Posts
Compromised computer or stolen data? Watch a video on how to get hacked by a RDP server. And then read how to defend against this attack.
TeamViewer: 4-Year User Review (Part 2/2)
TeamViewer and its imperfections. What don't we like after 4 years of use? And how do we set TeamViewer up to be as safe as possible?
TeamViewer: 4-Year User Review (Part 1/2)
TeamViewer is our remote user support tool. We can handle over 270 connections a week. What do we like about TeamViewer? And why did we buy it?
Monitoring system video: How We Oversee 2000+ Network Devices
The monitoring system, thanks to which we have our networks in order and a constant overview of their health. Practical video directly from the production environment.
Barcamp HK 2018 - Danger in The Name of USB
How easy is it to hack a computer? Video recording from my Barcamp lecture in Hradec Králové. I'll tell you about the danger that comes through USB.
Ubiquiti UniFi and Fortinet Security Fabric
Ubiquiti UniFi and Fortinet Security Fabric help us manage larger networks, with more security and less effort. Little revolution in network management.
HackerFest 2018 and what we couldn´t fit into the lecture
I will share with you the USB hacks we and William Ischanoe had taken a bite of at HackerFest, but there was no time to go in depth.
Why Is Server Slow: Momentary Problems
hy is the server slow? Article about solving performance problems, measuring performance, finding bottlenecks, and designing new servers.
How We Were Able to Lose Closed Deal
So far I have only shared our successes. We fail as well, occasionally. I would like to share a fail with you today and what lessons we have learned.
Honeypot: Efficient and Cheap Way to Detect LAN Attacks
What honeypot can do? And what does an ideal LAN attack detection system look like? Practical insights how honeypot detects unwanted activity in the network.
IT Security: Security Life Cycle
My practical insight into IT security and security life cycle. Everyone deals with restrictions, but what about monitoring, reactions, and lessons learned?
How to Hack a Computer in Seconds or Bash Bunny and Packet Squirrel Attacks
Play how to hack computer videos. I have tested hacking gadgets - Bash Bunny and Packet Squirrel. Everyone can hack, you just need to be interested and have free time!
Network Security: Tier Model and PAW
As a network administrator, we have access to all of our customer data. That is why I put a lot of effort into security. Learn about Tier model and PAW.
Password Management 2: We Have Installed Remote Desktop Manager
The new password management system, Remote Desktop Manager, allows us to do things faster and more complexly. Learn about our RDM experience.
How Our Tech Support Operates
The technical support of other companies has become the target of several of my articles. That's why I have decided to describe how our tech support operates. To help you evaluate us.
Non-existent Technical Support: One-Man Show as a Business
Technical support problems will most likely never end. This time, we have encountered a company that is basically a one-man show. And their technical support is just like that.
Monitoring System: What Can We Do
The monitoring system is our "most productive" employee that we have trained to meet our needs. What is it composed of? And what can it do?
Password Management
How we handle our customers' passwords. A couple of funny stories from life. And why you should ask your IT guy how he stores your passwords.
Monitoring System: How I Found Out We Need It
How I found out that I need a monitoring system as a network administrator. Or how I stopped working hard and tried to do it smart.
Hacking Gadgets: Hak5 Packet Squirrel
Hak5 Packet Squirrel is another hacking gadget I have tested. What Packet Squirrel can do, where did I buy it and what do I use it for?