Network

Hostname

Hostname

A computer’s unique name on a network is the hostname, site name or computer name. The hostname is part of the fully qualified domain name, which can be used (for example) to find and access websites on the internet. Here you’ll learn what a hostname looks like, and we’ll show you various ways to determine the hostname using an IP address or how to change it.

Raspberry Pi at a glance: 10 great Raspberry Pi projects

Raspberry Pi at a glance: 10 great Raspberry Pi projects

Raspberry Pi is an inexpensive small form factor PC that can behave like a standard computer in many respects. Users can use this innovative mini-computer for all kinds of functions, from setting up an operating system to surfing the web, to using it as a server or a media center, and much more besides. Discover 10 interesting Raspberry Pi projects to try out at home.

ECC RAM: memory solution for secure data

ECC RAM: memory solution for secure data

Memory is one of the most important components of a computer system and is particularly important for processing large amounts of data. In addition to increasing the storage capacity, it is also necessary to guarantee the security of the data. Bit errors, for example, are one of the key foes that ECC RAM is battling against to protect the main memory. To date these error-correcting memory modules...

Subnetting: How do subnets work?

Subnetting: How do subnets work?

Dividing a corporate network into smaller subnets has some advantages in terms of speed, security, and logical organization. However, many people find it difficult to set up. Binary computational operations and long series of numbers are frightening, but the principle itself is not so complicated. We explain what subnetting is, how to calculate a subnetmask, and what you need subnets for, so that...

Remote access for network storage

Remote access for network storage

Are you using a NAS system as a home server and want to connect it to the internet? It’s simple to do. We explain how to assign a fixed LAN IP address to your network storage and open the corresponding ports for the desired service in the router firewall. You will also learn how to make your NAS system permanently available under a consistent address despite daily disconnections carried out by the...

CIDR: Classless Inter Domain Routing

CIDR: Classless Inter Domain Routing

The internet – just like other large networks – must be precisely subdivided. The network classes, used until the 1990s and not yet completely gone from the scene, were far too inflexible for the requirements of the digital world. CIDR can help: With classless inter-domain routing, it’s possible to create effective subnets and routes. We explain how this works.

Man-in-the-middle attack: an overview of attack patterns

Man-in-the-middle attack: an overview of attack patterns

A man-in-the-middle attack is a deceitful espionage attack which aims to listen, record, or manipulate sensitive data being sent between unsuspecting internet users. To do this, hackers rely on methods that enable them to position themselves, unnoticed, between two or more computers communicating with one another. We introduce you to some well-known attack patterns and countermeasures that can be...

Brute force attack: definition and protective measures

Brute force attack: definition and protective measures

Being constantly faced with headlines about stolen passwords, it’s understandable that many users are concerned. Your best bet is to make your passwords as complicated as possible and have them consist of many different types of characters. But even this won’t help if it’s the actual log-in area that isn’t secure enough. Even today, attackers are still successful with the notorious and simple...

Network protocol: Standards for data exchange

Network protocol: Standards for data exchange

For computer systems to be able to communicate with each other and exchange information, they need common ground, just like humans must share a common language. But computers don’t rely on foreign language lessons, and instead only need the appropriate network protocol to successfully communicate. This provides guidelines and structures for the data transfer, and so plays a decisive role in the...

What is Internet protocol? – IP definition, etc.

What is Internet protocol? – IP definition, etc.

When networking a computer system, protocols play an important role. An example is the Internet Protocol, which was published in a first specification in 1981, and is the indispensable basis for the smooth sending and receiving of data packets. But what is behind the RFC standard? And how does the internet protocol actually work?