Protocols

Encryption methods: An overview

Encryption methods: An overview

E-mail, instant messaging, or voice-over IP: If you want to communicate over the internet, you should make sure that the data transfer process can be trusted. The same goes for the World Wide Web. With online banking and digital shopping, money transactions are increasingly being carried out online. Popular encryption methods like DES, AES, or RSA should guarantee the security of passwords, credit...

How to set up a proxy server in your browser

How to set up a proxy server with Windows

Proxy settings can be established quickly and easily via the operating system’s control panel or browser menu. Discover exactly how to do this with our comprehensive step-by-step introductions for Windows 7, 8, and 10. A faulty proxy configuration can cause connection failures, but there are simple ways to detect the causes and rectify these errors.

NGINX: basics, installation, and set-up

NGINX — the quick and efficient web server

For years, Apache had been the uncontested go-to web servers and comprised the basis of most websites published in the World Wide Web. The increasing technical requirements of modern web projects and the growing demands and expectations of internet users has brought on a sea change of sorts. Alternatives like NGINX are becoming ever more popular and are slowly creeping up on the classic server...

What is Neighborhood Discovery Protocol(NDP)?

Neighbor Discovery Protocol (NDP) – what is it?

Network configurations today are done quickly. For those who do not rely on their own fixed settings for routers, computers, and more, the Internet Protocol family provides the appropriate set of automatic mechanisms to determine critical parameters, such as the default gateway, IP address, and MAC address.

NAT: How Network Address Translation works

NAT: Network Address Translation in the router

NAT, the network address translation, is closely tied to the internet standard IPv4 and will disappear from the internet along with it. But the implementation of IPv6 is slow to take over, and many internet users worldwide still surf with the fourth version of the internet protocol. As a result, network address translation via NAT tables remains current. In our guide, we answer the questions: What...

What is a floating IP?

What is a floating IP?

IP addresses are essential for modern digital communication. They are the 'connection numbers' of all devices in the network and this is why they are one of key foundation elements of the internet as well as other networks. Communication is based on a common 'language': the internet protocol. But what exactly is a floating IP and what is it used for? What is the difference between a floating IP of...

Nagios – an overview of all network processes

Nagios: the standard server for monitoring IT infrastructure

IT departments are not to be envied: all devices, servers, databases, etc., must not only be integrated into the network, but also work at any time. In order to prevent any problems that might arise in advance, Nagios is the monitoring tool you need in your standard IT repertoire. What makes the open source solution so special and what are the alternatives?

Port scanning: introduction and basics

How port scanning contributes to your system’s security

It’s easy to lose track of all the different programs that are responsible for inbound and outbound data traffic. Networks hosting a large number of computer systems that are constantly communicating with online services often require technical backup. High-performance tools check the activities of various applications or computers and can close existing security gaps. Using port scanners is one...

Log file analysis with open source tool, GoAccess

How log file analysis works with GoAccess

The log files of web servers and cloud services reveal a lot about the users that access them. They contain information about which browser or operating system is being used, which search terms have been entered and how many different pages a user has accessed, for example. Since manually analyzing these extensive text files is nigh on impossible, you can use log file analysis programs such as...

IPsec: security architecture for IPv4 and IPv6

Secure network connections with IPsec

A big problem with the previous Internet Protocol version, IPv4, was the missing guarantee of security standards of integrity, authenticity, and confidentiality. This previous protocol lacked the necessary means to identify data sources or enable secure transport. The protocol suite IPsec, developed for IPv4’s successor, IPv6, has changed the situation for Internet Protocol overnight.


We’re all in this together. IONOS is
#HereForYou
For your business. When times are tough. When it matters most.
Keep your business going or start one with your own online store.
3 months free
Online Store
Get started in the world of eCommerce free for 3 months.