The Domain Name System (DNS) is important for day-to-day web browsing. However, it is increasingly obvious that the conventional DNS has some weaknesses. New providers are attempting to fill in the gaps. One of them is Quad9. Given that it has no commercial interests – and that it provides a high level of security and privacy – the public DNS resolver is a genuine alternative to the more widely...
Due to increasing globalization, processes for connecting and networking digital infrastructures are becoming increasingly important. The remote procedure call (RPC) plays a key role in this context, as it enables efficient inter-process communication designed for task distribution in networked client-server architectures.
For millions of people around the world, video chats and conferences are an essential part of daily life – for both work and leisure. When it comes to video telephony software and applications, Skype is one of the pack leaders. In fact, many people are unaware that there’s a considerable number of good alternatives to Skype on the market. Some of these programs even boast extra features that can’t...
How can the recipient of an email tell whether a message is actually coming from the person who appears to be sending it? Many scammers attempt to forge the email sender address. But you can protect yourself. You can verify the outbound mail server using the SPF (Sender Policy Framework), a popular authentication method. How does SPF work and what can it do?
The topic of data security is becoming increasingly important for both private users as well as in the business world. As a website owner, you should take all the necessary precautions to ensure that a visit to your site is as secure as possible. Converting your site from HTTP to HTTPS or SSL is an important first step to securing your website and gaining your customers’ trust.
Databases are usually based on rows of data. Columnar databases turn this system on its side. Instead of saving each entry one after the other, in a columnar database entries are stored category by category. This results in a decisive speed advantage when working with massive quantities of data. But how exactly does a column-oriented DBMS work?
Almost every application utilizes databases in one form or another. Besides classic relational databases, document-oriented databases have also become well-established in the course of the development of web apps. Instead of working with complex tables, these document stores use semi-structured data in simple documents. But how exactly does this work?
What is a URI? With the Uniform Resource Identifier, one can identify various items on the internet ranging from websites to email. The identifier has a clear syntax so that it functions smoothly and so that every device, every application and every user can understand it. The information contained in a URI provides information about what the resource is, how one can identify it and where it is...
For USB sticks to work as storage media, they need to have their own file system. Without this, it can be added manually by formatting the flash drive. Mac users have a tool available for this with the “Disk Utility” program. Read this tutorial article to find out what the individual steps are and which file systems are available to use.
Almost everyone knows the online auction marketplace eBay. High commissions and negative experiences have led some users to try out alternatives. There are sustainable online marketplaces with fair business models and platforms where you can buy and sell safely. We present the best eBay alternatives and make the comparison: Which can hold its own?