No matter how much you invest in IT security if your provider messes around. Beware of hacker attacks through providers.
Ransomware actors have a new trick. None of backup solutions can mitigate it. They are threatening to release all the stolen information.
Companies end up without data or backups after a ransomware attack because they underestimate the skills of hackers. Learn what a hacker can do within your network and how to improve security.
Did you tape your webcam because you’re afraid of hackers? The video shows how easy it is to hack a laptop webcam. Do you know how to defend getting hacked?
We have made one Linux virtual server available for you to hack from the comfort of your home just after the HackerFest 2019. Go on!
To update or not to update? Updates are a neverending topic. In this article, you will learn why to update and how often.
Windows 7 and Windows Server 2008 R2 support will end on January 14, 2020. Upgrades are fully underway. What do we replace Windows with?
Are you considering where to get certified? I bring my insight into IT certification MCSE, CCNP, ECSA, CHFI, OSCP. Training, exam, practical benefits, price.
Over 60 servers hacked, 5 months of life and 1 exam. My path to OSCP certification: Offensive Security Certified Professional.
Compromised computer or stolen data? Watch a video on how to get hacked by a RDP server. And then read how to defend against this attack.
TeamViewer and its imperfections. What don’t we like after 4 years of use? And how do we set TeamViewer up to be as safe as possible?
TeamViewer is our remote user support tool. We can handle over 270 connections a week. What do we like about TeamViewer? And why did we buy it?
The monitoring system, thanks to which we have our networks in order and a constant overview of their health. Practical video directly from the production environment.
How easy is it to hack a computer? Video recording from my Barcamp lecture in Hradec Králové. I’ll tell you about the danger that comes through USB.
Ubiquiti UniFi and Fortinet Security Fabric help us manage larger networks, with more security and less effort. Little revolution in network management.
I will share with you the USB hacks we and William Ischanoe had taken a bite of at HackerFest, but there was no time to go in depth.
hy is the server slow? Article about solving performance problems, measuring performance, finding bottlenecks, and designing new servers.
So far I have only shared our successes. We fail as well, occasionally. I would like to share a fail with you today and what lessons we have learned.
What honeypot can do? And what does an ideal LAN attack detection system look like? Practical insights how honeypot detects unwanted activity in the network.
My practical insight into IT security and security life cycle. Everyone deals with restrictions, but what about monitoring, reactions, and lessons learned?