/</guid>
      <description>Minecraft Server Deployment: An Automation Primer In the landscape of multiplayer gaming, dedicated servers offer unparalleled control and customisation for players. However, the manual setup process is often repetitive, time-consuming, and prone to error. This post introduces a bash script designed to automate the deployment of a Minecraft: Java Edition server on Ubuntu systems, providing a secure, consistent, and efficient foundation for your gaming world.&#xA;Purpose The primary purpose of this automation script is to streamline the installation and configuration of a dedicated Minecraft server.</description>
    </item>
    <item>
      <title>Automating Your Ubuntu Server Setup: A Standardised Approach to Configuration</title>
      <link>/post/2025/2025-06-20-buildminipc/</link>
      <pubDate>Fri, 20 Jun 2025 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2025/2025-06-20-buildminipc/</guid>
      <description>Automating Your Ubuntu Server Setup: A Standardised Approach to Configuration In the world of system administration, consistency and efficiency are paramount. Manually configuring a new server is not only time-consuming but also prone to human error, leading to inconsistent setups and potential security oversights. This article introduces a bash script designed to automate the initial configuration of a minimal Ubuntu 24.04 LTS server, ensuring a standardised baseline.&#xA;The catalyst for creating this script was the setup of a new home lab environment hosted on an Intel N100 Mini PC.</description>
    </item>
    <item>
      <title>Webcam Configurations: Windows Python Script for Setting Management</title>
      <link>/post/2025/2025-05-11-pythonwebcam/</link>
      <pubDate>Sun, 11 May 2025 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2025/2025-05-11-pythonwebcam/</guid>
      <description>Webcam Configurations: Windows Python Script for Setting Management Over the last month i have been using a new WebCam and found an issue with Microsoft Teams. In teams the webcam seem to reset one of its values every time it started. To address this, I had to use the control panel every time. After one morning, I did some vibe python coding while in a meeting and this is the result.</description>
    </item>
    <item>
      <title>True Blue Landing Zone Framework (Fair Dinkum Edition)</title>
      <link>/post/2025/2025-04-01-strayacloud/</link>
      <pubDate>Tue, 01 Apr 2025 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2025/2025-04-01-strayacloud/</guid>
      <description>🌍 Straya Cloud™ – True Blue Landing Zone Framework (Fair Dinkum Edition) “An enterprise-grade, animal-powered, bogan-blessed cloud infrastructure framework for serious deployments (not really).”&#xA;✨ Executive Summary Straya Cloud™ is the next evolution in Outback-born Infrastructure-as-a-Shrimp-on-the-Barbie. Built on the sweat of tradies, managed by cockatoos, and secured by crocs, this offering is designed for enterprises who take their downtime as seriously as their uptime. Powered by the Cloud Aussie Framework (CAF), Straya Cloud is fully compliant with the Australian Standards for Yarn-Safe Cloud Operations (ASYSCO) and the Inter-Governmental Kangaroo Trust Network (IKTN).</description>
    </item>
    <item>
      <title>Streamlining Your Debian/Ubuntu Updates: Introducing Linux Mint Update script</title>
      <link>/post/2025/2025-03-21-systemupdaterformint/</link>
      <pubDate>Fri, 21 Mar 2025 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2025/2025-03-21-systemupdaterformint/</guid>
      <description>Streamlining Your Debian/Ubuntu Updates: Introducing Linux Mint Update script Maintaining an up-to-date Linux system is paramount for security and performance. However, the process of updating system packages, individual applications like Discord, Flatpak installations, and desktop environment components can be fragmented and time-consuming. This article introduces a Bash script designed to automate this task on Debian/Ubuntu-based systems. I personally created this script to help keep my Linux Mint Desktop updated.</description>
    </item>
    <item>
      <title>Converting Markdown to DOCX with Python: Automating Documentation from Markdown Linked Files</title>
      <link>/post/2025/2025-02-20-creatingwordfrommd/</link>
      <pubDate>Thu, 20 Feb 2025 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2025/2025-02-20-creatingwordfrommd/</guid>
      <description>Converting Markdown to DOCX with Python: Automating Documentation from Markdown Linked Files Overview When working in structured cloud or cybersecurity documentation projects (such as defining an Azure Landing Zone), it&amp;rsquo;s common to maintain Markdown files for version control and team editing. However, stakeholders often expect polished Word documents.&#xA;This blog introduces a Python tool help to bridges this gap. It reads a README.md file, extracts links to additional Markdown documents, and compiles them into a basic professionally styled DOCX file, preserving headers, tables, lists, and block quotes.</description>
    </item>
    <item>
      <title>Automating GitHub to Azure DevOps Backups with Bash and Pipelines</title>
      <link>/post/2025/2025-01-15-gitbackup/</link>
      <pubDate>Wed, 15 Jan 2025 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2025/2025-01-15-gitbackup/</guid>
      <description>Automating GitHub to Azure DevOps Backups with Bash and Pipelines Keeping critical source code safe is a constant priority. While GitHub is typically reliable, it can be important for organizations to maintain an additional backup of their repositories in a separate platform—like Azure DevOps—in case of issues such as accidental repository deletions, access problems, or unexpected downtime.&#xA;In this post, I will walk you through how to automate backing up GitHub repositories into Azure DevOps using:</description>
    </item>
    <item>
      <title>Virtual Sink Creation and Loopback on Linux</title>
