Protocols

401 error: What can you do about it?

Error 401: Unauthorized – No access to the website

You’re surfing around on the internet, but instead of getting the desired content you only receive an error message: annoying or even downright frustrating. Especially if you don’t exactly know what the status is supposed to mean. How are you expected to solve the problem, if you don’t know what’s causing it? This also goes for the error 401. Here we explain what the error means and what you can...

Headless CMS: What are the benefits?

Get more from your own content with headless CMS

If you want to juggle more than one channel with your content management system, you’ll quickly reach the limits. A classic CMS offers many simplifications, but at the same time is limited with its design options. For this reason, content creators sometimes rely on another solution: a headless CMS. This separates the frontend from the backend so that different websites and mobile apps can be...

clear cookies

Deleting cookies: how to clear stored data

Some cookies can be very helpful – they let you sleep on those impulse purchases and keep them from disappearing out of your shopping cart, or log into social media sites with just one click. But not all cookies make surfing the web easier, and some may even forward unwanted information to third parties. It is a good idea to learn how to clear cookies, and this guide will show you how to clear...

ERR_SSL_PROTOCOL_ERROR: the best solutions

ERR_SSL_PROTOCOL_ERROR: how to fix the Chrome bug

Chrome is the world’s most widely-used internet browser. The application scores points not only when it comes to security and speed, but also with its features such as cross-device synchronization of user data. But errors can occur even when surfing with Google’s wonder weapon. These can lead to the browser crashing or prevent certain pages from being accessed. The error message...

What is ICMP protocol and how does it work?

What is the ICMP?

In the background, numerous protocols ensure that communication and data transmission work in computer networks. As the most prominent representative, the Internet Protocol plays a fundamental role. Without its’ various extensions and additions they would be nowhere near as versatile, as is the case in the current protocol. Thanks to the possibilities offered by ICMP protocol error messages and...

Advanced Message Queuing Protocol (AMQP)

AMQP: Introducing the Advanced Message Queuing Protocol

Many IT departments need communication between various applications to work swiftly and without errors. For example, lost messages or a bottleneck of messages can lead to expensive problems in the financial industry. With the AMQP protocol, problems like these don't occur. How does the Advanced Message Queuing Protocol work?

UTF-8: encoding global digital communication

UTF-8: the network standard

UTF-8 is method of Unicode character encoding, which claims to cover all modern languages for data processing. The format has significantly influenced international digital communication. But what exactly does “UTF-8” mean? And what is special about UTF-8 in the Unicode character set? Here you can find out which structure the coding is based on, and which bytes are permitted in the standard...

PHP 5.6 Support

PHP 5.6: Support stops at the end of 2018

Security support for PHP 5.6 ceases at the end of the year. Although developers had already postponed the end date by a year, many website operators still seem to be unprepared. A large number of websites still run on PHP 5.6. From January onwards, these websites will be at risk. However, many are dreading the update. How can you protect your website?

The OSI model: a reference for standards and protocols

What’s the OSI model?

Those working with network technology are bound to encounter the ISO-OSI model sooner or later. This system subdivides communication between computer systems into seven different layers. Each of these layers is assigned a certain task. With the help of this layer model, subareas of abstract processes are able to be descriptively explained.

MAC address

MAC address (media access control)

Without a MAC address, nothing in a network will work on your device. Just as your postman needs a valid address to reliably deliver the mail, the transmission of data packets in computer networks is only possible with the unique hardware address of the target device. When it comes to a MAC address, at least there is one address available on each network-compatible device. But what is the MAC...


Wait! We’ve got something for you!
Have a look at our great prices for different domain extensions.


Enter the web address of your choice in the search bar to check its availability.
.club
$1/1st year
then $15/year
.com
$1/1st year
then $15/year
.info
$1/1st year
then $20/year
.me
$1/1st year
then $20/year