Dynamic DNS (DynDNS): making remote control easier

Being able to access your home computer from another location is no longer a complicated matter thanks to remote connection. It is handy to be able to use your computer from the office and swap files. But IP addresses change often and this throws a spanner in the works. DynDNS (DDNS) services are the solution. In this article, we explain what these are and how you can access your computer via the...

CIDR: what is classless inter-domain routing?

The internet – just like other large networks – must be precisely subdivided. The network classes, used until the 1990s and not yet completely gone from the scene, were far too inflexible for the requirements of the digital world. CIDR can help: With classless inter-domain routing, it’s possible to create effective subnets and routes. We explain how this works.

What is a broadcast address and how does it work?

Broadcasting is one of the most diverse means of communicating in a network. A data packet is sent to an entire network from one point, without having to specify one or more recipients. You direct your data packet to the broadcast address to do this. In this article, we explain what the broadcast IP is and how you can find out this address. We also give you a simple explanation of what a broadcast...

Bluetooth: everything you need to know about the popular wireless standard

“Does it have Bluetooth?” This is a question you hear all the time in electronic shops, which is completely understandable, since this small, blue runic symbol has been a defining marker in our digital lives for quite some time, longer than most other wireless technologies. Even conventional kitchen appliances and motorcycle helmets all come with Bluetooth chips. You will find everything you need...

Cloud Storage: How does data storage in the cloud work?

Portable storage media such as CDs or USB sticks are still in demand when making backups or transferring files to another device. More and more often however, users also rely on cloud storage solutions that allow data to be outsourced to an external server environment. But what exactly is cloud storage? And how does this storage model offered by various providers work?

What is a private cloud? More control and security for your business

Should data and processes be handled in a private or public cloud? If a company wants to use cloud computing, they first need to choose one of the many providers available. Using the personalised services offered by a private cloud, companies can address a wide range of business related and operational challenges. Separating operations also makes a private cloud more secure than a public cloud.

The public cloud – more computing for everyone!

Cloud computing is an important aspect of digitisation. An offshoot of this technology is the public cloud, which provides storage space and IT services publicly on the internet. Data protectors see certain dangerous weaknesses in this concept, but public access offers enormous potential, and data protection concerns are increasingly stimulating innovative solutions. We explain what lies behind...

VLAN | What is a virtual local area network?

A VLAN offers you the chance of quickly creating a more orderly and cost-effective large company network. Administrators know how difficult it is to change the entire network installation due to changes in the corporate structure. A virtual LAN allows you to avoid these problems and to easily configure everything through software.

Unicast: Targeted connection between two points

Do you want your data to reach just one recipient? Then send a unicast. Whether it is IPv4 or IPv6, unicasts find the right target. Accessing websites, sending e-mails, file transfers all use this form of addressing. But what is technically behind it, and how do unicast and multicast differ?

IP addresses: Everything you need to know

Without IP addresses, online communication wouldn’t work. After all, routers – the “post offices” of the internet – need a specific instruction on where to send a data packet. But the topic also has its drawbacks: what else are IP addresses used for, besides websites and emails? Employed as a tool by trackers and hackers, they’re increasingly attracting the attention of data protection advocates.