      <link>/post/2024/2024-12-05-virtualaudiosplit/</link>
      <pubDate>Thu, 05 Dec 2024 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2024/2024-12-05-virtualaudiosplit/</guid>
      <description>How to Create, Manage, and Remove Virtual Sinks in Linux (PulseAudio/PipeWire) When working on live streams, podcasts, or complex audio setups, having the ability to separate and control audio streams is essential. In Windows I have used Elgato WaveLink3 software to perform this tasks. One way to do this on Linux is by creating virtual sinks (null sinks) and assigning different applications to them. This post will show you how to automatically create virtual sinks, remap specific applications, and remove those sinks when you’re done—using simple Bash scripts.</description>
    </item>
    <item>
      <title>Simplifying SSH Key Management setup with PowerShell</title>
      <link>/post/2024/2024-11-02-sshkeymgmt/</link>
      <pubDate>Sat, 02 Nov 2024 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2024/2024-11-02-sshkeymgmt/</guid>
      <description>Simplifying SSH Key Management setup with PowerShell Introduction Managing SSH keys effectively is crucial for maintaining secure and efficient access to remote systems. This blog post introduces a PowerShell script designed to configure an SSH-Agent on Windows 11 with keys. I use this method when I first build a new Windows 11. Using SSH-Agent allows me to use forwarding agent requests and allows for using Yubikey certificates acorss an RDP session.</description>
    </item>
    <item>
      <title>Building a Versatile Shell Script Template with Logging and Command Handling</title>
      <link>/post/2024/2024-10-02-bashtemplate/</link>
      <pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2024/2024-10-02-bashtemplate/</guid>
      <description>Building a Versatile Shell Script Template with Logging and Command Handling Creating reusable shell scripts can save a lot of time, especially when they’re structured to handle different commands, support logging, and track version history. Here i have provided a reference for a template structure for bash scripting. Hopefully I will continue to use this myself.&#xA;Step 1: Setting Up the Script Structure We start by creating a basic structure for the script, including:</description>
    </item>
    <item>
      <title>Managing Multiple Monitors on Linux Mint with xrandr</title>
      <link>/post/2024/2024-10-02-externaldisplays/</link>
      <pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2024/2024-10-02-externaldisplays/</guid>
      <description>Managing Multiple Monitors on Linux Mint with xrandr When using a Linux laptop with an external docking station, managing multiple monitors effectively can be challenging. If you often connect and disconnect external monitors, you may want a quick way to toggle between using only your laptop display and activating external monitors.&#xA;In this post, I will show a custom script using xrandr to streamline the process. The script has been tested in Linux Mint 22, which is running X11.</description>
    </item>
    <item>
      <title>Hosting a Tor-Accessible Hugo Website with Docker</title>
      <link>/post/2024/2024-09-21-torwebsite/</link>
      <pubDate>Sat, 21 Sep 2024 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2024/2024-09-21-torwebsite/</guid>
      <description>Hosting a Tor-Accessible Hugo Website with Docker In this guide, I will go over setting up a hidden service using Docker on an Ubuntu Linux host. This setup will use a simple Python HTTP server behind the Tor network to serve a Hugo static website. Docker will ensure both Tor and the web server remain operational and accessible through a .onion address.&#xA;Why use Python to host the web server and not NGINX, just wanted something easy to test.</description>
    </item>
    <item>
      <title>How to Enable APA 7th Edition in Microsoft Word</title>
      <link>/post/2024/2024-08-14-enablingapa7inword/</link>
      <pubDate>Wed, 14 Aug 2024 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2024/2024-08-14-enablingapa7inword/</guid>
      <description>How to Enable APA 7th Edition in Microsoft Word When working on academic papers, the APA (American Psychological Association) style is one of the most commonly used citation formats. However, as of now, Microsoft Word does not natively support the APA 7th edition. Fortunately, a community member named Mike Slagle has provided a solution, enabling the use of APA 7th edition in Microsoft Word. Here’s a simple guide to set it up on your computer.</description>
    </item>
    <item>
      <title>How to Export Your Spotify Playlists to a JSON File Using PowerShell</title>
      <link>/post/2024/2024-07-29-spotifyexports/</link>
      <pubDate>Mon, 29 Jul 2024 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2024/2024-07-29-spotifyexports/</guid>
      <description>How to Export Your Spotify Playlists to a JSON File Using PowerShell I need to move off Spotify for a specific reason and was looking for a way to move my music lists to other platforms. There are a number of website that can perform this task for you, here I will go over how to export your playlists so you can use them to build up your new collections in other platforms.</description>
    </item>
    <item>
      <title>Checking Windows License Status and KMS Configuration with PowerShell</title>
      <link>/post/2024/2024-06-05-licensingkms/</link>
      <pubDate>Wed, 05 Jun 2024 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2024/2024-06-05-licensingkms/</guid>
      <description>Checking Windows License Status and KMS Configuration with PowerShell In this blog post, I will walk you through a PowerShell script that helps you check the current license status of a Windows host, verify if it&amp;rsquo;s using a Key Management Service (KMS), determine if it&amp;rsquo;s part of a domain, and check the DNS KMS settings if applicable.&#xA;What Does the Script Do? This PowerShell script performs several important tasks:&#xA;Retrieves and displays the current license status of the Windows host.</description>
