Bluetooth

Bluetooth: everything you need to know about the popular wireless standard

“Does it have Bluetooth?” This is a question you hear all the time in electronics stores, which is completely understandable, since this small, blue runic symbol has been a defining marker in our digital lives for quite some time, longer than most other wireless technologies. Even conventional kitchen appliances and motorcycle helmets all come with Bluetooth chips. You will find everything you...

What is Cloud Storage?

Cloud Storage: How does data storage in the cloud work?

Portable storage media such as CDs or USB sticks are still in demand when making backups or transferring files to another device. More and more often however, users also rely on cloud storage solutions that allow data to be outsourced to an external server environment. But what exactly is cloud storage? And how does this storage model offered by various providers work?

Private Cloud

What is a private cloud? More control and security for your business

Should data and processes be handled in a private or public cloud? If a company wants to use cloud computing, they first need to choose one of the many providers available. Using the personalized services offered by a private cloud, companies can address a wide range of business related and operational challenges. Separating operations also makes a private cloud more secure than a public cloud.

Public Cloud

The public cloud – more computing for everyone!

Cloud computing is an important aspect of digitization. An offshoot of this technology is the public cloud, which provides storage space and IT services publicly on the internet. Data protectors see certain dangerous weaknesses in this concept, but public access offers enormous potential, and data protection concerns are increasingly stimulating innovative solutions. We explain what lies behind...

VLAN basics

VLAN : What is a virtual local area network?

A VLAN offers you the chance of quickly creating a more orderly and cost-effective large company network. Administrators know how difficult it is to change the entire network installation due to changes in the corporate structure. A virtual LAN allows you to avoid these problems and to easily configure everything through software.

Unicast

Unicast: Targeted connection between two points

Do you want your data to reach just one recipient? Then send a unicast. Whether it is IPv4 or IPv6, unicasts find the right target. Accessing websites, sending e-mails, file transfers all use this form of addressing. But what is technically behind it, and how do unicast and multicast differ?

What is an IP address?

IP addresses: Everything you need to know

Without IP addresses, online communication wouldn’t work. After all, routers – the “post offices” of the internet – need a specific instruction on where to send a data packet. But the topic also has its drawbacks: what else are IP addresses used for, besides websites and emails? Employed as a tool by trackers and hackers, they’re increasingly attracting the attention of data protection advocates.

PostgreSQL

PostgreSQL: a closer look at the object-relational database management system

The PostgreSQL database management system, also known to many as Postgres, has many decades of development behind it. It originally started as a project at Berkeley University in California. Today, the open source database continues to defy solutions from commercial competitors, since the development team is constantly working on its functionality and performance. But what exactly is PostgreSQL?...

SAML

SAML: the XML framework for SSO at a glance

Simplifying log-in processes makes websites more user friendly, and also helps to increase the security of user data. One of the most popular solutions for implementing authentication processes is SAML (security assertion markup language). Through a variety of components such as special protocols and message formats, this XML-based framework helps to implement internal and cross-company log-on...

Man-in-the-middle attack: an overview of attack patterns

Man-in-the-middle attack: attack patterns and countermeasures

A man-in-the-middle attack is a deceitful espionage attack which aims to listen, record, or manipulate sensitive data being sent between unsuspecting internet users. To do this, hackers rely on methods that enable them to position themselves, unnoticed, between two or more computers communicating with one another. We introduce you to some well-known attack patterns and countermeasures that can be...

Server

1&1 IONOS Server Guide: professional tips on configuration and administration

Servers are what make up the physical basis of the internet. Setting up your own professional site, putting products online for sale, or connecting multiple company locations with one another: all of these tasks require the support of high-performance computers. And it doesn’t matter if you purchase hardware resources for your own data center or opt for the flexibility of cloud services: operating a server comes with the challenge of independently configuring and administering hardware components. But don’t worry, there’s a lot of support out there for these tasks. In the Server Guide of 1&1 IONOS’s Digital Guide series, you’ll find regular articles, news, and tutorials on how to operate this indispensable component of today’s IT infrastructure.

Server information for businesses, developers, and tech hobbyists

Packed with practical tips, our guide covers a wide spectrum of topics primarily aimed at mid-sized companies, freelance developers, and tech hobbyists. While some articles, like ‘What is a server?’ or ‘DNS – name resolution online’ cater more to beginners, experts are by no means left hanging; there’s a wide range of detailed texts and tutorials on important tasks like choosing the best operating system, filling security gaps, or getting the best possible performance out of your software and hardware.

What you can expect in the 1&1 IONOS Server Guide

If you take a look, you’ll notice our guide is divided into four different subcategories, each covering a different topic. The ‘KnowHow’ area sets out to familiarize beginners with the basics of operating a server. Details on different server types and how to use them are also laid out here. Tips and tricks on managing server software is found under the keyword, ‘Configuration’. The category, ‘Security’ is all about dealing with potential problems server operators may encounter from online threats. Conventional methods of attack, like viruses, worms, and Trojans, and what you can do to combat them are explained here. And the category, ‘Tools’, provides useful guidance on what resources can help make administering your server a more manageable task.


Get your own .US domain now, the first year is free!



Limited time offer*





Enter the web address of your choice in the search bar to check its availability.
* Offer valid for customers with a bona fide US presence. Promotion ends on August 31, 2019.