UDP: What is the User Datagram Protocol?

The Internet protocol family – the cornerstone for communication on the Internet – has around 500 members who work on a wide variety of layers. For example, the connectionless User Datagram Protocol (UDP) is responsible on the transport layer for the transmission of packets that were previously addressed via the Internet Protocol (IP). In this guide, you can find out exactly what distinguishes...

The best Android cloud apps – securing your smartphone data

As Android smartphone users will know, a complete backup of the operating system can only be created with the internal backup function that leaves a lot to be desired. The solution? Using a cloud storage solution like Google Drive. However, if you don’t feel comfortable handing all your data over to Google, you will have to search for another online Android storage option to back-up your personal...

VPN service providers compared

A virtual private network (VPN) hides internet users in the network, and protects them from targeted attacks. With the help of VPN services, barriers between countries via geo-blocking can also be overcome. There are now numerous VPN providers based in very different countries. Some offer particularly stable servers, although all of them have their own strengths.

OAuth & OAuth 2: data usage across platforms

The “pathway to hell” – this is how Eran Hammer-Lahav once called the security protocol OAuth 2.0, on which he himself had worked for years. Others, however, use the service without issue. It enables users to use data and functions across multiple platforms in multiple services – for example, with the convenient single sign-on – using secure API authorization. But how exactly does OAuth2 work and...

Single sign-on – one-time registration for everything, please!

Online activity could be so simple – just enter your access data once and automatically be logged in for all accounts and services on the web, instead of having to remember dozens of passwords. This is, in fact, a reality for many websites, and the process is called SSO – single sign-on – and is becoming ever more popular among private and professional users. But what are the benefits of SSO, and...

Elasticsearch: the flexible search engine

If you work with large amounts of data, you’ll need a powerful search engine. Elasticsearch offers you a full-text search that you can configure so that it is perfectly tailored to your needs. But first you have to understand the principle behind it – what is Elasticsearch?. In this Elasticsearch tutorial we’ll explain the first steps in using the search engine, from installation to creating a...

Solr: the powerful search platform from Apache

What exactly is Solr? The answer to this question lies in our article. In combination with the Java library, Lucene, Solr can be used to build powerful web search engines. Do you need to index your documents? Solr will take care of this. First, we explain the basic terms of practical open source software and its functions. In our Solr tutorial, we’ll explain how to set up the search platform. In...

Apache Lucene: free search for your website

Who wouldn’t want to build their own search engine that’s adapted precisely to their requirements? Apache Lucene makes this possible. The open source project can be precisely adjusted and also works extremely quickly, which is why even large companies such as Twitter rely on Lucene. In our Lucene tutorial, we show you how to use the full-featured text search. But first the question: What is...

The public cloud – more computing for everyone!

Cloud computing is an important aspect of digitization. An offshoot of this technology is the public cloud, which provides storage space and IT services publicly on the internet. Data protectors see certain dangerous weaknesses in this concept, but public access offers enormous potential, and data protection concerns are increasingly stimulating innovative solutions. We explain what lies behind...

What is a private cloud? More control and security for your business

Should data and processes be handled in a private or public cloud? If a company wants to use cloud computing, they first need to choose one of the many providers available. Using the personalized services offered by a private cloud, companies can address a wide range of business related and operational challenges. Separating operations also makes a private cloud more secure than a public cloud.

Server

1&1 IONOS Server Guide: professional tips on configuration and administration

Servers are what make up the physical basis of the internet. Setting up your own professional site, putting products online for sale, or connecting multiple company locations with one another: all of these tasks require the support of high-performance computers. And it doesn’t matter if you purchase hardware resources for your own data center or opt for the flexibility of cloud services: operating a server comes with the challenge of independently configuring and administering hardware components. But don’t worry, there’s a lot of support out there for these tasks. In the Server Guide of 1&1 IONOS’s Digital Guide series, you’ll find regular articles, news, and tutorials on how to operate this indispensable component of today’s IT infrastructure.

Server information for businesses, developers, and tech hobbyists

Packed with practical tips, our guide covers a wide spectrum of topics primarily aimed at mid-sized companies, freelance developers, and tech hobbyists. While some articles, like ‘What is a server?’ or ‘DNS – name resolution online’ cater more to beginners, experts are by no means left hanging; there’s a wide range of detailed texts and tutorials on important tasks like choosing the best operating system, filling security gaps, or getting the best possible performance out of your software and hardware.

What you can expect in the 1&1 IONOS Server Guide

If you take a look, you’ll notice our guide is divided into four different subcategories, each covering a different topic. The ‘KnowHow’ area sets out to familiarize beginners with the basics of operating a server. Details on different server types and how to use them are also laid out here. Tips and tricks on managing server software is found under the keyword, ‘Configuration’. The category, ‘Security’ is all about dealing with potential problems server operators may encounter from online threats. Conventional methods of attack, like viruses, worms, and Trojans, and what you can do to combat them are explained here. And the category, ‘Tools’, provides useful guidance on what resources can help make administering your server a more manageable task.