    </item>
    <item>
      <title>Automating Agent and Log Forwarding to New Relic on Ubuntu</title>
      <link>/post/2024/2024-05-30-newrelic/</link>
      <pubDate>Thu, 30 May 2024 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2024/2024-05-30-newrelic/</guid>
      <description>Automating Agent and Log Forwarding to New Relic on Ubuntu In this post, we&amp;rsquo;ll walk through the steps to automate the installation and configuration of the New Relic Infrastructure agent on an Ubuntu system. Additionally, we&amp;rsquo;ll show how to dynamically configure log forwarding for all log files in the /var/log directory and its subdirectories.&#xA;This script has been tested on Ubuntu 22.04 LTS on ARM, but should work for other versions of Ubuntu.</description>
    </item>
    <item>
      <title>Azure CLI: Installing CLI on Mint Linux</title>
      <link>/post/2024/2024-04-01-azure_cli_on_mint/</link>
      <pubDate>Mon, 01 Apr 2024 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2024/2024-04-01-azure_cli_on_mint/</guid>
      <description>Azure CLI on Linux Mint Today, I embarked on an exploration of Linux Mint as a potential new desktop environment. Linux Mint stands out as an operating system recognized for its robustness, user-centric design, and unparalleled stability. Its foundation on Ubuntu, which draws from Debian, positions Linux Mint as an exemplary choice for the Linux community. The system&amp;rsquo;s interface, celebrated for its elegance and simplicity and an extensive software repository, ensures a seamless user experience.</description>
    </item>
    <item>
      <title>SSL Automation: Azure Resources and Let&#39;s Encrypt SSL Certificate</title>
      <link>/post/2024/2024-03-31-automated_ssl_certificates/</link>
      <pubDate>Sun, 31 Mar 2024 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2024/2024-03-31-automated_ssl_certificates/</guid>
      <description>Azure Resources and Let&amp;rsquo;s Encrypt SSL Certificate Automation In the digital age, securing your web applications with SSL/TLS certificates is not just an option—it&amp;rsquo;s a necessity. Microsoft Azure users have a powerful toolset at their disposal to automate this process, using a combination of Azure resources, Bicep, and Let&amp;rsquo;s Encrypt. This guide dives into the specifics of setting up Azure resources with Bicep and automating SSL certificate generation and renewal with Let&amp;rsquo;s Encrypt, highlighting the integration with Azure Key Vault for secure storage of certificates and service principle details.</description>
    </item>
    <item>
      <title>Hydra: The Simple Guide</title>
      <link>/post/2024/2024-01-19-hydra_the_simple_guide/</link>
      <pubDate>Fri, 19 Jan 2024 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2024/2024-01-19-hydra_the_simple_guide/</guid>
      <description>Hydra: The Simple Guide Introduction to Hydra Hydra, often referred to as THC-Hydra, is a powerful and fast network authentication cracker. It is widely recognized for its ability to rapidly guess or crack login credentials across a wide range of protocols and services. Developed by &amp;ldquo;The Hacker&amp;rsquo;s Choice&amp;rdquo; (THC), Hydra has become an indispensable tool in the arsenal of penetration testers, security analysts, and unethical hackers alike.&#xA;Why Use Hydra?</description>
    </item>
    <item>
      <title>Export Certificates in Multiple Formats Using PowerShell</title>
      <link>/post/2024/2024-01-12-export-certs/</link>
      <pubDate>Fri, 12 Jan 2024 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2024/2024-01-12-export-certs/</guid>
      <description>How to Export Certificates in Multiple Formats Using PowerShell Introduction Certificates are a crucial part of any IT infrastructure, dealing with secure communications and data protection. Managing them effectively is vital. Today, I am looking at a versatile PowerShell script that simplifies the process of exporting certificates from the Windows Certificate Store in various formats: PEM, PFX, and CER.&#xA;What Does the Script Do? This PowerShell script allows IT administrators and security professionals to:</description>
    </item>
    <item>
      <title>NMAP: The Simple Guide</title>
      <link>/post/2024/2024-01-10-nmap_the_simple_guide/</link>
      <pubDate>Wed, 10 Jan 2024 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2024/2024-01-10-nmap_the_simple_guide/</guid>
      <description>NMAP: The Simple Guide Introduction to NMAP NMAP, short for Network Mapper, is an indispensable open-source tool for network exploration and security auditing. Since its initial release in 1997 by Gordon Lyon, NMAP has become a staple in the cybersecurity and IT professional&amp;rsquo;s toolkit. It excels in scanning large networks rapidly, but it&amp;rsquo;s equally effective against single hosts. Utilizing raw IP packets in innovative ways, NMAP can discover hosts, services, operating systems, packet filters/firewalls, and numerous other characteristics.</description>
    </item>
    <item>
      <title>Windows 11 on Unsupported Hardware</title>
      <link>/post/2023/2023-12-14-windows-11-iso/</link>
      <pubDate>Thu, 14 Dec 2023 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2023/2023-12-14-windows-11-iso/</guid>
      <description>Installing Windows 11 on Unsupported Hardware: A Guide for Your Test Lab Windows 11 demands specific hardware features for production environments. However, there&amp;rsquo;s a workaround for experimental purposes. This guide is aimed at those looking to use Windows 11 on outdated or unsupported hardware, typically found in home or development labs. It&amp;rsquo;s not recommended for production use.&#xA;During a standard Windows 11 build, once the screen appears to select your langauge, you can press F-10 and open the registry editor(regedit).</description>
    </item>
    <item>
      <title>Privacy</title>
