Compromised computer or stolen data? Watch a video on how to get hacked by a RDP server. And then read how to defend against this attack.
TeamViewer and its imperfections. What don’t we like after 4 years of use? And how do we set TeamViewer up to be as safe as possible?
TeamViewer is our remote user support tool. We can handle over 270 connections a week. What do we like about TeamViewer? And why did we buy it?
The monitoring system, thanks to which we have our networks in order and a constant overview of their health. Practical video directly from the production environment.
How easy is it to hack a computer? Video recording from my Barcamp lecture in Hradec Králové. I’ll tell you about the danger that comes through USB.
Ubiquiti UniFi and Fortinet Security Fabric help us manage larger networks, with more security and less effort. Little revolution in network management.
I will share with you the USB hacks we and William Ischanoe had taken a bite of at HackerFest, but there was no time to go in depth.
hy is the server slow? Article about solving performance problems, measuring performance, finding bottlenecks, and designing new servers.
So far I have only shared our successes. We fail as well, occasionally. I would like to share a fail with you today and what lessons we have learned.
What honeypot can do? And what does an ideal LAN attack detection system look like? Practical insights how honeypot detects unwanted activity in the network.
My practical insight into IT security and security life cycle. Everyone deals with restrictions, but what about monitoring, reactions, and lessons learned?
Play how to hack computer videos. I have tested hacking gadgets – Bash Bunny and Packet Squirrel. Everyone can hack, you just need to be interested and have free time!
As a network administrator, we have access to all of our customer data. That is why I put a lot of effort into security. Learn about Tier model and PAW.
The new password management system, Remote Desktop Manager, allows us to do things faster and more complexly. Learn about our RDM experience.
The technical support of other companies has become the target of several of my articles. That’s why I have decided to describe how our tech support operates. To help you evaluate us.
Technical support problems will most likely never end. This time, we have encountered a company that is basically a one-man show. And their technical support is just like that.
The monitoring system is our “most productive” employee that we have trained to meet our needs. What is it composed of? And what can it do?
How we handle our customers’ passwords. A couple of funny stories from life. And why you should ask your IT guy how he stores your passwords.
How I found out that I need a monitoring system as a network administrator. Or how I stopped working hard and tried to do it smart.
Hak5 Packet Squirrel is another hacking gadget I have tested. What Packet Squirrel can do, where did I buy it and what do I use it for?