What is a proxy server?

A proxy server is a network component that provides an interface between a private network and the internet. A proxy makes it possible to have an influence on the data traffic, to cache packet data, and to conceal the identity of the communication partners by using different IP addresses.

What is a server?

When talking about web hosting, it is impossible to avoid the term ‘server’. So what is a server? And how does it work? In IT, there are actually two definitions of the term. The traditional server is the software for network services, but more recently the word has also been used to describe the corresponding hardware used to carry out server programs. Here is our overview of the most common...

Servers with SSD storage: a forward-thinking hosting strategy

SSDs have been gaining ground for years now. Until recently, these flash-based storage devices have been mostly used by mobile devices, like smartphones or MP3 players. But more recently desktops and servers have been making use of this technology. What advantages do SSDs have over traditional storage devices? Find out here.

For when the going gets tough: the IT disaster recovery plan

For businesses, a reliable IT infrastructure is just as integral to day-to-day operations as competent management, productive employees, and reasonable working conditions. A server outage is able to paralyze an entire company. Adequate preparation can help prevent some of the most common errors from occurring; unforeseen risks, however, will always remain a factor. In order to be on top of your...

Server Backups with rsync

A server backup is the best method for securing the data of your online projects, thereby preventing any damaging losses. Server environments are especially in need of cleverly devised backup strategies that take every type of device into account. Here, backup programs become essential. Free applications, like rsync, offer reliable and compelling alternatives to their expensive conventional...

Traceroute: the simplest way to follow data routes

Whether at home or at your business: network issues can really grind one’s gears. When ensuring that all the cables have been connected and the settings have been checked multiple times is of no help, it may be time to make use of traceroute or tracert. These help users find the source of all their frustration.

Securing your server with Fail2ban

For server operators, security is of the utmost importance. Only those who have developed and set up a foolproof defense strategy are ready for drastic situations. As well as regular protection mechanisms, like security software, backups, and encryption, there are also some useful tools and frameworks that may come in handy in the fight against intruders. We have laid out essential details on the...

Optimal password protection: how to choose a strong password

It only takes a few seconds for a hacker to gain access to your private data without you having any idea. More often than not, a password is the only means of protection when logging into online services; and if it is too obvious, it will not prove too much of a challenge for criminals to crack. There are numerous options to increase password security.

Backing up your database

Backing up your data is a popular option for securing your database. In order to create backup copies, you need additional hardware and to install a suitable backup structure. How do you secure your own network and web server against attacks and proceed to protect your databases?

How to use SSH keys for your network connection

Operating and managing a remote server located in a data center is often carried out by using a secure network connection provided by the SSH protocol. The necessary registration on the server is preceded by an authentication process. Usually this occurs in the form of the username and password. Alternative methods such as the public key authentication used by SSH, do have their advantages. But...