DNSSEC: internet standards for authenticated name resolution

Without the Domain Name System, users of the World Wide Web would have serious problems when trying to load websites and other online presences. It’s only thanks to this system that internet addresses appear in their trusted text format: they’re actually nothing more than combinations of numbers. The communication between browser and name server responsible for this isn’t actually as secure as you...

What’s the OSI model?

Those working with network technology are bound to encounter the ISO-OSI model sooner or later. This system subdivides communication between computer systems into seven different layers. Each of these layers is assigned a certain task. With the help of this layer model, subareas of abstract processes are able to be descriptively explained.

Managed cloud hosting: flexible server structures at the click of a button

More and more website operators are turning to managed cloud hosting as a solution for their server environment. This option promises flexible scalability of required resources in real time, along with a wide range of services offered by the provider including the installation, maintenance, and protection of the hosting platform. So how does managed cloud hosting work? Find out what services...

Resource-oriented web services based on REST

Combining different application systems has become increasingly important over the past few years. This trend is especially due to the increasing number of web applications being developed. In order to react to this trend, many different web services were developed that make data transfer across multiple systems possible. The Representational State Transfer (REST) is an architectural style that...

Server operating systems: history and today’s situation

Operating systems have gone through some major changes over the years. While their beginnings are rooted in more humble, purely text-based user interfaces, today’s options have evolved into complex software packages with graphical interfaces, comprising an elegant go-between for hardware and software applications. Users, who have long since been equipped with a keyboard and mouse, are able to...

VPN — secure data transfer through public networks

VPN implementations offer an affordable alternative for locally connecting networks, as well as making network resources available for external devices. In contrast to corporate networks, no private communication network is required. Instead, like the internet, VPNs rely on networks, and protect sensitive data through a process known as tunneling.

What is a web server? And which web server software is there?

The equation is simple - without it, there’s simply no web content: when a web server is out of order, then it’s no longer possible to call up any websites that are connected to it. Web servers are what allow online presences to reach the internet in the first place. But just how do these systems work? Which functions do the programs responsible for this task offer? And what’s an example of a good...

Web stack—the software framework for web development

Terms like web stack or web application stack refer to software packages that are used to develop and operate websites and web applications. The most well-known example of this technology, the LAMP stack, has witnessed increasing competition through the likes of JavaScript-based framework bundles, which feature unified programming languages for servers and clients. This gives them a considerable...

Network attached storage (NAS): the basics of network storage

Growing sums of data require cost-effective, high-performance storage solutions. One option for fulfilling this requirement is a network attached storage. In business contexts, this model has already established itself as a viable alternative to file servers, hard drives, and the cloud. Private users have also caught on and use NAS systems at home. But what is a NAS? Read on, and we’ll show you...

Secure network connections with IPsec

A big problem with the previous Internet Protocol version, IPv4, was the missing guarantee of security standards of integrity, authenticity, and confidentiality. This previous protocol lacked the necessary means to identify data sources or enable secure transport. The protocol suite IPsec, developed for IPv4’s successor, IPv6, has changed the situation for Internet Protocol overnight.