Data centre security

How secure is a data centre?

 

When people talk about how secure cloud services are, they usually focus on issues such as data protection and defence against cyber-attacks. A major fire at a French cloud provider in early March raised the question of how well Internet data centres are protected against...

 

Microsoft Exchange Zero Day Attack

Microsoft Exchange Zero Day Attack

 

On March 6, Microsoft pointed out vulnerabilities in the Microsoft Exchange software. IONOS had already learned of the vulnerability on March 3 and immediately applied updates provided by Microsoft to all Exchange systems it operated itself in order to eliminate the...

 

What is a plug-in?

What is a plug-in and what is it used for?

Plug-ins have many advantages. For example, these small add-ons are the simplest solution if you want to play Flash videos on your website, display PDF files in your browser or spice up your e-mail application with new features. Plug-ins allow you to add practical features to almost any software. However, these useful little add-ons also present some risks.

Bootp protocol

BOOTP: All information on the DHCP forerunner

If you want to connect a computer, smartphone, etc. to a network (LAN or Wifi), you can either assign the IP address manually, or get it automatically. The latter is possible thanks to the DHCP (dynamic host configuration protocol) communication protocol, which has established itself as the cross-platform standard solution for address management. The forerunner was the BOOTP bootstrap protocol...

Partition a hard drive

How to partition a hard drive in Windows 10

Partitioning a hard drive is relatively simple and has several advantages. It makes it easier to manage your disk space and makes your data more secure in the event of an accident. Our step-by-step guide shows you how to partition a hard drive in Windows 10.

Dropbox alternatives for file hosting

The best Dropbox alternatives compared

Dropbox is one of the most famous and most successful cloud storage services available. Its success is largely due to its many functions and ease of use. But when it comes to data protection and maximum free online storage space, this popular app isn’t the pick of the bunch. There are other file hosting services that offer different approaches. Here’s our collection of some of the top alternatives...

Unix vs. Linux

Unix vs. Linux: a comparison of the two operating systems

Our in-depth comparison of Linux vs. Unix explores the close relationship between the two operating systems, the history of their development and their key differences. We provide a comparison of their advantages and disadvantages highlighting the strengths and weaknesses of the two systems which have established themselves as viable alternatives to Windows systems on the server market.

Best cloud storage providers

The best cloud storage providers – an overview of the best online storage

Storing files online on a cloud platform has become part of everyday life for many people. Storing files with online storage providers takes the load off your hard drive and ensures that they are available anytime and from anywhere. But what are the best cloud storage providers on the market? And what differences are there between them? Which one would be best for me?

Data centre security

How secure is a data centre?

When people talk about how secure cloud services are, they usually focus on issues such as data protection and defence against cyber-attacks. A major fire at a French cloud provider in early March raised the question of how well Internet data centres are protected against physical threats such as fire. What should cloud users bear in mind when choosing their provider and is there anything they can...

What is GAIA-X?

GAIA-X: the European digital project

Google, Amazon, Facebook, Alibaba, Tencent: Data infrastructure is dominated by a few large corporations, none of which come from Europe. GAIA-X aims to change that. German politicians, businesspeople, and researchers hope the project will strengthen the development of European digital projects, and increase the importance of transparency, data protection, and cloud independence.

What is CRI-O?

What is CRI-O?

Docker and Kubernetes are well-known technologies that are used for container-based virtualisation. With CRI-O there is now a bridge between the Container Runtime Interface (CRI) and the existing runtime environments and container images of the Open Container Initiative (OCI). Find out how CRI-O works in this article.

Microsoft Exchange Zero Day Attack

Microsoft Exchange Zero Day Attack

On March 6, Microsoft pointed out vulnerabilities in the Microsoft Exchange software. IONOS had already learned of the vulnerability on March 3 and immediately applied updates provided by Microsoft to all Exchange systems it operated itself in order to eliminate the vulnerabilities. IONOS systems were not affected by the attack wave.

Server

IONOS Server Guide: professional tips on configuration and administration

Servers are what make up the physical basis of the internet. Setting up your own professional site, putting products online for sale, or connecting multiple company locations with one another: all of these tasks require the support of high-performance computers. And it doesn’t matter if you purchase hardware resources for your own data center or opt for the flexibility of cloud services: operating a server comes with the challenge of independently configuring and administering hardware components. But don’t worry, there’s a lot of support out there for these tasks. In the Server Guide of IONOS’s Digital Guide series, you’ll find regular articles, news, and tutorials on how to operate this indispensable component of today’s IT infrastructure.

Server information for businesses, developers, and tech hobbyists

Packed with practical tips, our guide covers a wide spectrum of topics primarily aimed at mid-sized companies, freelance developers, and tech hobbyists. While some articles, like ‘What is a server?’ or ‘DNS – name resolution online’ cater more to beginners, experts are by no means left hanging; there’s a wide range of detailed texts and tutorials on important tasks like choosing the best operating system, filling security gaps, or getting the best possible performance out of your software and hardware.

What you can expect in the IONOS Server Guide

If you take a look, you’ll notice our guide is divided into four different subcategories, each covering a different topic. The ‘KnowHow’ area sets out to familiarise beginners with the basics of operating a server. Details on different server types and how to use them are also laid out here. Tips and tricks on managing server software is found under the keyword, ‘Configuration’. The category, ‘Security’ is all about dealing with potential problems server operators may encounter from online threats. Conventional methods of attack, like viruses, worms, and Trojans, and what you can do to combat them are explained here. And the category, ‘Tools’, provides useful guidance on what resources can help make administering your server a more manageable task.


Wait! We’ve got something for you!
Get your .co.uk domain for just £1/1st year.

Enter the web address of your choice in the search bar to check its availability.
12 months for £1
then £10/year