SNTP: simple network time protocol

Simple network time protocol: the stripped-back protocol for time synchronization

An exact system time on a computer is especially important when devices need to exchange data. Cross-system processes quickly come to a standstill if the generated time stamps are very different from the time that applies to the system. Synchronization methods that keep the clocks of the individual network participants in sync are utterly indispensable. One of the simplest methods to achieve time...

Protection against ransomware, spyware, and scareware

Ransomware, adware, etc. – how can you protect yourself?

The internet is a playground for cybercriminals and fraudsters – for many, this is an annoying and frightening reality. The threats from unwanted software range from harmless advertising to trojans, which can paralyze complete computer networks. The forms of malicious software or malware are diverse, the countermeasures often very simple. In our article, you can read about how ransomware, spyware,...

ARP Spoofing: Attacks from the internal network

ARP Spoofing – flaws in network security

When it comes to network security, administrators focus primarily on attacks from the internet. But often times, the danger lurks in the internal network. If the LAN turns out to be a blind spot in the security IT, then internal attackers have an easy time. A popular method of attack is ARP spoofing. With this, hackers switch undetected between two communication partners in order to intercept,...


Correcting the error “Err_Connection_Timed_Out”

The error message “Err_Connection_Timed_Out” appears frequently on Google Chrome and means that an error has occurred when trying to access a webpage. This is usually caused by the target server taking too long to send a reply, which results in the browser terminating the communication attempt. Find out in our guide what “Err_Connection_Timed_Out” means, what measures you can take to correct the...

VPN server set-up via Raspberry Pi and OpenVPN

Set up Raspberry Pi as a VPN server: OpenVPN tutorial

If you set up your own VPN server, then you can access your local network from any internet connection, not to mention allowing you to move around the internet more securely, while also being encrypted, from public WLAN networks. This tutorial shows that the Raspberry Pi mini-computer and the already established OpenVPN program are perfectly sufficient for the creation and operation of a VPN...

What is a VPN (virtual private network)?

VPN — secure data transfer through public networks

VPN implementations offer an affordable alternative for locally connecting networks, as well as making network resources available for external devices. In contrast to corporate networks, no private communication network is required. Instead, like the internet, VPNs rely on networks, and protect sensitive data through a process known as tunneling.

FileZilla: tutorial for the FTP client program

How to use FileZilla: a tutorial on the popular FTP client

FileZilla is considered to be a standard software for transferring data between locally connected computers and online servers. The network protocol is able to transfer via FTP and its encrypted variants, SFTP and FTPS. We’ve created an overview of the client program’s features and break down the details of this program from installation to data transfer.

Edge computing

Edge Computing – Calculating at the edge of the network

Autonomous cars, intelligent factories and self-regulating supply networks – a dream world for large-scale data-driven projects that will make our lives easier. However, what the cloud model is and how it works is not enough to make these dreams a reality. The challenge of effectively capturing, evaluating and storing mass data requires new data processing concepts. With edge computing, IT...

ECC RAM: memory solution for secure data

ECC RAM – the error-correcting code memory

Memory is one of the most important components of a computer system and is particularly important for processing large amounts of data. In addition to increasing the storage capacity, it is also necessary to guarantee the security of the data. Bit errors, for example, are one of the key foes that ECC RAM is battling against to protect the main memory. To date these error-correcting memory modules...

Remote access for network storage

Remote access to the network storage

Are you using a NAS system as a home server and want to connect it to the internet? It’s simple to do. We explain how to assign a fixed LAN IP address to your network storage and open the corresponding ports for the desired service in the router firewall. You will also learn how to make your NAS system permanently available under a consistent address despite daily disconnections carried out by the...

Wait! We’ve got something for you!
Have a look at our great prices for different domain extensions.

Enter the web address of your choice in the search bar to check its availability.
$1/1st year
then $15/year
$1/1st year
then $15/year
$1/1st year
then $20/year
$1/1st year
then $20/year