Encyclopedia

REST: the HTTP solution for web services

Resource-oriented web services based on REST

Combining different application systems has become increasingly important over the past few years. This trend is especially due to the increasing number of web applications being developed. In order to react to this trend, many different web services were developed that make data transfer across multiple systems possible. The Representational State Transfer (REST) is an architectural style that...

URL: What is a Uniform Resource Locator?

URL: definition and areas of application

The Uniform Resource Locator (short: URL) is one of the basic standard tools of the internet. URLs make it easy to uniquely identify resources on the internet and find their location. Internet users use webpage URLs to surf the web, follow hyperlinks or download files. The concept is based on a human tangible syntax that is automatically read out and interpreted by machines.

SCTP

SCTP (Stream Control Transmission Protocol) – the reliable, message-oriented transport protocol

If two computer systems are to exchange data, they must agree on a common protocol basis. For example, the selected transport protocol determines how the information is to be transferred. One of the more recent representatives of this protocol division is the Stream Control Transmission Protocol (SCTP), which the IETF (Internet Engineering Task Force) published in 2000 as an alternative to known...

What is a rootkit?

What you need to know about rootkits

If you ask the IT community which malware is the most harmful, the answer is typically not viruses, worms or Trojan horses. Experts unanimously agree that rootkits pose much greater problems even to experienced users. The rootkit’s special ability is to conceal other malware and thereby enable cybercriminals to misuse others’ computers for their own criminal activities undetected – such as for bot...

Cryptocurrency

Cryptocurrencies: What’s behind these digital currency systems?

Ever since the unparalleled Bitcoin boom in 2017, which was to be followed by a no less spectacular drop, cryptocurrencies have been both an exciting and controversial topic. The billions of dollars traded by speculators on bitcoins and alternatives such as Ethereum are often not even considered in the providers’ plans – revealing a glimpse of the foundations of cryptocurrencies.

Python logging

The Python logging module: How to locate script errors

Python logging is a module in the Python library. Since it is integrated into the source code, developers can use several commands to carry out Python logging to file, i.e. create a log file and send notes to this file that are logged when an application runs. Python logging can be used, for example, for code debugging or error communication.

RFID (radio frequency identification)

What is RFID?

RFID, technology to identify objects with the help of electromagnetic waves, is revolutionizing logistics processes and merchandise management systems. Concepts for automating production processes in the context of the future project Industry 4.0 also rely on RFID systems. We explain to you how radio frequency identification works and what fields of application there are.

IGMP - Internet Group Management Protocol

IGMP: what is behind the Internet Group Management Protocol

Using multicast connections, data streams can be transferred to a large number of clients easily and in such a way that saves resources – provided that the accessing systems are part of the same multicast group. In IPv4 networks, the organization and management of these groups is based on the Internet Group Management Protocol (IGMP), which was published as early as 1989. What exactly this...

Import contacts to outlook

Importing Outlook contacts: Transferring existing address information to the Outlook address book

The Outlook address book is an important tool for many computer users who regularly send and receive messages via Microsoft's e-mail service. To restore the contact list from a backup file after a version change or data loss, or simply to add new contact information, there is this import function. We'll show you how to easily import Outlook contacts to update your address book.

SNMP tutorial

SNMP tutorial: how snmpwalk and snmpget work

The central monitoring and managing of network devices such as routers, switches, or firewalls is often carried out using the Simple Network Management Protocol (SNMP). Both snmpwalk and snmpget tools use SNMP messages, for example, to retrieve data sets of selected network participants. In our SNMP tutorial, we show what these two command line tools can do and how data retrieval works.


Wait! We’ve got something for you!
Have a look at our great prices for different domain extensions.


Enter the web address of your choice in the search bar to check its availability.
.club
$1/1st year
then $15/year
.com
$1/1st year
then $15/year
.info
$1/1st year
then $20/year
.me
$1/1st year
then $20/year