      <link>/privacy/</link>
      <pubDate>Fri, 20 Oct 2023 14:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/privacy/</guid>
      <description>Privacy Policy for craigwilson.blog Effective Date: 20-10-2023&#xA;At craigwilson.blog, we prioritize the privacy of our visitors. This Privacy Policy outlines the types of personal information that are collected by craigwilson.blog and how we use it.&#xA;1. Information We Collect Log Files: craigwilson.blog follows a standard procedure of using log files. These files log visitors when they visit websites. The information collected includes internet protocol (IP) addresses, browser type, Internet Service Provider (ISP), date and time stamp, referring/exit pages, and possibly the number of clicks.</description>
    </item>
    <item>
      <title>Linux Automation with SSH</title>
      <link>/post/2023/2023-10-11-linux-automation/</link>
      <pubDate>Wed, 11 Oct 2023 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2023/2023-10-11-linux-automation/</guid>
      <description>Linux Automation over SSH Linux Automation over SSH, a set of scripts designed for the deployment and configuration of headless Linux workstations and servers. Perfectly suited for creating development servers, this solution has been developed and tested on Raspberry Pi and Ubuntu VMs. It offers a streamlined approach using builtin tools to executing shell scripts remotely, ensuring secure and orderly operations. While it&amp;rsquo;s a boon for development environments, users are cautioned to handle secure passwords with care before deploying it in production settings.</description>
    </item>
    <item>
      <title>Damn Vulnerable Web App DVWA testing with ZAP on Kali </title>
      <link>/post/2023/2023-07-23-dvwa_zap_kali/</link>
      <pubDate>Sun, 23 Jul 2023 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2023/2023-07-23-dvwa_zap_kali/</guid>
      <description>How to Set Up and Test the Damn Vulnerable Web App (DVWA) Using OWASP ZAP and Docker Web application security is of paramount importance today, with cyber threats becoming more sophisticated. If you&amp;rsquo;re a web developer, security professional, or a student keen on learning about web application security, this blog post is tailor-made for you. Today, we will guide you through a comprehensive walkthrough on setting up the Damn Vulnerable Web App (DVWA) using OWASP ZAP and Docker, based on a YouTube video tutorial.</description>
    </item>
    <item>
      <title>Damn Vulnerable Web App DVWA testing with ZAP on Windows</title>
      <link>/post/2023/2023-07-16-dvwa_zap_windows/</link>
      <pubDate>Sun, 16 Jul 2023 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2023/2023-07-16-dvwa_zap_windows/</guid>
      <description>Testing Damn Vulnerable Web App (DVWA) with OWASP ZAP on Windows Cybersecurity threats are always evolving, making it vital for developers and security professionals to be updated with the latest tools and techniques. This guide introduces you to using OWASP ZAP for testing the Damn Vulnerable Web App (DVWA) on a Windows 11 environment.&#xA;Introduction to DVWA The Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application intentionally designed with vulnerabilities.</description>
    </item>
    <item>
      <title>University Project - Linux Rootkit Development</title>
      <link>/post/2022/2022-12-05-rootkit/</link>
      <pubDate>Mon, 05 Dec 2022 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2022/2022-12-05-rootkit/</guid>
      <description>Linux Rootkit Development University Project Introduction Welcome to an intriguing university project video that delves into the secretive realm of Linux Rootkit development. In this project, the focus is on Linux Kernel version 4.4.0 running on Ubuntu 16.04. The goal? To unravel the functionality of a Rootkit and its potential real-world applications. While this endeavor may raise eyebrows, it&amp;rsquo;s crucial to emphasize that this project is purely for educational and research purposes, with no intention of endorsing or promoting illegal activities.</description>
    </item>
    <item>
      <title>University Project - OSINT and Cloud Services discovery tools</title>
      <link>/post/2022/2022-01-30-osintcloud/</link>
      <pubDate>Fri, 22 Jul 2022 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2022/2022-01-30-osintcloud/</guid>
      <description>OSINT and Cloud Services Discovery Tools In the ever-evolving landscape of cybersecurity, staying ahead of potential threats and vulnerabilities is paramount. As organizations increasingly migrate their operations to the cloud, the need to secure cloud services and infrastructure has become more critical than ever. In this blog post, we delve into the world of Open-Source Intelligence (OSINT) and Cloud Services discovery tools, shedding light on a powerful code designed to uncover potential attack vectors within Azure/Microsoft 365 tenant cloud services.</description>
    </item>
    <item>
      <title>University Project - Basic Malware Lab</title>
      <link>/post/2022/2022-04-22-basic_malware_lab/</link>
      <pubDate>Fri, 22 Apr 2022 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2022/2022-04-22-basic_malware_lab/</guid>
      <description>Navigating the Complex World of Malware Analysis: A Personal Journey Introduction In a recent video, I jumped into the intricate world of Malware Analysis. This engaging project involved diving into the depths of cybersecurity, exploring the stages, challenges, and invaluable learnings that arose along the way. In this blog post, we&amp;rsquo;ll take you through the highlights of this project and provide insights into the fascinating realm of malware analysis.</description>
    </item>
    <item>
      <title>Exploring the Certificate Store via PowerShell</title>
      <link>/post/2022/2022-04-10-checkingmyroots/</link>
      <pubDate>Mon, 11 Apr 2022 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2022/2022-04-10-checkingmyroots/</guid>
