Whether emails or online banking, two-factor authentication has become a security standard when accessing user accounts online. Entering a password alone is no longer sufficient to log in. To secure your Google account, the Internet giant provides its own Google Authenticator app, which generates a unique code every time you log in. Read on to find out how to set it up.
Pathping records and analyses the path travelled by data packets and generates useful statistics about network performance. This diagnostic tool also records data packet loss. Once data has been collected using pathping, the network can then be optimised in a targeted manner. Here you will learn about this powerful CMD command and its options.
SSD life span is an important factor in data security and efficient backup strategies. Are electronic flash memories as reliable as classic hard drives with magnetic storage? When does their service life end, and are there any indications of an imminent failure? What should you do in the event of an emergency? Is data recovery possible, and is it even worth it?
Anycast is a routing scheme that is used to optimise data traffic in networks. Parallel accessible servers, which are assigned the same anycast address, distribute loads better and compensate for network problems. Hacker attacks can also cause less damage. We’ll explain how it works, as well as the advantages of anycast.
Relational database systems such as MySQL no longer necessarily have to be hosted in-house. With Database as a Service – or DBaaS for short – one or more databases are outsourced to the cloud, saving costs and capacity. Here we explain how DBaaS works, what it’s suitable for, and what advantages and disadvantages it has.
Although Linux distributions can also be controlled via a graphical interface, many things can be done more quickly via commands in the command line. For example, you can use SED under Linux to revise complete databases with just one line. To do this, however, you need to be familiar with the options and functions of the command, as well as with regular expressions. We’ll make it easy for you to...
The Linux SCP command used to be the standard for securely copying files between computers in a network. These days, the tool has become outdated and eclipsed by more powerful alternatives. We explain how to use the command and give practical examples, before presenting two great alternative tools.
Want to know how to show hidden folders in Windows? By default, the Windows operating system hides numerous files and folders to prevent the user from accessing them. Most of these files are important system files that are protected for a good reason, but sometimes you need to display them anyway. In this guide, we’ll show you how with step-by-step instructions.
From PDF to JPG and TXT, there are countless different file extensions out there. These extensions are the last part of a file name and are separated from the actual name by a dot. Nowadays, there are so many that it is easy to lose track of them. In this article, you will learn about the most important file extensions for image files, text documents, media files and more.
Google, Amazon, Facebook, Alibaba, Tencent: Data infrastructure is dominated by a few large corporations, none of which come from Europe. Gaia-X aims to change that. A group of politicians, businesspeople, and researchers hope the concept will strengthen the development of European digital projects, and increase the importance of transparency, data protection, and cloud independence.
IONOS Server Guide: professional tips on configuration and administration
Servers are what make up the physical basis of the internet. Setting up your own professional site, putting products online for sale, or connecting multiple company locations with one another: all of these tasks require the support of high-performance computers. And it doesn’t matter if you purchase hardware resources for your own data center or opt for the flexibility of cloud services: operating a server comes with the challenge of independently configuring and administering hardware components. But don’t worry, there’s a lot of support out there for these tasks. In the Server Guide of IONOS’s Digital Guide series, you’ll find regular articles, news, and tutorials on how to operate this indispensable component of today’s IT infrastructure.
Server information for businesses, developers, and tech hobbyists
Packed with practical tips, our guide covers a wide spectrum of topics primarily aimed at mid-sized companies, freelance developers, and tech hobbyists. While some articles, like ‘What is a server?’ or ‘DNS – name resolution online’ cater more to beginners, experts are by no means left hanging; there’s a wide range of detailed texts and tutorials on important tasks like choosing the best operating system, filling security gaps, or getting the best possible performance out of your software and hardware.
What you can expect in the IONOS Server Guide
If you take a look, you’ll notice our guide is divided into four different subcategories, each covering a different topic. The ‘KnowHow’ area sets out to familiarise beginners with the basics of operating a server. Details on different server types and how to use them are also laid out here. Tips and tricks on managing server software is found under the keyword, ‘Configuration’. The category, ‘Security’ is all about dealing with potential problems server operators may encounter from online threats. Conventional methods of attack, like viruses, worms, and Trojans, and what you can do to combat them are explained here. And the category, ‘Tools’, provides useful guidance on what resources can help make administering your server a more manageable task.