Network

Remote desktop: Success of the application

Remote desktop connections are indispensable for day-to-day business. More than anything, allowing remote control access from another computer saves time: Whether for support, online conferences, or home office — with remote desktop, you can easily and conveniently connect your computer to distant devices. Private users also benefit from remote use: By connecting with different operating systems, [...]   

What is a DDNS (dynamic DNS)?

Being able to access your home computer from another location is no longer a complicated matter thanks to remote connection. It is handy to be able to use your computer from the office and swap files. But IP addresses change often and this throws a spanner in the works. DynDNS (DDNS) services are the solution. In this article, we explain what these are and how you can access your computer via the [...]   

Set up ownCloud with Raspberry Pi

With ownCloud software, your Raspberry Pi can be used as a private cloud, performing the same kind of tasks as clouds from major providers such as Google, Amazon, and Dropbox. Cost-effectiveness is just one of many the benefits of creating your own personal cloud; another is the privacy and security of your data. This step-by-step Raspberry Pi cloud tutorial explains how to set up ownCloud.   

Man-in-the-middle attack: an overview of attack patterns

A man-in-the-middle attack is a deceitful espionage attack which aims to listen, record, or manipulate sensitive data being sent between unsuspecting internet users. To do this, hackers rely on methods that enable them to position themselves, unnoticed, between two or more computers communicating with one another. We introduce you to some well-known attack patterns and countermeasures that can be [...]   

How to set up a proxy server in your browser

Proxy settings can be established quickly and easily via the operating system’s control panel or browser menu. Discover exactly how to do this with our comprehensive step-by-step introductions for Windows 7, 8, and 10. A faulty proxy configuration can cause connection failures, but there are simple ways to detect the causes and rectify these errors.   

What is a reverse proxy?

Cyber criminality is a big issue for most companies’ IT departments. Online attacks threaten the security of private networks and cause millions of dollars of damage per year. Popular targets are servers that provide online services and therefore require a permanent internet connection. An extra layer of security can be applied by using an upstream network component – the reverse proxy. This [...]   

What is a proxy server?

A proxy server is a network component that provides an interface between a private network and the internet. A proxy makes it possible to have an influence on the data traffic, to cache packet data, and to conceal the identity of the communication partners by using different IP addresses.   

How to install an Apache web server

The Apache http server is the standard web server for providing HTTP documents on the internet. But did you know it’s also possible to install an apache web server locally on your Windows PC? This is a great method of testing out web pages and checking scripts. To get started, all you need is the free software package and a few minutes.   

Debian – the universal system software

Anyone looking to learn about Linux operating systems will come across Debian soon enough. The GNU/Linux distribution was one of the first of its kind and is still one of the most widely used today. Over 1,000 community members work on the Debian project, furthering the development of the collection. But how did Debian become so successful? And what makes this system software so interesting to [...]   

ARP Spoofing: Attacks from the internal network

When it comes to network security, administrators focus primarily on attacks from the internet. But often times, the danger lurks in the internal network. If the LAN turns out to be a blind spot in the security IT, then internal attackers have an easy time. A popular method of attack is ARP spoofing. With this, hackers switch undetected between two communication partners in order to intercept, [...]