Network

Terminal Servers – the Secret Behind Remote Hosts

Terminal servers: definition, basics, and advantages

In the days of mainframe computers and the first smaller networks, terminals were a crucial building block for sharing hardware and software resources. It is no coincidence that terminal servers – the central administrative entity of such networks – are in demand decades later, now that applications are to be made available to multiple users.

Free dynamic DNS providers: An overview

The best free DynDNS providers

You would like to access your home computer, but don’t know how? Does your home network with its constantly changing IP addresses jack up your monthly bill? Dynamic DNS services (DynDNS) can help you out. Find out which DynDNS providers are the best and what the advantages and disadvantages of each are in this overview.

Localhost

Localhost (127.0.0.1)

What do you need a localhost for? Sometimes it can be useful to communicate with yourself. This is known as a loopback in network technology: instead of feeding a request to the network – e.g. the internet – you instead keep it within your system, subsequently stimulating a network connection. We will explain how the connection to 127.0.0.1 works, and what you can use localhost for.

Set up ownCloud with Raspberry Pi

Creating a Raspberry Pi cloud server with owncloud

With ownCloud software, your Raspberry Pi can be used as a private cloud, performing the same kind of tasks as clouds from major providers such as Google, Amazon, and Dropbox. Cost-effectiveness is just one of many the benefits of creating your own personal cloud; another is the privacy and security of your data. This step-by-step Raspberry Pi cloud tutorial explains how to set up ownCloud.

Social engineering – the security gap at ‘layer 8’

Social engineering: human vulnerability exploited

The most effective system break-ins often happen without a scene. Instead of disrupting central network devices with DDoS attacks or sneaking through onto operating systems with Trojan horse techniques, hackers increasingly try to exploit the human security gap. There are various such methods that fall within the broader category of social engineering: a technique that sees hackers gather publicly...

Web stacks: the basics and examples

Web stack—the software framework for web development

Terms like web stack or web application stack refer to software packages that are used to develop and operate websites and web applications. The most well-known example of this technology, the LAMP stack, has witnessed increasing competition through the likes of JavaScript-based framework bundles, which feature unified programming languages for servers and clients. This gives them a considerable...

How companies use social selling

Social selling: business relations on the social net

Purchasing decisions are rarely made out of the blue. Customers usually go through a decision-making phase, during which it’s up to the company to convince the customer of their need for the product. This is most effective when you present yourself and your products as trustworthy and honest as possible – particularly on social networks, where your target group conducts research, asks for...

Remote desktop: Success of the application

Remote desktop: Application, troubleshooting, and alternatives

Remote desktop connections are indispensable for day-to-day business. More than anything, allowing remote control access from another computer saves time: Whether for support, online conferences, or home office — with remote desktop, you can easily and conveniently connect your computer to distant devices. Private users also benefit from remote use: By connecting with different operating systems,...

How to set up a proxy server in your browser

How to set up a proxy server with Windows

Proxy settings can be established quickly and easily via the operating system’s control panel or browser menu. Discover exactly how to do this with our comprehensive step-by-step introductions for Windows 7, 8, and 10. A faulty proxy configuration can cause connection failures, but there are simple ways to detect the causes and rectify these errors.

What is a reverse proxy?

Reverse proxy server – core components in security architecture

Cyber criminality is a big issue for most companies’ IT departments. Online attacks threaten the security of private networks and cause millions of dollars of damage per year. Popular targets are servers that provide online services and therefore require a permanent internet connection. An extra layer of security can be applied by using an upstream network component – the reverse proxy. This...


Wait! We’ve got something for you!
Get your own .US domain now, the first year is free.


FREE in the 1st year*
then $17.76/year

Enter the web address of your choice in the search bar to check its availability.
* Offer valid for customers with a bona fide US presence and with the purchase of a new, two-year domain. Only one per customer.