Network

Securing a server: correctly configuring Linux, etc.

The right configuration to secure your server

If you operate or rent your own server, it is your responsibility to protect it against failures and external access. You can immediately begin to set the foundation for this when configuring the server, if you have the necessary administrative rights. The correct settings can work wonders, especially with encrypted remote connections via SSH protocol, and greatly increase security.

What is a root server? Definition and background

What is a root server? Definition and mechanics

When you call up a website, the entered domain first needs to be turned into an IP address and read out from the browser so that the page can finally appear in the browser. This process is known as name resolution. Here, the root name server or (DNS) root server in the domain name system plays a key role. But what is a root server? And what exactly goes on when they receive requests for...

How can LinkedIn work for businesses?

LinkedIn for businesses: curate a professional image

LinkedIn is not just another social media site. The business-oriented networking platform offers companies a number of special advantages, which means your LinkedIn marketing strategy and content should be unique. With the focus on building professional relationships, you can reach users in a different way to Facebook or Twitter. LinkedIn is the perfect platform for businesses to recruit and...

What is Neighborhood Discovery Protocol(NDP)?

Neighbor Discovery Protocol (NDP) – what is it?

Network configurations today are done quickly. For those who do not rely on their own fixed settings for routers, computers, and more, the Internet Protocol family provides the appropriate set of automatic mechanisms to determine critical parameters, such as the default gateway, IP address, and MAC address.

Comparison of the best antivirus programs

The importance of antivirus programs

Antivirus programs have become essential for the security of our computers. Viruses, worms, trojans, and many other types of malware threaten to infect the system and cause considerable damage. Losing personal data and the consequences resulting from this can be extremely irritating. Software manufacturers are trying to combat malicious malware attacks with the help of intelligent antivirus...

Creating an IT disaster recovery plan

For when the going gets tough: the IT disaster recovery plan

For businesses, a reliable IT infrastructure is just as integral to day-to-day operations as competent management, productive employees, and reasonable working conditions. A server outage is able to paralyze an entire company. Adequate preparation can help prevent some of the most common errors from occurring; unforeseen risks, however, will always remain a factor. In order to be on top of your...

What is a floating IP?

What is a floating IP?

IP addresses are essential for modern digital communication. They are the 'connection numbers' of all devices in the network and this is why they are one of key foundation elements of the internet as well as other networks. Communication is based on a common 'language': the internet protocol. But what exactly is a floating IP and what is it used for? What is the difference between a floating IP of...

Intrusion detection systems and prevention systems

The intrusion detection and intrusion prevention systems at a glance

A stable network is characterized not only by the appropriate hardware structures, but also by a watertight security concept. In addition to back-up solutions and intelligent fail-safe systems, protection against external access attempts is a must. Intrusion detection systems (IDS) and intrusion protection systems (IPS) are an excellent addition to the classic firewall and are therefore a sensible...

Nagios – an overview of all network processes

Nagios: the standard server for monitoring IT infrastructure

IT departments are not to be envied: all devices, servers, databases, etc., must not only be integrated into the network, but also work at any time. In order to prevent any problems that might arise in advance, Nagios is the monitoring tool you need in your standard IT repertoire. What makes the open source solution so special and what are the alternatives?

Port scanning: introduction and basics

How port scanning contributes to your system’s security

It’s easy to lose track of all the different programs that are responsible for inbound and outbound data traffic. Networks hosting a large number of computer systems that are constantly communicating with online services often require technical backup. High-performance tools check the activities of various applications or computers and can close existing security gaps. Using port scanners is one...


Wait! We’ve got something for you!
Have a look at our great prices for different domain extensions.


Enter the web address of your choice in the search bar to check its availability.
.club
$1/1st year
then $15/year
.com
$1/1st year
then $15/year
.info
$1/1st year
then $20/year
.me
$1/1st year
then $20/year