      <description>A Different View: Exploring the Certificate Store via PowerShell While many turn to the certificate MMC to observe their certificates, I opted for a different angle using PowerShell. Here&amp;rsquo;s how you can harness PowerShell to extract information about your certificates:&#xA;1. To List All Trusted Root CA in the Local Machine:&#xA;$LocalMachineRootCA = (Get-ChildItem Cert:\LocalMachine\Root\) | Select-Object FriendlyName, Subject, Issuer, NotAfter, NotBefore, HasPrivateKey, Name, Thumbprint $LocalMachineRootCA | Export-Csv -Path .\LocalMachineRootCA.csv -NoTypeInformation 2.</description>
    </item>
    <item>
      <title>Australian Banks: A Deep Dive into Cipher Security</title>
      <link>/post/2022/2022-04-10-ausbanks_deep_dive_ciphers/</link>
      <pubDate>Sun, 10 Apr 2022 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2022/2022-04-10-ausbanks_deep_dive_ciphers/</guid>
      <description>Australian Banks: A Deep Dive into Cipher Security Australian Banks: A Deep Dive into Cipher Security In a world increasingly reliant on online banking, the security protocols and ciphers adopted by banks are more critical than ever. Curiosity led me to investigate which Australian banks might still be operating with outdated ciphers. My method? A PowerShell script, albeit a straightforward one, to parse outputs from SSLSCAN and collate them into comprehensible CSV files.</description>
    </item>
    <item>
      <title>University Project - PicoProject - Ducky</title>
      <link>/post/2022/2022-02-26-picoproject_ducky/</link>
      <pubDate>Sat, 26 Feb 2022 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2022/2022-02-26-picoproject_ducky/</guid>
      <description>Introducing PicoProject-Ducky: A DIY Rubber Ducky with Raspberry Pi Pico In the realm of cybersecurity and ethical hacking, the &amp;ldquo;Rubber Ducky&amp;rdquo; has long held a legendary status. Originally created by Hak5, this innocuous-looking USB device possesses the power to execute payloads when plugged into a computer. Today, the spirit of the Rubber Ducky is reborn in a new avatar, thanks to the versatility of the Raspberry Pi Pico.&#xA;I&amp;rsquo;m thrilled to introduce PicoProject-Ducky, a step-by-step guide to transforming your Raspberry Pi Pico into a custom, potent, and budget-friendly Rubber Ducky alternative.</description>
    </item>
    <item>
      <title>Recovering and Securing Data from an Old USB Drive</title>
      <link>/post/2022/2022-01-30-usb_file_recovery/</link>
      <pubDate>Sun, 30 Jan 2022 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2022/2022-01-30-usb_file_recovery/</guid>
      <description>Recovering and Securing Data from an Old USB Drive In the age of cloud storage, we often forget about the treasure troves of data stored on physical media. This guide walks you through the process of recovering data from an old USB drive, and subsequently, ensuring the data can&amp;rsquo;t be retrieved again.&#xA;For this task, I&amp;rsquo;ll be using a 16 GB USB drive and Kali Linux as the recovery environment.</description>
    </item>
    <item>
      <title>About</title>
      <link>/about-me/</link>
      <pubDate>Tue, 25 Jan 2022 14:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/about-me/</guid>
      <description>Greetings, fellow tech enthusiasts and academic explorers! I stand at the crossroads of cloud solutions, AI innovations, cybersecurity, and the ever-evolving landscape of DevOps. As a Cybersecurity Solution Architect, I craft holistic strategies that are both rooted in the present and anticipate the digital future.&#xA;Academic Pursuits: I completed my postgraduate studies at the University of New South Wales (UNSW) and proudly hold a Master of Cyber Security (Engineering) degree with honours(Excellence).</description>
    </item>
    <item>
      <title>About</title>
      <link>/about/</link>
      <pubDate>Tue, 25 Jan 2022 14:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/about/</guid>
      <description>Greetings, fellow tech enthusiasts and academic explorers! I stand at the crossroads of cloud solutions, AI innovations, cybersecurity, and the ever-evolving landscape of DevOps. As a Cloud Solution Architect, I craft holistic strategies that are both rooted in the present and anticipate the digital future.&#xA;Academic Pursuits: I completed my postgraduate studies at the University of New South Wales (UNSW) and proudly hold a Master of Cyber Security (Engineering) degree with honours(Excellence).</description>
    </item>
    <item>
      <title>Disclaimer</title>
      <link>/disclaimer/</link>
      <pubDate>Tue, 25 Jan 2022 14:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/disclaimer/</guid>
      <description>These postings are provided “AS IS” with no warranties, and confer no rights. The contents of this site are my own personal opinions and may not necessarily represent the views of current or previous Employer. In addition, my thoughts and opinions often change, and as a weblog is intended to provide a semi-permanent point in time snapshot you should not consider out of date posts to reflect my current thoughts and opinions.</description>
    </item>
    <item>
      <title>Cloud Local Administrator Password Service - Project</title>
      <link>/post/2019/2019-11-17-cloud-local-administrator-password-service-project/</link>
      <pubDate>Sun, 17 Nov 2019 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2019/2019-11-17-cloud-local-administrator-password-service-project/</guid>
      <description>Over the last few years I have worked with Microsoft Intune, and AzureAD. I always get the request; “We can do this on-premise, why doesn&amp;rsquo;t it work now in the cloud”. Most of the time it is just a mindset change. Once you understand how cloud native solutions work. One issue that has appeared over and over again is local administrators on workstations that are AzureAD joined only. On-premise we would use LAPS to control administrator accounts, for AzureAD joined devices it&amp;rsquo;s different, we don’t have a domain or group policy.</description>
