Memory is one of the most important components of a computer system and is particularly important for processing large amounts of data. In addition to increasing the storage capacity, it is also necessary to guarantee the security of the data. Bit errors, for example, are one of the key foes that ECC RAM is battling against to protect the main memory. To date these error-correcting memory modules...
Sending data between computer systems usually takes users a matter of seconds. But for the devices involved to “talk” to each other, it requires clear communication standards to be in place. These standards are defined by protocols like Server Message Block (SMB). Find out in the following article what the Microsoft protocol does and how it has changed over the years.
The svchost.exe process is typically displayed multiple times when you open Windows Task Manager. That's because it’s a system program that’s needed for running other applications. However, if svchost.exe creates problems, for example, by using too many system resources, it’s good to know how to determine the possible causes.
While you’re working on your computer, the background lighting in your environment will vary. To protect your eyes and prevent headaches, you should adapt the screen brightness to these changing conditions. The brightness settings on laptops are different from those on a PC with a separate monitor, but don’t worry – we’re here to take you through the various options step by step.
Google, Amazon, Facebook, Alibaba, Tencent: Data infrastructure is dominated by a few large corporations, none of which come from Europe. GAIA-X aims to change that. German politicians, businesspeople, and researchers hope the project will strengthen the development of European digital projects, and increase the importance of transparency, data protection, and cloud independence.
Denial of service attacks – also called DoS attacks – are a relatively simple and effective method for cyber criminals to bring down a website, email traffic, or an entire network. Besides businesses, institutions such as the German parliament or Wikipedia have been victims of these types of attacks. This has raised the question: What exactly is denial of service, and what happens during an...
If you want to secure your digital data with the best possible protection, there is no getting around the issue of encryption. For example, asymmetric cryptography plays an essential role in secure data transfer. Here, you will learn how it works, how it is different from traditional symmetric encryption, and where it is used.
UDP flood attacks have been used in the past for denial-of-service attacks. Even servers for major organizations have collapsed under the massive amounts of data. We’ll explain how a UDP flood attack works and provide you with an overview of its technical background, proven security measures, and how it is different from other DoS attacks.
DDoS attacks are occurring more and more frequently. Among the most insidious are HTTP flood attacks. Disguised as regular users on the website, thousands of complex requests are sent to the server until a system failure occurs. Here you will learn what exactly an HTTP flood attack is, how you can identify them, and how you can protect yourself from them.
The ping flood is a type of denial-of-service attack that can affect commercial providers and home users alike. This attack relies on the ICMP protocol and the ping command. In order to unleash a particularly powerful flood, attackers often use a network of bots. Learn how the ping flood works and how you can protect yourself from one.
IONOS Server Guide: professional tips on configuration and administration
Servers are what make up the physical basis of the internet. Setting up your own professional site, putting products online for sale, or connecting multiple company locations with one another: all of these tasks require the support of high-performance computers. And it doesn’t matter if you purchase hardware resources for your own data center or opt for the flexibility of cloud services: operating a server comes with the challenge of independently configuring and administering hardware components. But don’t worry, there’s a lot of support out there for these tasks. In the Server Guide of IONOS’s Digital Guide series, you’ll find regular articles, news, and tutorials on how to operate this indispensable component of today’s IT infrastructure.
Server information for businesses, developers, and tech hobbyists
Packed with practical tips, our guide covers a wide spectrum of topics primarily aimed at mid-sized companies, freelance developers, and tech hobbyists. While some articles, like ‘What is a server?’ or ‘DNS – name resolution online’ cater more to beginners, experts are by no means left hanging; there’s a wide range of detailed texts and tutorials on important tasks like choosing the best operating system, filling security gaps, or getting the best possible performance out of your software and hardware.
What you can expect in the IONOS Server Guide
If you take a look, you’ll notice our guide is divided into four different subcategories, each covering a different topic. The ‘KnowHow’ area sets out to familiarize beginners with the basics of operating a server. Details on different server types and how to use them are also laid out here. Tips and tricks on managing server software is found under the keyword, ‘Configuration’. The category, ‘Security’ is all about dealing with potential problems server operators may encounter from online threats. Conventional methods of attack, like viruses, worms, and Trojans, and what you can do to combat them are explained here. And the category, ‘Tools’, provides useful guidance on what resources can help make administering your server a more manageable task.