Raspberry-Pi-NAS

Using Raspberry Pi as NAS (network-attached storage)

If you are looking for a central storage system for your own files, you will find the right solution in an NAS system (network attached storage). Since these pre-fabricated boxes are not cheap, using Raspberry Pi as an NAS server host is becoming more and more popular. Combined with USB hard disks or sticks that can be bought anywhere, the minicomputer becomes the perfect storage device for music,...

Twitch Streaming: Tutorials for PC, PS4 and Xbox

Twitch stream tutorial: how do you stream on Twitch?

Twitch has become of the most popular streaming platforms worldwide in recent years. Gamers in particular, will get their money’s worth with the wide range of video game broadcasts. But what exactly are the requirements and challenges that need to be met or mastered when publishing and maintaining a stream on Twitch? Our Twitch Stream tutorial provides guides for PC, Xbox, and PlayStation users.

Set up your own Debian FTP server with ProFTPD

Debian FTP server: how to install and configure your own

FTP servers are suitable solutions if you want to make files available for download or offer multiple users a platform for storing and accessing data. The practical server-client technology also plays an important role in the maintenance of web presences. This tutorial explains how to install and set up your own Debian FTP server.

How to set up a proxy server in your browser

How to set up a proxy server with Windows

Proxy settings can be established quickly and easily via the operating system’s control panel or browser menu. Discover exactly how to do this with our comprehensive step-by-step introductions for Windows 7, 8, and 10. A faulty proxy configuration can cause connection failures, but there are simple ways to detect the causes and rectify these errors.

Squid: the license-free caching server for your web project

Squid - the cross-platform open source proxy

If you’re optimising your website, then you shouldn’t just turn to content and design; it’s important to also make sure that you invest ample time into the functionality of your website. Usability and loading time are just as important for a website’s success as high-quality and regularly offered content. A long loading time is one of the main causes of high bounce rates. The simple solution: a...

Linux commands: An overview of terminal commands

An overview of the most important Linux commands

Under Linux, all actions that you can carry out with the mouse and window system via the graphical user interface can also be performed using programme calls in the terminal – provided you know the appropriate command and how to use it according to the correct syntax. To make working in the terminal easier, we provide you with an overview of basic Linux commands with detailed descriptions and...

Ubuntu FTP server: Installation and configuration

Ubuntu FTP server: How the setup functions

For the past 30 years, the file transfer protocol (FTP) has supported computer users with the transfer of data in TCP/IP networks. FTP servers enabled not only the upload but also the download of files, in which each access is controlled via a separate connection. In this Ubuntu FTP server tutorial, you’ll learn how to install, configure, and run your own server under the Linux distribution.

DHCP: An overview of the Client/Server protocol

DHCP: What’s behind the Dynamic Host Configuration Protocol

If you’re connected to an internet router and power on your computer, it automatically obtains the necessary network parameters, such as the IP address, subnet mask, or DNS server. This is made possible by the Dynamic Host Configuration Protocol (DHCP), which simplifies address assignment when connecting to the internet and makes setting up local networks easy as pie.

Securing a server: correctly configuring Linux, etc.

The right configuration to secure your server

If you operate or rent your own server, it is your responsibility to protect it against failures and external access. You can immediately begin to set the foundation for this when configuring the server, if you have the necessary administrative rights. The correct settings can work wonders, especially with encrypted remote connections via SSH protocol, and greatly increase security.

HTTPoxy: Behind the CGI vulnerability

HTTPoxy: Threatening the security of CGI applications

Fifteen years after the discovery of the security flaw HTTPoxy, it’s still an issue with CGI applications. The reason for this is the fact that the Common Gateway Interface standard provides the use of environment variables to process HTTP requests. These can include header contents that modify the original proxy configuration, allowing hackers to redirect data packets to a completely foreign...


General

Wait! We’ve got something for you!
Get your .co.uk domain now, the first year is free.

Enter the web address of your choice in the search bar to check its availability.
12 month for £0/year
then £10/year