What is a plug-in?
What is a plug-in and what is it used for?
  • Know-how

Plug-ins have many advantages. For example, these small add-ons are the simplest solution if you want to play Flash videos on your website, display PDF files in your browser or spice up your e-mail application with new features. Plug-ins allow you to add practical features to almost any software. However, these useful little add-ons also present some risks.

What is a plug-in and what is it used for?
The best Raspberry Pi operating systems: A brief portrait
Raspberry Pi: 10 operating systems for the minicomputer
  • Know-how

The single-board computer Raspberry Pi has enjoyed high popularity since its release in 2012. With the increasing number of possible applications, the minicomputer has become an interesting and practical solution for various branches of industry. As a result, more and more operating systems for the British computer are being introduced to the market. Choosing the appropriate Raspberry Pi...

Raspberry Pi: 10 operating systems for the minicomputer
What is a network?
What is a network? Definition, explanation, and examples
  • Know-how

What is a network? Simply put, one of the most fundamental achievements in IT. Nowadays, most of us can no longer imagine a world without Wi-Fi, cell phones or the Internet. But how exactly do these computer networks work? And what does setting up a network involve? In this article, we’ll explain the most important principles of networks.

What is a network? Definition, explanation, and examples
What is Storage Spaces Direct (S2D)?
What is Storage Spaces Direct (S2D)?
  • Know-how

Storage Spaces Direct (S2D) is a feature of Windows Server 2016 that allows you to group together the local storage devices of multiple servers into a virtual cluster. The users in the network access this cluster like a single shared drive. In addition, the Failover Clustering feature ensures that the entire system is extremely failsafe.

What is Storage Spaces Direct (S2D)?
Windows CMD commands
CMD commands for the Windows command prompt
  • Know-how

There are more than 200 CMD commands available with Windows. The command prompt can be used to control large parts of the operating system, computer, or drives. You can also use the Windows “command prompt” commands to organize your files or run network tasks. To do this, though, you have to know the right commands. Here we explain how to use CMD commands and which functions they have. Our article...

CMD commands for the Windows command prompt
.jar file
.jar file ending: how to open and use a .jar file
  • Know-how

File formats like .jpg, .mp3 or .gif are well-known and can usually be opened on most devices without any problems. But the .jar ending is less common. These files require special programs to run them. We explain what this file format is and how you can open and run .jar files.

.jar file ending: how to open and use a .jar file
Kata Containers
Kata Containers: basics, function, and applications
  • Know-how

A Linux container is either secure or flexible and simple. At least this used to be the case for a long time until the open-source project Kata Containers emerged and combined the best from both container technology and virtual machines. How did the open-source community behind the OpenStack Foundation (OSF) pull this off?

Kata Containers: basics, function, and applications
Docker Tools | The container platform eco system
The Docker ecosystem: the best Docker tools at a glance
  • Know-how

Docker significantly simplified the use of software containers with its efforts at standardization. The lean container platform is part of a steadily increasing ecosystem that provides users a wide range of application options in the realm of software deployments, orchestration of containers, and multi-container applications, as well as continuous integration (CI) and continuous delivery (CD). In...

The Docker ecosystem: the best Docker tools at a glance
SFTP (SSH File Transfer Protocol)
SFTP: The secure way to transfer data
  • Know-how

Using SSH File Transfer Protocol (SFTP), you can transfer data bidirectionally within an authorized group of people in a particularly secure way. The transfer between the client and server takes place via an encrypted IP-based data tunnel. The basic File Transfer Protocol (FTP) has major security vulnerabilities, which were eliminated in the refined SSH File Transfer Protocol.

SFTP: The secure way to transfer data
csrss.exe
csrss.exe: What’s behind the Client Server Runtime Process
  • Know-how

What is csrss.exe? If you inspect the processes currently running on your Windows system, you’ll inevitably come across the csrss.exe process. Your system can’t run without it because it’s responsible for important tasks such as launching processes. If you suspect that the file might be a virus, it’s a good idea to inspect whether it’s the genuine csrss.exe file. But can you spot the difference?

csrss.exe: What’s behind the Client Server Runtime Process