Protocols

Terminal Servers – the Secret Behind Remote Hosts

In the days of mainframe computers and the first smaller networks, terminals were a crucial building block for sharing hardware and software resources. It is no coincidence that terminal servers – the central administrative entity of such networks – are in demand decades later, now that applications are to be made available to multiple users.

clear cookies

Some cookies can be very helpful – they let you sleep on those impulse purchases and keep them from disappearing out of your shopping cart, or log into social media sites with just one click. But not all cookies make surfing the web easier, and some may even forward unwanted information to third parties. It is a good idea to learn how to clear cookies, and this guide will show you how to clear...

Network protocol: Standards for data exchange

For computer systems to be able to communicate with each other and exchange information, they need common ground, just like humans must share a common language. But computers don’t rely on foreign language lessons, and instead only need the appropriate network protocol to successfully communicate. This provides guidelines and structures for the data transfer, and so plays a decisive role in the...

Server Name Indication

What is server name identification, really? Encryption technologies play a big role when it comes to surfing on the net. Credit card data and other personal information must not fall into the hands of criminals. For now, TLS is one of the protocols used for this purpose. But it has a disadvantage: it only functions when each IP address only hosts one domain. If multiple virtual services are...

401 error: What can you do about it?

You’re surfing around on the internet, but instead of getting the desired content you only receive an error message: annoying or even downright frustrating. Especially if you don’t exactly know what the status is supposed to mean. How are you expected to solve the problem, if you don’t know what’s causing it? This also goes for the error 401. Here we explain what the error means and what you can...

HTTP 400 Bad Request | finding the causes

Internet users are often confronted with error messages. HTTP status codes can be especially annoying, and even more so if you don’t understand what they mean. The message 'HTTP 400 – Bad Request' is a mystery for many internet users, but luckily it can be solved in most cases. We explain what the error message means and how to fix the error.

Web stacks: the basics and examples

Terms like web stack or web application stack refer to software packages that are used to develop and operate websites and web applications. The most well-known example of this technology, the LAMP stack, has witnessed increasing competition through the likes of JavaScript-based framework bundles, which feature unified programming languages for servers and clients. This gives them a considerable...

ERR_SSL_PROTOCOL_ERROR: the best solutions

Chrome is the world’s most widely-used internet browser. The application scores points not only when it comes to security and speed, but also with its features such as cross-device synchronization of user data. But errors can occur even when surfing with Google’s wonder weapon. These can lead to the browser crashing or prevent certain pages from being accessed. The error message...

Log analysis: User statistics from the server log

How many pages are accessed by a single user when they’re visiting your website? And which links or search queries did they use to lead them to you? To answer such questions, well-known web analysis tools like Google Analytics seem to be the only option. But the web server’s automatically generated log file also provides a solid foundation for user information. The following guide discusses the...

Encryption methods: An overview

E-mail, instant messaging, or voice-over IP: If you want to communicate over the internet, you should make sure that the data transfer process can be trusted. The same goes for the World Wide Web. With online banking and digital shopping, money transactions are increasingly being carried out online. Popular encryption methods like DES, AES, or RSA should guarantee the security of passwords, credit...