Windows CMD commands

CMD commands for the Windows command prompt

There are more than 200 CMD commands available with Windows. The command prompt can be used to control large parts of the operating system, computer, or drives. You can also use the Windows “command prompt” commands to organize your files or run network tasks. To do this, though, you have to know the right commands. Here we explain how to use CMD commands and which functions they have. Our article...

.jar file

.jar file ending: how to open and use a .jar file

File formats like .jpg, .mp3 or .gif are well-known and can usually be opened on most devices without any problems. But the .jar ending is less common. These files require special programs to run them. We explain what this file format is and how you can open and run .jar files.

Kata Containers

Kata Containers: basics, function, and applications

A Linux container is either secure or flexible and simple. At least this used to be the case for a long time until the open-source project Kata Containers emerged and combined the best from both container technology and virtual machines. How did the open-source community behind the OpenStack Foundation (OSF) pull this off?

Banana Pi: useful applications and ideas for projects

10 Banana Pi projects that make the most of this mini-computer

The Banana Pi isn’t big, but the single-board computer can be successfully used for a variety of applications. For example, this versatile competitor of Raspberry Pi can be used as a cloud, VPN or file server as well as a smart home controller or a router. We will show you ten Banana Pi projects which demonstrate the remarkable potential of the compact miniature computer.

Docker Tools | The container platform eco system

The Docker ecosystem: the best Docker tools at a glance

Docker significantly simplified the use of software containers with its efforts at standardization. The lean container platform is part of a steadily increasing ecosystem that provides users a wide range of application options in the realm of software deployments, orchestration of containers, and multi-container applications, as well as continuous integration (CI) and continuous delivery (CD). In...

SFTP (SSH File Transfer Protocol)

SFTP: The secure way to transfer data

Using SSH File Transfer Protocol (SFTP), you can transfer data bidirectionally within an authorized group of people in a particularly secure way. The transfer between the client and server takes place via an encrypted IP-based data tunnel. The basic File Transfer Protocol (FTP) has major security vulnerabilities, which were eliminated in the refined SSH File Transfer Protocol.


csrss.exe: What’s behind the Client Server Runtime Process

What is csrss.exe? If you inspect the processes currently running on your Windows system, you’ll inevitably come across the csrss.exe process. Your system can’t run without it because it’s responsible for important tasks such as launching processes. If you suspect that the file might be a virus, it’s a good idea to inspect whether it’s the genuine csrss.exe file. But can you spot the difference?

ECC RAM: memory solution for secure data

ECC RAM – the error-correcting code memory

Memory is one of the most important components of a computer system and is particularly important for processing large amounts of data. In addition to increasing the storage capacity, it is also necessary to guarantee the security of the data. Bit errors, for example, are one of the key foes that ECC RAM is battling against to protect the main memory. To date these error-correcting memory modules...

Server Message Block (SMB)

SMB (Server Message Block): definitions, tasks, and applications

Sending data between computer systems usually takes users a matter of seconds. But for the devices involved to “talk” to each other, it requires clear communication standards to be in place. These standards are defined by protocols like Server Message Block (SMB). Find out in the following article what the Microsoft protocol does and how it has changed over the years.


svchost.exe: the service host in Windows operating system tests

The svchost.exe process is typically displayed multiple times when you open Windows Task Manager. That's because it’s a system program that’s needed for running other applications. However, if svchost.exe creates problems, for example, by using too many system resources, it’s good to know how to determine the possible causes.

Wait! We’ve got something for you!
Have a look at our great prices for different domain extensions.

Enter the web address of your choice in the search bar to check its availability.
$1/1st year
then $20/year
$1/1st year
then $15/year
$1/1st year
then $20/year
$1/1st year
then $20/year