    </item>
    <item>
      <title>Microsoft Ignite 2019 - Day 5 wrap up</title>
      <link>/post/2019/2019-11-10-microsoft-ignite-2019-day-5-wrap-up/</link>
      <pubDate>Sun, 10 Nov 2019 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2019/2019-11-10-microsoft-ignite-2019-day-5-wrap-up/</guid>
      <description>The final day at Ignite. This is the shortest of the conference but is always the longest for me. The conference finishes at 2 pm, then it’s the long flight home, 30+ hours of travel.&#xA;Ignite still has sessions running right up the 2 pm, the HUB area is still open, but the vendors or swag guys are gone. The lunchrooms are cut in half. It was good to see Microsoft providing assistance to attendee that have social issues or disabilities.</description>
    </item>
    <item>
      <title>Microsoft Ignite 2019 - Day 4 wrap up</title>
      <link>/post/2019/2019-11-08-microsoft-ignite-2019-day-4-wrap-up/</link>
      <pubDate>Fri, 08 Nov 2019 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2019/2019-11-08-microsoft-ignite-2019-day-4-wrap-up/</guid>
      <description>The long day. The fourth day of Ignite is always the longs, started at 7am with breakfast and finished 11pm with the trip to the hotel from the after-party. My day was similar to the day before, lots of sessions and extended focus groups.&#xA;Here are a few of the updates from the sessions.&#xA;Microsoft Teams, Microsoft has integrated Teams with almost everything they can. There were so many updates its impossible to capture all the changes, best to review the sessions for Microsoft Teams on the MS Ignite site.</description>
    </item>
    <item>
      <title>Microsoft Ignite 2019 - Day 2 wrap up</title>
      <link>/post/2019/2019-11-07-microsoft-ignite-2019-day-2-wrap-up/</link>
      <pubDate>Thu, 07 Nov 2019 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2019/2019-11-07-microsoft-ignite-2019-day-2-wrap-up/</guid>
      <description>Today was a little slower in the information dump then yesterday. I spent more time with the product teams in the hub discussing the new products and solutions.&#xA;Here are a few of the updates from the sessions.&#xA;Insider Risk Management, this new service uses the Microsoft Graph, security services and connectors to other systems like SAP, to obtain real-time native signals such as file activity, communications sentiment, abnormal user behaviors and resignation date (If connected to HR).</description>
    </item>
    <item>
      <title>Microsoft Ignite 2019 - Day 3 wrap up</title>
      <link>/post/2019/2019-11-07-microsoft-ignite-2019-day-3-wrap-up/</link>
      <pubDate>Thu, 07 Nov 2019 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2019/2019-11-07-microsoft-ignite-2019-day-3-wrap-up/</guid>
      <description>The days are getting longer, still heaps happening at Ignite. Most of my formal tasks are done now. It was time to look at some of the more exciting things that I don’t usually get to see. Started with a look at the new Power Platform areas in PowerApps and PowerBI. Then headed over to Microsoft focus groups area for a chat with them around notifications, then over to Azure Stack.</description>
    </item>
    <item>
      <title>Microsoft Ignite 2019 - Day 1 wrap up</title>
      <link>/post/2019/2019-11-05-microsoft-ignite-2019-day-1-wrap-up/</link>
      <pubDate>Tue, 05 Nov 2019 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2019/2019-11-05-microsoft-ignite-2019-day-1-wrap-up/</guid>
      <description>MS Ignite 2019, day 1, is now over. There have been so many posts already highlighting what was covered in the keynotes and some sessions during the day, I attempt not to repeat them. Here are some of the key points that I took away from day 1.&#xA;Vision Keynote. The keynote was only open to 3000 people in The Hub area, the rest had to view for viewing areas around the conference.</description>
    </item>
    <item>
      <title>Microsoft Ignite 2019 - Pre-day IoT workshop wrap up</title>
      <link>/post/2019/2019-11-05-microsoft-ignite-2019-pre-day-iot-workshop-wrap-up/</link>
      <pubDate>Tue, 05 Nov 2019 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2019/2019-11-05-microsoft-ignite-2019-pre-day-iot-workshop-wrap-up/</guid>
      <description>Microsoft Ignite 2019 has kicked off. On Sunday I was attended the pre-day workshop on IoT. Benjamin Cabé took the group through the development of a modern cloud IoT solution.&#xA;We focused on Microsoft’s demo company, Contoso Art Shipping Inc.&#xA;The workshop started by setting up sensors using IoT Hub and the new Device Provisioning Service with Plug and Play to do enrolment.&#xA;The device we used was the Azure MX Chip Dev Kit.</description>
    </item>
    <item>
      <title>Disabling, blocking and revoking an M365 user from your tenant</title>
      <link>/post/2019/2019-10-13-disabling-blocking-and-revoking-an-m365-user-from-your-tenant/</link>
      <pubDate>Sun, 13 Oct 2019 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2019/2019-10-13-disabling-blocking-and-revoking-an-m365-user-from-your-tenant/</guid>
      <description>There are times when you need to force a user or users to be disconnected for Microsoft 365 services like Exchange and SharePoint and block their access. When this happens, you need to complete the following tasks.&#xA;Block the user&amp;rsquo;s sign in Reset the user&amp;rsquo;s password and force a change on next login Revoke their sessions to SharePoint and OneDrive Revoke or remove their AzureAD authentication tokens These tasks can be done via the GUI, but it&amp;rsquo;s quick to have a script pre-paired.</description>
    </item>
    <item>
      <title>AzureAD Passwordless Sign in - Part 1</title>
      <link>/post/2019/2019-09-29-azuread-passwordless-sign-in-part-1/</link>
      <pubDate>Sun, 29 Sep 2019 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2019/2019-09-29-azuread-passwordless-sign-in-part-1/</guid>
