Raspberry Pi Plex
Raspberry Pi and Plex: how to turn a single-board computer into a media server
  • Configuration

Plex is among the most popular and user-friendly solutions for creating a media server in your home network. In contrast to many other applications, which are often Windows-only, the Plex server is compatible with Linux, Mac, and even single-board computers like the Raspberry Pi. In this Raspberry Pi and Plex tutorial, you will learn what technical requirements must be fulfilled and how...

Raspberry Pi and Plex: how to turn a single-board computer into a media server
Dynamic IP addresses
What is a dynamic IP address?
  • Know-how

Dynamic or static? This is a common question when it comes to allocating an IP address. While static IP addresses are mostly used for servers or peripheral devices such as printers and speakers, other devices such as laptops and computers will often have a dynamic IP. What is the difference and what benefits does a dynamic IP address offer? Read on to find out more.

What is a dynamic IP address?
Guilded
What does the Guilded game chat app offer?
  • Know-how

The game chat app Guilded is now considered just as popular as Discord within the gaming community. Guilded actually offers more benefits for chat servers and channels when compared with Discord, such as more free features, high-quality video and audio streaming, voice text chats, server groups, and a focus on eSports. In our article, we’ll show discuss Guilded and compare it to the other chat...

What does the Guilded game chat app offer?
Client server model
How does the client server model work?
  • Know-how

How does the distribution of services and tasks work when clients and servers interact in a network? To answer this question, the client server model tends to be used. The underlying principle is that servers provide services that clients use. What exactly is behind it and what are the pros and cons of the model?

How does the client server model work?
Rack server
How do rack servers work?
  • Know-how

Scalability, fail safety and redundancy are essential when processing information. Space-saving, durable server technologies that offer plenty of capacity and simple configuration are essential for this. That’s why rack servers tend to be used frequently in data centers. Find out how rack servers work and what their pros and cons are.

How do rack servers work?
Blade server
How do blade servers work?
  • Know-how

Blade servers are among the smallest, most powerful server technologies. They are scalable, save space and are designed with high server density in mind. The strengths of blade servers include their dedicated use for highly specific applications and a low power consumption. Find out more about the pros and cons of blade servers and how they differ from rack servers.

How do blade servers work?
What is FIDO2?
What is FIDO2?
  • Security

Passwords are not an ideal way to surf the World Wide Web safely. They are either so complex that they are hard to remember, or so simple that they can be guessed in next to no time. FIDO2 takes a different approach and relies on modern technology. The open standard has the potential to make surfing the net safer and more convenient at the same time.

What is FIDO2?
What is a firewall?
What is a firewall?
  • Security

A firewall provides effective protection against viruses and other malware that attempts to infect your computer. However, it needs to be properly configured to do so. In the following article, you will learn how to do this, how a firewall works, and what its limitations are.

What is a firewall?
What is a demilitarized zone?
What is a DMZ (Demilitarized zone) in Network Security?
  • Security

Companies hosting their own websites, an online shop, or e-mail inboxes should make sure to separate the corresponding server of these from the local network. This makes it possible to protect devices within the company network from hacker attacks that take place on public networks. Solid protection comes in the form of a demilitarized zone, which separates endangered systems from sensitive...

What is a DMZ (Demilitarized zone) in Network Security?
TLS (Transport Layer Security)
What is TLS (Transport Layer Security)?
  • Security

Internet security measures have become indispensable these days. Encryption is essential to ensure that unauthorized third parties do not gain access to data or are able to manipulate it. That’s what TLS or Transport Layer Security is for. Here’s what you need to know about this integral element of the modern Internet.

What is TLS (Transport Layer Security)?

Server

IONOS Server Guide: professional tips on configuration and administration

Servers are what make up the physical basis of the internet. Setting up your own professional site, putting products online for sale, or connecting multiple company locations with one another: all of these tasks require the support of high-performance computers. And it doesn’t matter if you purchase hardware resources for your own data center or opt for the flexibility of cloud services: operating a server comes with the challenge of independently configuring and administering hardware components. But don’t worry, there’s a lot of support out there for these tasks. In the Server Guide of IONOS’s Digital Guide series, you’ll find regular articles, news, and tutorials on how to operate this indispensable component of today’s IT infrastructure.

Server information for businesses, developers, and tech hobbyists

Packed with practical tips, our guide covers a wide spectrum of topics primarily aimed at mid-sized companies, freelance developers, and tech hobbyists. While some articles, like ‘What is a server?’ or ‘DNS – name resolution online’ cater more to beginners, experts are by no means left hanging; there’s a wide range of detailed texts and tutorials on important tasks like choosing the best operating system, filling security gaps, or getting the best possible performance out of your software and hardware.

What you can expect in the IONOS Server Guide

If you take a look, you’ll notice our guide is divided into four different subcategories, each covering a different topic. The ‘KnowHow’ area sets out to familiarize beginners with the basics of operating a server. Details on different server types and how to use them are also laid out here. Tips and tricks on managing server software is found under the keyword, ‘Configuration’. The category, ‘Security’ is all about dealing with potential problems server operators may encounter from online threats. Conventional methods of attack, like viruses, worms, and Trojans, and what you can do to combat them are explained here. And the category, ‘Tools’, provides useful guidance on what resources can help make administering your server a more manageable task.