Server Message Block (SMB)
SMB (Server Message Block): definitions, tasks, and applications
  • Know-how

Sending data between computer systems usually takes users a matter of seconds. But for the devices involved to “talk” to each other, it requires clear communication standards to be in place. These standards are defined by protocols like Server Message Block (SMB). Find out in the following article what the Microsoft protocol does and how it has changed over the years.

SMB (Server Message Block): definitions, tasks, and applications
svchost.exe
svchost.exe: the service host in Windows operating system tests
  • Know-how

The svchost.exe process is typically displayed multiple times when you open Windows Task Manager. That's because it’s a system program that’s needed for running other applications. However, if svchost.exe creates problems, for example, by using too many system resources, it’s good to know how to determine the possible causes.

svchost.exe: the service host in Windows operating system tests
What is DoS (denial of service)?
Denial of service: what happens during a DoS attack?
  • Know-how

Denial of service attacks – also called DoS attacks – are a relatively simple and effective method for cyber criminals to bring down a website, email traffic, or an entire network. Besides businesses, institutions such as the German parliament or Wikipedia have been victims of these types of attacks. This has raised the question: What exactly is denial of service, and what happens during an...

Denial of service: what happens during a DoS attack?
.exe File
What is .exe?
  • Know-how

We regularly encounter the file extension .exe when using our computers. Normally we always use these types of files if we would like to launch a program. But what are .exe files and how are they used? We show you how you can securely open .exe files on Windows and Mac operating systems.

What is .exe?
PPPoE – Point-to-Point Protocol
PPPoE: DNS protocol
  • Know-how

How exactly do you access the internet? Those who have a DSL contract, for example, first have to contact their internet provider’s node each time they connect. The provider checks the access authorization and establishes the connection to the internet. The so-called “Point-to-Point Protocol over Ethernet” (PPPoE) is used for this purpose. But how exactly does this protocol work?

PPPoE: DNS protocol
UEFI - Unified Extensible Firmware Interface
UEFI: a powerful interface for booting computers
  • Know-how

New computers using Windows 10 today usually boot with a special interface. The Unified Extensible Firmware Interface (UEFI) provides new functions and options for administrators and users. To better understand and get the most out of this advanced boot technology, you will need to become familiar with the basics of UEFI.

UEFI: a powerful interface for booting computers
NNTP - Network News Transfer Protocol
NNTP: What is the Network News Transfer Protocol?
  • Know-how

As a global computer network, the Internet provides the perfect foundation for gathering and distributing information. The World Wide Web, the most well-known Internet service, convincingly proves this fact. The older Usenet benefits from the Internet’s global network as well. In order to be able to transfer data, it relies on the unique NNTP, which is the focus of this article.

NNTP: What is the Network News Transfer Protocol?
What is CAP theorem?
CAP theorem: consistency, availability, and partition tolerance
  • Know-how

The CAP theorem states that distributed systems can only guarantee two out of the following three points at the same time: consistency, availability, and partition tolerance. In this article, we will explain where the CAP theorem originated and how it is defined. We will then provide some concrete examples which prove the validity of Brewer’s theorem, as it is also called.

CAP theorem: consistency, availability, and partition tolerance
CRC error
CRC errors: explanation, causes, and possible solutions
  • Know-how

Cyclic redundancy checking (CRC) plays a crucial role in ensuring that the transmission and storage of files happen smoothly. If, however, this process encounters problems, the results can be horrendous, especially when trying to extract and retrieve important data. In this article, you will learn what causes a CRC error, what a CRC error is, and how best to fix it.

CRC errors: explanation, causes, and possible solutions
What is LXC (Linux Containers)?
LXC: features, pros, and cons of Linux Containers
  • Know-how

Container technology has shaken up classic application virtualization. It promises more flexibility, higher scalability and an overall carefree package with regard to user friendliness. However, before you decide to use Linux Containers (LXC), you should become more familiar with its features, pros, and cons, different uses as well as the defined limits of this technology.

LXC: features, pros, and cons of Linux Containers