01
Systems I can build and keep under control
This is not just about installing software. The important part is that people can work, data stays safe, outages do not last longer than necessary and costs make sense. For almost every operational problem or unusual requirement, there is a sensible solution to look for - from servers, networks and backups through CCTV, access control and GPS tracking to automation, web/intranet applications, helper scripts and monitoring. The key is to understand the operation, not just deploy another box or service.
Servers, virtualization and recovery
A server should not be a black box that stops the organization for days when it fails. I design environments so services can be separated, backed up, versioned and restored quickly when something goes wrong. Technically this usually means Proxmox VE, Proxmox Backup Server, snapshots, incremental backups, HA scenarios, VMs and containers.
Central identity and file services
Users should not deal with ten passwords, and administrators should not manage access separately in every place. The goal is clear account, permission and data management. Technically this means Samba AD, LDAP, shared data, file recycle bins, file versions and user/group permissions.
Private business cloud
People expect cloud convenience: web access, mobile access, file sharing and document editing. This can also be built on your own storage and connected to existing accounts, permissions and network shares. Technically this can use Nextcloud, OnlyOffice, external Samba storage, mobile access, a web UI and integration with the existing environment.
E-mail infrastructure
E-mail should be delivered reliably, filter junk and avoid ending up in spam because of poor configuration. A mail server is an operational service, not a one-time installation. Technically this means Postfix, Dovecot, Rspamd, Sieve, DKIM, SPF, DMARC, ARC, SRS, antivirus checks and domain management.
Networks, Wi‑Fi and connectivity
When the network misbehaves, users usually just see that “the internet” or “the system” does not work. The real cause may be topology, Wi‑Fi, routing, VLANs, firewall rules or a congested link. Technically this means MikroTik, UniFi, switches, VLANs, routing, firewalling, QoS, wireless and fibre routes.
Monitoring and automation
The cheapest problem is the one you know about before it stops operations. Monitoring helps detect full disks, service outages, degraded connectivity and suspicious states early. Technically this means Nagios, custom plugins, logging, graphs, service maps, automated checks and scripts.
Firewall and operational protection
A well-designed firewall is not only about blocking traffic. It separates network parts, reduces unnecessary risk, protects services from brute-force attempts and still keeps normal work usable. Technically this can mean nftables, fail2ban, MikroTik firewall, service rules, network segmentation, VPN and monitoring of suspicious traffic.
Business data security
Sensitive data should not be left unprotected where physical disk access or poorly configured permissions are enough to expose it. I handle encryption at rest, service separation, access rights and the practical balance between security and usability. Technically this can mean LUKS, native ZFS encryption, user/group permissions, separated storage and secure backups.
Websites, intranet and helper applications
Sometimes an off-the-shelf system is not enough and a small tool tailored to real operations is needed: a register, overview, form, data import, log check or service integration. I build smaller web and intranet applications and helper scripts so they solve a concrete job without unnecessary complexity. Technically this can mean PHP, HTML, JavaScript, MySQL/MariaDB, Bash and Python depending on the purpose.