EN 
11.09.2024 WELCOME IN MY WORLD

This website is originally written in the Czech language. Only part of the content is machine (AI) translated into English. The translation may not be exact and may contain errors.

Series/groups of articles

Active Directory and the LDAP protocol

Managing a corporate computer network using Microsoft OS usually means managing Active Directory Domain Services (AD DS). It is a very extensive group of technologies, protocols and services. The basis is directory services, authentication and the LDAP communication protocol.
(articles in the series: 4)

Azure AD / Entra ID identity and authentication

Articles related to user and device identity (not only) in Microsoft Entra ID. Different login and authentication options. Areas such as modern authentication, multi-factor authentication, password-less login, etc. Often involving the use of FIDO Authentication, for example using the FIDO2 security key or Windows Hello for Business.
(articles in the series: 3)

Azure, Microsoft 365, Office 365, Cloud

Various popular topics regarding the public cloud. More focused on Microsoft services, i.e. IaaS, PaaS, SaaS Azure, Entra ID directory services (formerly Azure AD) and hosted Microsoft 365 / Office 365 services.
(articles in the series: 2)

Backup

Articles dedicated to backup (Backup), replication (Replication) and restoration (Restore) of data. That is, data protection (Data Protection) using backup copies and recovery after a crash (Disaster Recovery).
(articles in the series: 9)

Basics of computer networks

I wrote this series for Connect magazine. It contains most of the same information as my older series Computer networks, but it is written in a slightly different way. Computer network technologies are first briefly summarized and then discussed in a little more detail from the lowest layers up.
(articles in the series: 1)

Cisco IOS

A large series about the operating system of Cisco's active elements. It contains some of the most read articles on this site. The articles describe the configuration of switches and routers, primarily with Cisco IOS. Things about ports, VLANs, STP, ACLs, QoS, etc.
(articles in the series: 18)

Cisco NX-OS

Articles on Cisco's newer active element operating system, NX-OS. It is used on Nexus Series Ethernet switches and MDS Fibre Channel switches.
(articles in the series: 0)

Cisco Unified Communications - CUCM

Cisco UC category articles describe Cisco IP telephony in general. The main focus is on the Cisco Unified Communications Manager (CUCM) PBX. Another category focuses on UCCX.
(articles in the series: 0)

Cisco WLC

The Wireless LAN Controller is a Cisco device for central management of WiFi networks (access points). The articles describe the function and configuration of Cisco wireless networks. From Access Points (i.e. access points), to WLC, Wireless Control System (WCS) and Cisco Prime Infrastructure.
(articles in the series: 0)

Computer networks

This series covers the basics of computer networking. Important practical aspects that everyone interested in networking should know are briefly described. It contains some of the most widely read articles on this site. It is used for teaching in schools.
(articles in the series: 2)

Computer Storage

Data storage is a vast and complex issue in the computer world. Here you will find articles dedicated to Storage Area Networks (SAN), iSCSI technologies, Fiber Channel, disk arrays (Storage System, Disk Srray) and data storage and storage in general.
(articles in the series: 1)

Electronic mail - email

SMTP protocol and its features. Protection of electronic mail against SPAM and Phishing. Encryption of mail...
(articles in the series: 0)

Extreme Networks

Articles related to Extreme Networks networking features, including ExtremeCloud IQ cloud management.
(articles in the series: 2)

FIDO Authentication

FIDO authentication is based on the FIDO2 standard (WebAuthn and CTAP2). It brings a more secure option to log in to online services. It belongs to Passwordless MFA (multi-factor authentication without a password). At the same time, it increases the convenience of users (it supports the use of biometrics). These are, for example, Windows Hello for Business, FIDO2 security key and generally passkeys (access keys).
(articles in the series: 2)

Fortinet FortiGate and more

Fortinet security solutions. Mostly focused on the Next Generation Firewall (NGFW) FortiGate. Configuration of FW, policies, NAT, but also VPN and authentication options. Marginally working with logs using FortiAnalyzer and with clients using FortiClient EMS.
(articles in the series: 2)

Group Policy

Group Policy is definitely the basis for central management of computers in a domain. With them we can control the settings, security and behaviour of workstations and servers.
(articles in the series: 1)

Kerberos and Single Sign-On

Authentication protocol that is widely used (not only) by Microsoft. The articles focus on single sign-on (SSO), in practice it is very much about using Microsoft Active Directory Domain Services.
(articles in the series: 0)

Kerberos protocol with focus on SSO in AD DS

A new series that deals in detail with the Kerberos V5 protocol, mainly in the Microsoft Active Directory environment. It also describes a number of related things that are needed to understand how Kerberos Single Sign-On (SSO) works.
(articles in the series: 5)

Link Aggregation

Multi-line connection. EtherChannel, Link Aggregation, PAgP, LACP, NIC Teaming, Bonding, Bundling ...
(articles in the series: 0)

Microsoft Exchange

Almost since the beginning of my practice, I have been involved in the administration of the Microsoft mail server, i.e. Exchange Server. I started with the 2003 version and worked my way up to Exchange Online. The articles cover many areas of management. Most since the migration to Exchange Server 2016 and its complete configuration. But also Exchange Hybrid and e-mail security.
(articles in the series: 0)

Microsoft Intune

Cloud solution for managing corporate and private devices with different operating systems. It supports Mobile Device Management (MDM) and Mobile Application Management (MAM). Allows management (access) of users, devices and applications.
(articles in the series: 0)

NetApp E-Series

Articles that relate to NetApp E-Series disk arrays running SANtricity OS.
(articles in the series: 0)

NetApp ONTAP

Articles that relate to NetApp All Flash FAS (AFF) and Fabric-Attached Storage (FAS) disk arrays with the ONTAP operating system.
(articles in the series: 0)

Network monitoring

Introduction to computer network monitoring and description of basic protocols.
(articles in the series: 0)

PowerShell

Articles related to Microsoft's PowerShell scripting language, which is used in all new versions of MS OS and applications.
(articles in the series: 0)

QoS - Quality of Service

This series of articles is devoted to the comprehensive issue of quality assurance in data transmission, i.e. Quality of Service. Everything is addressed taking into account the current trends used on Cisco active elements, along with configuration examples.
(articles in the series: 0)

Security

Security tools. Primarily Firewall and the like.
(articles in the series: 1)

SNMP

Simple Network Management Protocol (SNMP) is very useful for managing a computer network.
(articles in the series: 1)

SSL/TLS protocol

The Secure Sockets Layer protocol and its successor, Transport Layer Security, are widely used on the Internet to secure the communication of another protocol (such as HTTPS, SMTPS, XMPP) using encryption.
(articles in the series: 1)

Veeam Backup & Replication

Articles that focus on Veeam Software's backup solution. It is a platform for Backup, Replication and Restore. In other words, a Data Protection and Disaster Recovery solution.
(articles in the series: 6)

Virtualization

Articles from popular topics about virtualization of servers and workstations.
(articles in the series: 3)

VPN - Virtual Private Network

A series of articles that provides a general description of VPN technology. It breaks down individual VPN types such as Site to Site VPN and Remote Access VPN. And it describes configurations on different devices.
(articles in the series: 0)

Windows OS

Articles dedicated to Microsoft operating systems, both client and server.
(articles in the series: 2)

Wireless projection

Different ways to get the image from the device to the display surface without using cables.
(articles in the series: 0)