Network

Set up your own Raspberry Pi mail server

Raspberry Pi mail server: using Raspberry Pi to manage e-mails

Why use e-mail servers from commercial e-mails service providers when you can just set up your own? You can create a private server easily and affordably with a small computer known as Raspberry Pi. Having your own e-mail server, however, requires a certain amount of work and also has its disadvantages. You can find out more about how to set up your personal Raspberry Pi mail server in this...

How to install an Apache web server

Installing and configuring an Apache web server

The Apache http server is the standard web server for providing HTTP documents on the internet. But did you know it’s also possible to install an apache web server locally on your Windows PC? This is a great method of testing out web pages and checking scripts. To get started, all you need is the free software package and a few minutes.

Man-in-the-middle attack: an overview of attack patterns

Man-in-the-middle attack: attack patterns and countermeasures

A man-in-the-middle attack is a deceitful espionage attack which aims to listen, record, or manipulate sensitive data being sent between unsuspecting internet users. To do this, hackers rely on methods that enable them to position themselves, unnoticed, between two or more computers communicating with one another. We introduce you to some well-known attack patterns and countermeasures that can be...

Ethernet

What is Ethernet (IEEE 802.3)?

In the beginning, there was ARPANET and ALOHAnet. Then Ethernet followed as a groundbreaking innovation for local networks. Ethernet enabled collision-free interconnection of multiple devices via a common bus. For the first time, data packages could efficiently be exchanged between individual devices. Today, the technology is extensively used in the standard IEEE 802.3. With fiber optic cables,...

Bootp protocol

BOOTP: All information on the DHCP forerunner

If you want to connect a computer, smartphone, etc. to a network (LAN or WiFi), you can either assign the IP address manually or get it automatically. The latter is possible thanks to the DHCP (dynamic host configuration protocol) communication protocol, which has established itself as the cross-platform standard solution for address management. The forerunner was the BOOTP bootstrap protocol that...

What are the benefits of IPv6?

IPv6: All about the new internet standard

IPv6 is the newest version of the internet protocols, and should overcome the central issues of its predecessors. Included in these issues is the impending shortage of IPv4 addresses as well as the violation of the end-to-end principle by the strict separation of public and private IPs. This article gives an overview of the functions of IPv6 as well as the structure and distribution of address...

Successful content promotion

Content promotion: maximum reach for your content

A content marketing strategy doesn’t just appear, but is rather the result of an intense analysis of goals, strengths, and content. Implementing the strategy requires a lot of personnel as well as finances. You design the content, write blog posts, produce videos, and put together whitepaper and e-books. After all this, you still aren’t finished. Nothing will happen if you don’t start promoting...

LinkedIn ads: B2B marketing in the business network

LinkedIn ads: Marketing geared toward the target group

LinkedIn is the first port of call for global B2B marketing. Contrary to Facebook, Instagram, or Pinterest, you can reach the community in your business network on a professional level instead of through funny videos. LinkedIn ads give you multiple formats to choose from to address your target group. From content marketing to classic banner advertisements: We explain what the various options are...

Subnetting: How do subnets work?

Use subnetting to get the most out of your network

Dividing a corporate network into smaller subnets has some advantages in terms of speed, security, and logical organization. However, many people find it difficult to set up. Binary computational operations and long series of numbers are frightening, but the principle itself is not so complicated. We explain what subnetting is, how to calculate a subnetmask, and what you need subnets for, so that...

SCTP

SCTP (Stream Control Transmission Protocol) – the reliable, message-oriented transport protocol

If two computer systems are to exchange data, they must agree on a common protocol basis. For example, the selected transport protocol determines how the information is to be transferred. One of the more recent representatives of this protocol division is the Stream Control Transmission Protocol (SCTP), which the IETF (Internet Engineering Task Force) published in 2000 as an alternative to known...


We’re all in this together. IONOS is
#HereForYou
For your business. When times are tough. When it matters most.
Keep your business going or start one with your own online store.
3 months free
Online Store
Get started in the world of eCommerce free for 3 months.