When the RAID concept was first introduced in the late 1980s, it was primarily intended as an alternative to high cost hard drives on mainframes. While the issue of cost has shifted somewhat into the background, RAID storage systems are still in demand because of their high reliability in a server environment. What’s behind the technology and what are the various RAID levels?What is RAID (Redundant Array of Independent Disks)?
In this set of scenarios we will explore the difference between MongoDB sharding and replication, and explain when each is the most appropriate solution. Both replication and sharding are forms of horizontal scaling to create a high availability (HA) setup.MongoDB: Sharding vs Replication
Numerous companies and nonprofit organizations offer web search services beyond the Google algorithm. The competition is usually stuck with an outsider status when it comes to their alternatives to Google but they also present interesting approaches and innovative business models that don’t necessarily rely on the advertising industry. The trend toward anonymous web searches is also starting to...Google alternatives at a glance
The search for the perfect software to meet your requirements of design and functionality for e-commerce can be a long and tedious affair. Some platforms just don’t quite give you the design you’re after, while others might look great but lack important shop functions like flexible payment methods, legal certainty, or optimization for mobile devices. PrestaShop was developed especially for...PrestaShop: the shop platform with HQ in Europe and Miami
ModSecurity is a free web application firewall (WAF) which is a simple, powerful way to protect a server against web-based malware and hacking attempts. Learn how to install ModSecurity and the officially-recommended OWASP Core Rule Set (CRS) which will protect a server against malware and hacking in the form of SQL injection, session hijacking, cross-site scripting, Trojans, and many other forms...Use the ModSecurity Apache Module on a Cloud Server with Ubuntu 16.04
Learn how to password protect a directory using Apache's basic HTTP authentication. This method will allow you to set up a restricted area of your website which will require a username and password for access.Password Protect a Directory with Apache
When a website is visited, the server generates a session ID and assigns it to the user. This session ID is temporarily created by the server and assigned to the user for a during their active session to identify the user and their data exchanges throughout the session.What is a session ID?
On March 6, Microsoft pointed out vulnerabilities in the Microsoft Exchange software. IONOS had already learned of the vulnerability on March 3 and immediately applied updates provided by Microsoft to all Exchange systems it operated itself in order to eliminate the vulnerabilities. IONOS systems were not affected by the attack wave.Reaction to Microsoft Exchange zero-day attack
Learn how to change your WordPress username and password. With this guide we will show you how to easily change your WordPress username and/or password.How to Change Your WordPress Username and Password
Before a website goes live, website operators should have a legal notice in place, also called an “Impressum”. Most internet pages also require a provider identification. Depending on the industry and the contents of the website, special information must be provided. Otherwise, warnings and fines may be issued.Impressum law: What you need to know about special website credits