What is an IP address?

IP addresses: Everything you need to know

Without IP addresses, online communication wouldn’t work. After all, routers – the “post offices” of the internet – need a specific instruction on where to send a data packet. But the topic also has its drawbacks: what else are IP addresses used for, besides websites and emails? Employed as a tool by trackers and hackers, they’re increasingly attracting the attention of data protection advocates.

PostgreSQL

PostgreSQL: a closer look at the object-relational database management system

The PostgreSQL database management system, also known to many as Postgres, has many decades of development behind it. It originally started as a project at Berkeley University in California. Today, the open source database continues to defy solutions from commercial competitors, since the development team is constantly working on its functionality and performance. But what exactly is PostgreSQL?...

Golang

Golang: the simple programming language from Google

Google is best known for its search engine, but also for services like AdWords, Maps, or Gmail. Since 2012, the mega-corporation has had its own programming language in its product range: Go. Also known under the name Golang, it has drawn attention to itself through its simplicity. But how does it differ from established representatives like C++ or JavaScript? And when does it make sense to...

RFID (radio frequency identification)

What is RFID?

RFID, technology to identify objects with the help of electromagnetic waves, is revolutionizing logistics processes and merchandise management systems. Concepts for automating production processes in the context of the future project Industry 4.0 also rely on RFID systems. We explain to you how radio frequency identification works and what fields of application there are.

Apache Hadoop: the framework for Big Data

Apache Hadoop: distributed storage architecture for data quantities

Are you looking to execute complicated computing processes with large amounts of data? This is exactly what the Big Data framework, Hadoop, focuses on. The open source Apache software offers a Java based frame with which various Big Data applications on computer clusters can be parallelized. Hadoop’s modular expandability, which offers users an enormous range of functions, is a particularly...

Multicast

Multicast: Point-to-multipoint connection for efficient data transfer

Bandwidth plays an important role when sending data over IP networks. This is especially true when packets are being sent to more than one recipient, which can result in overloads preventing the data from being sent problem-free. Therefore, IP multicast was developed early on to enable data to be sent simultaneously to multiple destination nodes.

Windows blue screen

Windows blue screen (BSOD): How to cure the error

The infamous blue screen of death usually shows up without any warning. It’s an important indicator of internal problems with hardware, software, or drivers. If Windows can no longer be run as a result of such a problem, then the forced shutdown takes place in the form of a blue screen containing an error message. This may cause unsaved files and documents to be lost. The most important thing with...

Windows PowerShell

Introduction to PowerShell – Tools for system administrators

For a long time, Windows users were left behind when it came to command interpreters because the command prompt did not allow full access to operating system internal components, and scripting also offered only limited possibilities. This should finally change thanks to Microsoft’s PowerShell. The cross-platform program not only does much better than cmd.exe, it also provides remote computer...

DoS and DDoS: attack patterns at a glance

DoS: attack patterns and countermeasures

It is very important for a server service to always be available since this is directly related to an online company’s success. Many servers are susceptible to DoS and DDoS attacks, which cause overloads and trigger costly crashes. But which patterns do these attacks follow and which counter measures can be put into place in order to protect critical systems from being targeted?

Trivial File Transfer Protocol

TFTP (Trivial File Transfer Protocol) – File Transfer Protocol made simple

The Trivial File Transfer Protocol (TFTP) is one of the oldest and simplest network protocols. It allows two systems to exchange files on the local area network without having to establish a connection beforehand. To do this, TFTP uses the connectionless transport protocol UDP, which serves as an alternative to the more common yet more complex TCP. What other features set the TFTP protocol apart,...


Wait! We’ve got something for you!
Have a look at our great prices for different domain extensions.


Enter the web address of your choice in the search bar to check its availability.
.club
$1/1st year
then $15/year
.com
$1/1st year
then $15/year
.info
$1/1st year
then $20/year
.me
$1/1st year
then $20/year