      <description>Microsoft is currently on a path to switch services to Passwordless logins, meaning we will at some point no longer require a password. This does not mean accounts will not be protected; accounts will be using tokens, Multi-Factor, authenticator apps to perform authentication.&#xA;The Microsoft strategy is base on 4 steps; Develop password replacement offering Reduce the user-visible password surface area Transition into password-less deployment Eliminate password from identity directory Right now, we still see the continued development of the replacement for passwords and the reduction of locations where we need to enter password.</description>
    </item>
    <item>
      <title>AzureAD Passwordless Sign in with FIDO - Part 2</title>
      <link>/post/2019/2019-09-29-azuread-passwordless-sign-in-with-fido-part-2/</link>
      <pubDate>Sun, 29 Sep 2019 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2019/2019-09-29-azuread-passwordless-sign-in-with-fido-part-2/</guid>
      <description>FIDO keys provide you with a hardware-based authentication device. The keys can be used on a number of different sites as well. I use the keys to protect my AzureAD login, GitHub and a few other places as well. In this section, I will go over the process to enable AzureAD.&#xA;In part 1, I went over methods for PasswordLess login and set up the Microsoft Authenticator App.&#xA;AzureAD Passwordless Sign in with FIDO - Part 1</description>
    </item>
    <item>
      <title>AzureAD Passwordless Sign in, forcing Windows 10 to login with FIDO only - Part 3</title>
      <link>/post/2019/2019-09-29-azuread-passwordless-sign-in-forcing-windows-10-to-login-with-fido-only-part-3/</link>
      <pubDate>Sun, 29 Sep 2019 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2019/2019-09-29-azuread-passwordless-sign-in-forcing-windows-10-to-login-with-fido-only-part-3/</guid>
      <description>FIDO keys provide you with a hardware-based authentication device. The keys can be used on a number of different sites as well. I use the keys to protect my AzureAD login, GitHub and a few other places as well. In this section I will go over the configuration for locking down a Windows 10 device. I have already gone over the process to enable AzureAD in part 1 and 2.</description>
    </item>
    <item>
      <title>New Blog, New Day.</title>
      <link>/2019/09/29/azuread-passwordless-sign-in-forcing-windows-10-to-login-with-fido-only-part-3-copy/</link>
      <pubDate>Sun, 29 Sep 2019 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/2019/09/29/azuread-passwordless-sign-in-forcing-windows-10-to-login-with-fido-only-part-3-copy/</guid>
      <description>Hello Dear Readers!&#xA;I&amp;rsquo;m excited to announce that my blog has now moved to a sparkling new location! This change is all about bringing you an even better reading experience with a fresh, modern layout. As we make this transition, please note that some of the old links might not work as they used to.&#xA;To ensure you can still find all your favorite posts and explore new ones, I&amp;rsquo;ve compiled a list of updated links which you&amp;rsquo;ll find at the end of this post.</description>
    </item>
    <item>
      <title>New Blog, New Day.</title>
      <link>/2019/09/29/azuread-passwordless-sign-in-forcing-windows-10-to-login-with-fido-only-part-3/</link>
      <pubDate>Sun, 29 Sep 2019 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/2019/09/29/azuread-passwordless-sign-in-forcing-windows-10-to-login-with-fido-only-part-3/</guid>
      <description>Hello Dear Readers!&#xA;I&amp;rsquo;m excited to announce that my blog has now moved to a sparkling new location! This change is all about bringing you an even better reading experience with a fresh, modern layout. As we make this transition, please note that some of the old links might not work as they used to.&#xA;To ensure you can still find all your favorite posts and explore new ones, I&amp;rsquo;ve compiled a list of updated links which you&amp;rsquo;ll find at the end of this post.</description>
    </item>
    <item>
      <title>New Blog, New Day.</title>
      <link>/2019/09/29/azuread-passwordless-sign-in-part-1/</link>
      <pubDate>Sun, 29 Sep 2019 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/2019/09/29/azuread-passwordless-sign-in-part-1/</guid>
      <description>Hello Dear Readers!&#xA;I&amp;rsquo;m excited to announce that my blog has now moved to a sparkling new location! This change is all about bringing you an even better reading experience with a fresh, modern layout. As we make this transition, please note that some of the old links might not work as they used to.&#xA;To ensure you can still find all your favorite posts and explore new ones, I&amp;rsquo;ve compiled a list of updated links which you&amp;rsquo;ll find at the end of this post.</description>
    </item>
    <item>
      <title>New Blog, New Day.</title>
      <link>/2019/09/29/azuread-passwordless-sign-in-with-fido-part-2/</link>
      <pubDate>Sun, 29 Sep 2019 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/2019/09/29/azuread-passwordless-sign-in-with-fido-part-2/</guid>
      <description>Hello Dear Readers!&#xA;I&amp;rsquo;m excited to announce that my blog has now moved to a sparkling new location! This change is all about bringing you an even better reading experience with a fresh, modern layout. As we make this transition, please note that some of the old links might not work as they used to.&#xA;To ensure you can still find all your favorite posts and explore new ones, I&amp;rsquo;ve compiled a list of updated links which you&amp;rsquo;ll find at the end of this post.</description>
    </item>
    <item>
      <title>New Blog, New Day.</title>
      <link>/2019/10/13/disabling-blocking-and-revoking-an-m365-user-from-your-tenant/</link>
      <pubDate>Sun, 29 Sep 2019 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/2019/10/13/disabling-blocking-and-revoking-an-m365-user-from-your-tenant/</guid>
