Network

Raspberry Pi projects

Raspberry Pi projects

Raspberry Pi is an inexpensive micro-computer that can behave like a standard computer in many respects. The innovative mini device can be used for a wide range of tasks - from setting up an operating system to surfing the web, to using it as a server or a media center. Discover 20 of the most interesting Raspberry Pi projects to try out at home.

Spear phishing

Spear phishing: targeted attacks on your data

Internet users are constantly the target of cyberattacks. Most attacks are easy to fend off, but a new form of scam has proven to be especially dangerous. Spear phishing messages don’t contain absurd claims or bad spelling. These deceitful messages target specific individuals and look frighteningly real. How do these attacks work?

FileZilla: tutorial for the FTP client program

How to use FileZilla: a tutorial on the popular FTP client

FileZilla is considered to be a standard software for transferring data between locally connected computers and online servers. The network protocol is able to transfer via FTP and its encrypted variants, SFTP and FTPS. We’ve created an overview of the client program’s features and break down the details of this program from installation to data transfer.

Hyper-converged systems: More order in IT?

Hyper-converged systems: The compact data center

The traditional data center could be significantly streamlined by migrating to a hyper-converged system. By eliminating the need for highly complex infrastructures and multiple work areas, the company’s IT department could function more efficiently, dynamically, and cost-effectively. This is made possible using preconfigured standard hardware and a complete virtualization of the IT infrastructure....

Fog computing

Fog computing: decentralized approach for IoT clouds

Traditionally, cloud solutions are designed for central data processing. IoT devices generate data, send it to a central computing platform in the cloud, and await a response. However, with large-scale cloud architectures, such a system inevitably leads to bandwidth problems. For future projects such as connected cities and smart manufacturing, classic cloud computing is a hindrance to growth. The...

Edge computing

Edge Computing – Calculating at the edge of the network

Autonomous cars, intelligent factories and self-regulating supply networks – a dream world for large-scale data-driven projects that will make our lives easier. However, what the cloud model is and how it works is not enough to make these dreams a reality. The challenge of effectively capturing, evaluating and storing mass data requires new data processing concepts. With edge computing, IT...

What is a DDNS (dynamic DNS)?

Dynamic DNS (DynDNS): making remote control easier

Being able to access your home computer from another location is no longer a complicated matter thanks to remote connection. It is handy to be able to use your computer from the office and swap files. But IP addresses change often and this throws a spanner in the works. DynDNS (DDNS) services are the solution. In this article, we explain what these are and how you can access your computer via the...

Social engineering – the security gap at ‘layer 8’

Social engineering: human vulnerability exploited

The most effective system break-ins often happen without a scene. Instead of disrupting central network devices with DDoS attacks or sneaking through onto operating systems with Trojan horse techniques, hackers increasingly try to exploit the human security gap. There are various such methods that fall within the broader category of social engineering: a technique that sees hackers gather publicly...

DNSSEC: internet standards for authenticated name resolution

DNSSEC: internet standards for authenticated name resolution

Without the Domain Name System, users of the World Wide Web would have serious problems when trying to load websites and other online presences. It’s only thanks to this system that internet addresses appear in their trusted text format: they’re actually nothing more than combinations of numbers. The communication between browser and name server responsible for this isn’t actually as secure as you...

The best WhatsApp alternatives

The best WhatsApp alternatives

Invitations to dinner parties; updates about work; an excursion with the college soccer team: if you’re not using WhatsApp, you run the risk of missing out on important information. With more than a billion worldwide users to date, the app is more popular than almost any other on the market. But this networking comes with its disadvantages too: the main one being that WhatsApp shares user data...


Wait! We’ve got something for you!
Have a look at our great prices for different domain extensions.


Enter the web address of your choice in the search bar to check its availability.
.club
$1/1st year
then $15/year
.com
$1/1st year
then $15/year
.info
$1/1st year
then $20/year
.me
$1/1st year
then $20/year