All you need to know: what is a hostname?

A computer’s unique name on a network is the hostname, site name or computer name. The hostname is part of the fully qualified domain name, which can be used (for example) to find and access websites on the internet. Here you’ll learn what a hostname looks like, and we’ll show you various ways to determine the hostname using an IP address or how to change it.

Edge computing

Edge Computing – Calculating at the edge of the network

Autonomous cars, intelligent factories and self-regulating supply networks – a dream world for large-scale data-driven projects that will make our lives easier. However, what the cloud model is and how it works is not enough to make these dreams a reality. The challenge of effectively capturing, evaluating and storing mass data requires new data processing concepts. With edge computing, IT...

ECC RAM: memory solution for secure data

ECC RAM – the error-correcting code memory

Memory is one of the most important components of a computer system and is particularly important for processing large amounts of data. In addition to increasing the storage capacity, it is also necessary to guarantee the security of the data. Bit errors, for example, are one of the key foes that ECC RAM is battling against to protect the main memory. To date these error-correcting memory modules...

Remote access for network storage

Remote access to the network storage

Are you using a NAS system as a home server and want to connect it to the internet? It’s simple to do. We explain how to assign a fixed LAN IP address to your network storage and open the corresponding ports for the desired service in the router firewall. You will also learn how to make your NAS system permanently available under a consistent address despite daily disconnections carried out by the...

Brute force attack: definition and protective measures

Brute force attacks: when passwords are served on a silver platter

Being constantly faced with headlines about stolen passwords, it’s understandable that many users are concerned. Your best bet is to make your passwords as complicated as possible and have them consist of many different types of characters. But even this won’t help if it’s the actual log-in area that isn’t secure enough. Even today, attackers are still successful with the notorious and simple...

What is Internet protocol? – IP definition, etc.

What is Internet Protocol (IP)?

When networking a computer system, protocols play an important role. An example is the Internet Protocol, which was published in a first specification in 1981, and is the indispensable basis for the smooth sending and receiving of data packets. But what is behind the RFC standard? And how does the internet protocol actually work?

What is MAC spoofing?

What is MAC spoofing?

MAC spoofing is a method by which unique hardware addresses are masked using a Locally Administered Address (LAA) in the software. MAC spoofing can offer protection for your privacy when using public LAN or WLAN networks, but can also be used for illegal network activities. We explain to you here how MAC spoofing works and which settings in Windows must be accessed in order to change your MAC...

Hootsuite alternatives

Hootsuite alternatives: what do other social media tools have to offer?

Today, successful social media marketing campaigns are all done via special software that unites different accounts from different networks, making the work a lot easier. In recent years, Hootsuite has established itself as the market leader in this field. However, when it comes to Hootsuite alternatives, there are many competitors with promising options for those looking for a cheaper platform,...

Ethernet frame

Ethernet frame: definition and variants of the frame format

Ethernet frames enable the transmission of data over an Ethernet connection and are essential for local area networks. Ethernet frames are structured and sized differently depending on the protocol, and contain important information such as MAC addresses, protocol information, length information, and much more. The established Ethernet standard IEEE 802.3 has also developed special frames for VLAN...

CSMA/CD - Carrier Sense Multiple Access / Collision Detection

CSMA/CD: Explanation of the process

Rules must be observed when communicating in a group. This is no different with local networks: CSMA/CD regulates how data packet collisions must be handled in a LAN network. But what happens if several participants attempt to simultaneously carry out a transmission and the information gets lost? Carrier Sense Multiple Access with Collision Detection is an important procedure for smooth network...