Network

Server-side and client-side scripting: the differences

Client-side scripting vs. server-side scripting: a comparison

[Teaser] Scripting languages play a vital role in developing web projects with dynamic elements. Scripts are a fundamental component for breathing life into static HTML, using movement and interactive elements. This can be executed and interpreted from either the web server (i.e. server-side script) or from the browser (client-side script). But what exactly are the differences between server-side...

Display advertising vs. real-time advertising (RTA)

Display advertising/display marketing vs. real-time advertising (RTA)

Banner ads and other forms of display marketing have been proven to be effective marketing strategies for products and services online. The new practice in this field is real-time advertising (RTA) and its real-time bidding (RTB) approach. This new strategy carries out an automated bidding war in milliseconds to decide which ad will be displayed. But how does it differ from traditional display...

Set up a Raspberry Pi web server with LAMP

Using Raspberry Pi as a web server

Have you always wanted to operate your own web server? Raspberry Pi makes this goal more realistic, without commanding a high price and expert-level knowledge for set-up: hosting a website’s test environment or a private cloud is just as manageable for the small computer as controlling light sources, heaters, or other home devices (home automation). In our tutorial, you’ll find out all you need to...

iptables tutorial –  rule sets for creating data packets

iptables tutorial: how to configure the filter tables of Linux kernels

Since the first version, Linux kernel has been implementing packet filter modules, with which filter tables can be created. However, additional programs such as iptables are required to configure the rule set. In our tutorial, we present the free software for the Linux kernel 2.4 and 2.6 and give you a little insight into how it all works.

What is a demilitarized zone?

Demilitarized zones: internal network protection

Companies hosting their own websites, an online shop, or e-mail inboxes should make sure to separate the corresponding server of these from the local network. This makes it possible to protect devices within the company network from hacker attacks that take place on public networks. Solid protection comes in the form of a demilitarized zone, which separates endangered systems from sensitive...

Hardware firewall: the more stable firewall solution

Hardware firewall – the external security system

Most computer users are at least aware of the term firewall. When activated, they help protect computers. But announcements about blocked applications can become a source of irritation for many users, especially when the background information for such messages is unknown. But how do firewalls work? And what role do hardware firewalls play in protecting your computer?

Web server: definition, background, software tips

What is a web server? And which web server software is there?

The equation is simple - without it, there’s simply no web content: when a web server is out of order, then it’s no longer possible to call up any websites that are connected to it. Web servers are what allow online presences to reach the internet in the first place. But just how do these systems work? Which functions do the programs responsible for this task offer? And what’s an example of a good...

Log file analysis with open source tool, GoAccess

How log file analysis works with GoAccess

The log files of web servers and cloud services reveal a lot about the users that access them. They contain information about which browser or operating system is being used, which search terms have been entered and how many different pages a user has accessed, for example. Since manually analyzing these extensive text files is nigh on impossible, you can use log file analysis programs such as...

IPsec: security architecture for IPv4 and IPv6

Secure network connections with IPsec

A big problem with the previous Internet Protocol version, IPv4, was the missing guarantee of security standards of integrity, authenticity, and confidentiality. This previous protocol lacked the necessary means to identify data sources or enable secure transport. The protocol suite IPsec, developed for IPv4’s successor, IPv6, has changed the situation for Internet Protocol overnight.

What is a network attached storage (NAS)?

Network attached storage (NAS): the basics of network storage

Growing sums of data require cost-effective, high-performance storage solutions. One option for fulfilling this requirement is a network attached storage. In business contexts, this model has already established itself as a viable alternative to file servers, hard drives, and the cloud. Private users have also caught on and use NAS systems at home. But what is a NAS? Read on, and we’ll show you...


Wait! We’ve got something for you!
Get your own .US domain now, the first year is free.


FREE in the 1st year*
then $17.76/year

Enter the web address of your choice in the search bar to check its availability.
* Offer valid for customers with a bona fide US presence and with the purchase of a new, two-year domain. Only one per customer.