      <description>Hello Dear Readers!&#xA;I&amp;rsquo;m excited to announce that my blog has now moved to a sparkling new location! This change is all about bringing you an even better reading experience with a fresh, modern layout. As we make this transition, please note that some of the old links might not work as they used to.&#xA;To ensure you can still find all your favorite posts and explore new ones, I&amp;rsquo;ve compiled a list of updated links which you&amp;rsquo;ll find at the end of this post.</description>
    </item>
    <item>
      <title>New Blog, New Day.</title>
      <link>/2019/11/05/microsoft-ignite-2019-pre-day-iot-workshop-wrap-up/</link>
      <pubDate>Sun, 29 Sep 2019 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/2019/11/05/microsoft-ignite-2019-pre-day-iot-workshop-wrap-up/</guid>
      <description>Hello Dear Readers!&#xA;I&amp;rsquo;m excited to announce that my blog has now moved to a sparkling new location! This change is all about bringing you an even better reading experience with a fresh, modern layout. As we make this transition, please note that some of the old links might not work as they used to.&#xA;To ensure you can still find all your favorite posts and explore new ones, I&amp;rsquo;ve compiled a list of updated links which you&amp;rsquo;ll find at the end of this post.</description>
    </item>
    <item>
      <title>New Blog, New Day.</title>
      <link>/2019/11/08/microsoft-ignite-2019-day-3-wrap-up/</link>
      <pubDate>Sun, 29 Sep 2019 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/2019/11/08/microsoft-ignite-2019-day-3-wrap-up/</guid>
      <description>Hello Dear Readers!&#xA;I&amp;rsquo;m excited to announce that my blog has now moved to a sparkling new location! This change is all about bringing you an even better reading experience with a fresh, modern layout. As we make this transition, please note that some of the old links might not work as they used to.&#xA;To ensure you can still find all your favorite posts and explore new ones, I&amp;rsquo;ve compiled a list of updated links which you&amp;rsquo;ll find at the end of this post.</description>
    </item>
    <item>
      <title>New Blog, New Day.</title>
      <link>/2019/11/08/microsoft-ignite-2019-day-4-wrap-up/</link>
      <pubDate>Sun, 29 Sep 2019 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/2019/11/08/microsoft-ignite-2019-day-4-wrap-up/</guid>
      <description>Hello Dear Readers!&#xA;I&amp;rsquo;m excited to announce that my blog has now moved to a sparkling new location! This change is all about bringing you an even better reading experience with a fresh, modern layout. As we make this transition, please note that some of the old links might not work as they used to.&#xA;To ensure you can still find all your favorite posts and explore new ones, I&amp;rsquo;ve compiled a list of updated links which you&amp;rsquo;ll find at the end of this post.</description>
    </item>
    <item>
      <title>New Blog, New Day.</title>
      <link>/2019/11/11/microsoft-ignite-2019-day-5-wrap-up/</link>
      <pubDate>Sun, 29 Sep 2019 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/2019/11/11/microsoft-ignite-2019-day-5-wrap-up/</guid>
      <description>Hello Dear Readers!&#xA;I&amp;rsquo;m excited to announce that my blog has now moved to a sparkling new location! This change is all about bringing you an even better reading experience with a fresh, modern layout. As we make this transition, please note that some of the old links might not work as they used to.&#xA;To ensure you can still find all your favorite posts and explore new ones, I&amp;rsquo;ve compiled a list of updated links which you&amp;rsquo;ll find at the end of this post.</description>
    </item>
    <item>
      <title>New Blog, New Day.</title>
      <link>/2019/11/18/cloud-local-administrator-password-service-project/</link>
      <pubDate>Sun, 29 Sep 2019 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/2019/11/18/cloud-local-administrator-password-service-project/</guid>
      <description>Hello Dear Readers!&#xA;I&amp;rsquo;m excited to announce that my blog has now moved to a sparkling new location! This change is all about bringing you an even better reading experience with a fresh, modern layout. As we make this transition, please note that some of the old links might not work as they used to.&#xA;To ensure you can still find all your favorite posts and explore new ones, I&amp;rsquo;ve compiled a list of updated links which you&amp;rsquo;ll find at the end of this post.</description>
    </item>
    <item>
      <title>New Blog, New Day.</title>
      <link>/m365-url-list/</link>
      <pubDate>Sun, 29 Sep 2019 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/m365-url-list/</guid>
      <description>Hello Dear Readers!&#xA;I&amp;rsquo;m excited to announce that my blog has now moved to a sparkling new location! This change is all about bringing you an even better reading experience with a fresh, modern layout. As we make this transition, please note that some of the old links might not work as they used to.&#xA;To ensure you can still find all your favorite posts and explore new ones, I&amp;rsquo;ve compiled a list of updated links which you&amp;rsquo;ll find at the end of this post.</description>
    </item>
    <item>
      <title>Starting Over</title>
      <link>/post/2019/2019-09-29-starting-over/</link>
      <pubDate>Sun, 29 Sep 2019 00:00:00 +0000</pubDate><author>me@craigwilson.blog (Craig Wilson)</author>
      <guid>/post/2019/2019-09-29-starting-over/</guid>
      <description>A few months ago, I created this blog, and it has taken a bit of time, but its time to give blogging another try. I have created this blog to help other people with issues or topics that I have been working on. Over the last few years I have been working on cloud base solutions focusing on Microsoft technology and some Google services.&#xA;Currently, I am working as a Principle Architect focusing on the Microsoft cloud.</description>
    </item>
  </channel>
</rss>
