DoS and DDoS: attack patterns at a glance
DDoS attacks
  • Know-how

It is very important for a server service to always be available since this is directly related to an online company’s success. Many servers are susceptible to DoS and DDoS attacks, which cause overloads and trigger costly crashes. But which patterns do these attacks follow and which counter measures can be put into place in order to protect critical systems from being targeted?

DDoS attacks
Domain Name System
Domain Name System (DNS)
  • Know-how

The Domain Name System, or DNS for short, plays an important role when surfing the web because it is used to translate domain names into server IP addresses. We explain what DNS is and show you exactly how the system works and which servers are used. We also explain the risks associated with DNS so that you’re well aware.

Domain Name System (DNS)
Docker Tools | The container platform eco system
The best Docker tools
  • Know-how

Docker significantly simplified the use of software containers with its efforts at standardization. The lean container platform is part of a steadily increasing ecosystem that provides users a wide range of application options in the realm of software deployments, orchestration of containers, and multi-container applications, as well as continuous integration (CI) and continuous delivery (CD). In...

The best Docker tools
Docker container
Docker container
  • Know-how

Application virtualization with Docker containers is very popular. However, the subject may seem difficult to grasp at first because of all the concepts involved. The relationship between a Docker image and a Docker container often seems particularly confusing. In this article, we will explain what Docker containers are all about. We will go into detail about their structure, creation, and use.

Docker container
Docker commands
Docker commands
  • Know-how

Docker commands are used to control the Docker engine on a local host. When entered via the command line, they are translated into API calls to the Docker daemon. Docker commands can be used to manage images, containers, and volumes. If you tend to work with the software regularly, it is worth knowing a wide range of Docker commands.

Docker commands
DNSSEC: internet standards for authenticated name resolution
DNSSEC
  • Know-how

Without the Domain Name System, users of the World Wide Web would have serious problems when trying to load websites and other online presences. It’s only thanks to this system that internet addresses appear in their trusted text format: they’re actually nothing more than combinations of numbers. The communication between browser and name server responsible for this isn’t actually as secure as you...

DNSSEC
DNS leak
DNS leak
  • Know-how

Are you concerned about maintaining your privacy and use a VPN when surfing? Great – but this can make you uniquely vulnerable, too. We will show you the dangers posed by DNS leaks and explain how you can effectively protect yourself against them. In the process, we also look at DNS leak testers.

DNS leak
Differential backup
What is a Differential Backup?
  • Know-how

What is a differential backup? Explore a definition of differential backups, their features and advantages as part of our series on backup methods and strategies. With differential backups only the changes since the last full backup are stored. This saves time and storage space. We explain how differential backups work and when they should be used.

What is a Differential Backup?
Dedicated IP
Dedicated IP
  • Know-how

For many years, dedicated IPs were an important component within hosting and mailing. To this day, you can choose a dedicated IP address for your project from a wide variety of services. But is a dedicated IP really a better solution than a shared address? We’ll show you what you need to know about the two IP types and dispel common myths.

Dedicated IP
Data reduction through deduplication and compression
Deduplication vs. Compression for data reduction
  • Know-how

With the mass of data constantly increasing, ever more efficient storage techniques are required to reduce storage requirements with as few losses as possible. For this purpose, there are two compression techniques that are currently in use. While data compression identifies and eliminates redundant information within a file, deduplication is a cross-file method that is particularly suited to...

Deduplication vs. Compression for data reduction