Network

Skype alternatives

The best alternatives to Skype: 14 free applications for video calls

For millions of people around the world, video chats and conferences are an essential part of daily life – for both work and leisure. When it comes to video telephony software and applications, Skype is one of the pack leaders. In fact, many people are unaware that there’s a considerable number of good alternatives to Skype on the market. Some of these programs even boast extra features that can’t...

Remote desktop: Success of the application

Remote desktop: Application, troubleshooting, and alternatives

Remote desktop connections are indispensable for day-to-day business. More than anything, allowing remote control access from another computer saves time: Whether for support, online conferences, or home office — with remote desktop, you can easily and conveniently connect your computer to distant devices. Private users also benefit from remote use: By connecting with different operating systems,...

What is a VPN (virtual private network)?

VPN — secure data transfer through public networks

VPN implementations offer an affordable alternative for locally connecting networks, as well as making network resources available for external devices. In contrast to corporate networks, no private communication network is required. Instead, like the internet, VPNs rely on networks, and protect sensitive data through a process known as tunneling.

VPN server set-up via Raspberry Pi and OpenVPN

Set up Raspberry Pi as a VPN server: OpenVPN tutorial

If you set up your own VPN server, then you can access your local network from any internet connection, not to mention allowing you to move around the internet more securely, while also being encrypted, from public WLAN networks. This tutorial shows that the Raspberry Pi mini-computer and the already established OpenVPN program are perfectly sufficient for the creation and operation of a VPN...

Debian – the universal system software

Debian: what does this Linux kernel offer?

Anyone looking to learn about Linux operating systems will come across Debian soon enough. The GNU/Linux distribution was one of the first of its kind and is still one of the most widely used today. Over 1,000 community members work on the Debian project, furthering the development of the collection. But how did Debian become so successful? And what makes this system software so interesting to...

Edge computing

Edge Computing – Calculating at the edge of the network

Autonomous cars, intelligent factories and self-regulating supply networks – a dream world for large-scale data-driven projects that will make our lives easier. However, what the cloud model is and how it works is not enough to make these dreams a reality. The challenge of effectively capturing, evaluating and storing mass data requires new data processing concepts. With edge computing, IT...

SYN flood

SYN flood attack: variants and countermeasures

The attack pattern of a SYN flood attack has been known since the early years of the World Wide Web. Over time, new attack variants and appropriate protective measures have arisen. DDoS attacks with massive data flows originating from botnets are currently the norm. Learn how SYN flood attacks work. We will explain the concepts of these attacks and countermeasures.

Netcat

What is Netcat?

Netcat is a true all-rounder in networks. Fault diagnostics, chats, extensive data transfers, and network security all form part of the impressive repertoire offered by the command line tool. But if it ends up in the wrong hands, it can also be misused. IT managers should therefore familiarize themselves with the tool.

Shutdown Commands via CMD

Shutdown via CMD: An overview of windows shutdown commands

In Windows, you can adapt frequently required shutdown routines to your individual needs in many different ways. For this, Windows provides an appropriate tool in the command line, which is also referred to as the prompt – CMD or cmd.exe. We introduce shutdowns via CMD, which can handle efficient, simple, but also more complex shutdown routines.

Ping flood

Ping flood

The ping flood is a type of denial-of-service attack that can affect commercial providers and home users alike. This attack relies on the ICMP protocol and the ping command. In order to unleash a particularly powerful flood, attackers often use a network of bots. Learn how the ping flood works and how you can protect yourself from one.


Get found and grow this holiday season
We’re dropping our prices on some of our best products to help you
get your business ready.
Now up to 75% off