How to buy NFT
How to buy an NFT
  • Online sales

The NFT trade is booming. There is an increasing number of people collecting the tokens or purchasing them as investments. But when buying NFT, you’ll want to pay attention to a few things, most of all security. Read on to find out where and how to buy NFTs, the types of NFTs available and how to stay safe while shopping for them.

How to buy an NFT
Guilded
What does the Guilded game chat app offer?
  • Know-how

The game chat app Guilded is now considered just as popular as Discord within the gaming community. Guilded actually offers more benefits for chat servers and channels when compared with Discord, such as more free features, high-quality video and audio streaming, voice text chats, server groups, and a focus on eSports. In our article, we’ll show discuss Guilded and compare it to the other chat...

What does the Guilded game chat app offer?
Client server model
How does the client server model work?
  • Know-how

How does the distribution of services and tasks work when clients and servers interact in a network? To answer this question, the client server model tends to be used. The underlying principle is that servers provide services that clients use. What exactly is behind it and what are the pros and cons of the model?

How does the client server model work?
Rack server
How do rack servers work?
  • Know-how

Scalability, fail safety and redundancy are essential when processing information. Space-saving, durable server technologies that offer plenty of capacity and simple configuration are essential for this. That’s why rack servers tend to be used frequently in data centers. Find out how rack servers work and what their pros and cons are.

How do rack servers work?
Blade server
How do blade servers work?
  • Know-how

Blade servers are among the smallest, most powerful server technologies. They are scalable, save space and are designed with high server density in mind. The strengths of blade servers include their dedicated use for highly specific applications and a low power consumption. Find out more about the pros and cons of blade servers and how they differ from rack servers.

How do blade servers work?
What is FIDO2?
What is FIDO2?
  • Security

Passwords are not an ideal way to surf the World Wide Web safely. They are either so complex that they are hard to remember, or so simple that they can be guessed in next to no time. FIDO2 takes a different approach and relies on modern technology. The open standard has the potential to make surfing the net safer and more convenient at the same time.

What is FIDO2?
What is a firewall?
What is a firewall?
  • Security

A firewall provides effective protection against viruses and other malware that attempts to infect your computer. However, it needs to be properly configured to do so. In the following article, you will learn how to do this, how a firewall works, and what its limitations are.

What is a firewall?
What is a demilitarized zone?
What is a DMZ (Demilitarized zone) in Network Security?
  • Security

Companies hosting their own websites, an online shop, or e-mail inboxes should make sure to separate the corresponding server of these from the local network. This makes it possible to protect devices within the company network from hacker attacks that take place on public networks. Solid protection comes in the form of a demilitarized zone, which separates endangered systems from sensitive...

What is a DMZ (Demilitarized zone) in Network Security?
TLS (Transport Layer Security)
What is TLS (Transport Layer Security)?
  • Security

Internet security measures have become indispensable these days. Encryption is essential to ensure that unauthorized third parties do not gain access to data or are able to manipulate it. That’s what TLS or Transport Layer Security is for. Here’s what you need to know about this integral element of the modern Internet.

What is TLS (Transport Layer Security)?
Social engineering – the security gap at ‘layer 8’
What is Social engineering?
  • Security

The most effective system break-ins often happen without a scene. Instead of disrupting central network devices with DDoS attacks or sneaking through onto operating systems with Trojan horse techniques, hackers increasingly try to exploit the human security gap. There are various such methods that fall within the broader category of social engineering: a technique that sees hackers gather publicly...

What is Social engineering?