How port scanning contributes to your system’s security

It’s easy to lose track of all the different programs that are responsible for inbound and outbound data traffic. Networks hosting a large number of computer systems that are constantly communicating with online services often require technical backup. High-performance tools check the activities of various applications or computers and can close existing security gaps. Using port scanners is one...

Bonjour: What’s behind the zeroconf implementation

Manually organizing a large local network can be a nerve-wracking and very complicated matter. Without your own DHCP and DNS servers to support you in the distribution of addresses and name resolution, all IPs would have to be entered manually and also updated independently if changes are made in the network. Zeroconf implementations like Bonjour, which connect network components without almost no...

Use subnetting to get the most out of your network

Dividing a corporate network into smaller subnets has some advantages in terms of speed, security, and logical organization. However, many people find it difficult to set up. Binary computational operations and long series of numbers are frightening, but the principle itself is not so complicated. We explain what subnetting is, how to calculate a subnetmask, and what you need subnets for, so that...

Ubuntu: The versatile Linux distribution with long-term support

Whether a home PC, work laptop, or website server – without an operating system, the management of hardware resources wouldn’t be possible. Windows systems have proven themselves over the years, and Apple computers run with Mac OS X as the standard, but Linux distributions are no longer a niche in the server environment. Ubuntu, for example, continues to build on traditional open source...

Network types at a glance

When several computers are connected to one another it is known as a network. Networks enable data exchange between different devices, making shared resources available. Different network types are implemented depending on which transmission techniques and standards are used. These differ in terms of the number of connected systems and potential reach.

MySQL tutorial: the comprehensive guide for beginners

Along with Oracle and Microsoft SQL server, MySQL is one of the most popular management systems for relational databases. Nowadays the software developed by MySQL AB belongs to the product portfolio of the Oracle Corporation and is proprietarily marketed under a dual license. Since 2009, an open source MySQL fork, known as MariaDB, has also been available from the original developers. Here we give...

The Docker ecosystem: the best Docker tools at a glance

Docker significantly simplified the use of software containers with its efforts at standardization. The lean container platform is part of a steadily increasing ecosystem that provides users a wide range of application options in the realm of software deployments, orchestration of containers, and multi-container applications, as well as continuous integration (CI) and continuous delivery (CD). In...

ECC RAM – the error-correcting code memory

Memory is one of the most important components of a computer system and is particularly important for processing large amounts of data. In addition to increasing the storage capacity, it is also necessary to guarantee the security of the data. Bit errors, for example, are one of the key foes that ECC RAM is battling against to protect the main memory. To date these error-correcting memory modules...

Remote desktop: Application, troubleshooting, and alternatives

Remote desktop connections are indispensable for day-to-day business. More than anything, allowing remote control access from another computer saves time: Whether for support, online conferences, or home office — with remote desktop, you can easily and conveniently connect your computer to distant devices. Private users also benefit from remote use: By connecting with different operating systems,...

Reverse proxy server – core components in security architecture

Cyber criminality is a big issue for most companies’ IT departments. Online attacks threaten the security of private networks and cause millions of dollars of damage per year. Popular targets are servers that provide online services and therefore require a permanent internet connection. An extra layer of security can be applied by using an upstream network component – the reverse proxy. This...