Network

What is Neighborhood Discovery Protocol(NDP)?

Neighbor Discovery Protocol (NDP) – what is it?

Network configurations today are done quickly. For those who do not rely on their own fixed settings for routers, computers, and more, the Internet Protocol family provides the appropriate set of automatic mechanisms to determine critical parameters, such as the default gateway, IP address, and MAC address.

Comparison of the best antivirus programs

The importance of antivirus programs

Antivirus programs have become essential for the security of our computers. Viruses, worms, trojans, and many other types of malware threaten to infect the system and cause considerable damage. Losing personal data and the consequences resulting from this can be extremely irritating. Software manufacturers are trying to combat malicious malware attacks with the help of intelligent antivirus...

Creating an IT disaster recovery plan

For when the going gets tough: the IT disaster recovery plan

For businesses, a reliable IT infrastructure is just as integral to day-to-day operations as competent management, productive employees, and reasonable working conditions. A server outage is able to paralyze an entire company. Adequate preparation can help prevent some of the most common errors from occurring; unforeseen risks, however, will always remain a factor. In order to be on top of your...

What is a floating IP?

What is a floating IP?

IP addresses are essential for modern digital communication. They are the 'connection numbers' of all devices in the network and this is why they are one of key foundation elements of the internet as well as other networks. Communication is based on a common 'language': the internet protocol. But what exactly is a floating IP and what is it used for? What is the difference between a floating IP of...

Intrusion detection systems and prevention systems

The intrusion detection and intrusion prevention systems at a glance

A stable network is characterized not only by the appropriate hardware structures, but also by a watertight security concept. In addition to back-up solutions and intelligent fail-safe systems, protection against external access attempts is a must. Intrusion detection systems (IDS) and intrusion protection systems (IPS) are an excellent addition to the classic firewall and are therefore a sensible...

Nagios – an overview of all network processes

Nagios: the standard server for monitoring IT infrastructure

IT departments are not to be envied: all devices, servers, databases, etc., must not only be integrated into the network, but also work at any time. In order to prevent any problems that might arise in advance, Nagios is the monitoring tool you need in your standard IT repertoire. What makes the open source solution so special and what are the alternatives?

SQL injection: Fundamentals and safeguards

SQL Injection: Protect your database system

There are daily reports on how security gaps in applications are exploited – because hardly a day goes by without a new gap being discovered or a known gap being closed. One attack method, which has always been based on exploiting such weak points, is called SQL injection. But what is actually hidden behind the malicious database exploitation and how can you protect your database system from it?

Port scanning: introduction and basics

How port scanning contributes to your system’s security

It’s easy to lose track of all the different programs that are responsible for inbound and outbound data traffic. Networks hosting a large number of computer systems that are constantly communicating with online services often require technical backup. High-performance tools check the activities of various applications or computers and can close existing security gaps. Using port scanners is one...

Penetration testing – the complete network check

Penetration test: how to find weak points in your network

The more complex a network is, the more vulnerable it is to attacks. In times when customers and partners have access to internal network structures via the internet, and can control various applications via web interfaces, IT employees are encountering more and more problems. Large companies, in particular, prefer to use penetration testing to check how well their security concept works. This...

Server-side and client-side scripting: the differences

Client-side scripting vs. server-side scripting: a comparison

[Teaser] Scripting languages play a vital role in developing web projects with dynamic elements. Scripts are a fundamental component for breathing life into static HTML, using movement and interactive elements. This can be executed and interpreted from either the web server (i.e. server-side script) or from the browser (client-side script). But what exactly are the differences between server-side...