Network

Nagios – an overview of all network processes

Nagios: the standard server for monitoring IT infrastructure

IT departments are not to be envied: all devices, servers, databases, etc., must not only be integrated into the network, but also work at any time. In order to prevent any problems that might arise in advance, Nagios is the monitoring tool you need in your standard IT repertoire. What makes the open source solution so special and what are the alternatives?

Port scanning: introduction and basics

How port scanning contributes to your system’s security

It’s easy to lose track of all the different programs that are responsible for inbound and outbound data traffic. Networks hosting a large number of computer systems that are constantly communicating with online services often require technical backup. High-performance tools check the activities of various applications or computers and can close existing security gaps. Using port scanners is one...

Penetration testing – the complete network check

Penetration test: how to find weak points in your network

The more complex a network is, the more vulnerable it is to attacks. In times when customers and partners have access to internal network structures via the internet, and can control various applications via web interfaces, IT employees are encountering more and more problems. Large companies, in particular, prefer to use penetration testing to check how well their security concept works. This...

Display advertising vs. real-time advertising (RTA)

Display advertising/display marketing vs. real-time advertising (RTA)

Banner ads and other forms of display marketing have been proven to be effective marketing strategies for products and services online. The new practice in this field is real-time advertising (RTA) and its real-time bidding (RTB) approach. This new strategy carries out an automated bidding war in milliseconds to decide which advert will be displayed. But how does it differ from traditional display...

Set up a Raspberry Pi web server with LAMP

Using Raspberry Pi as a web server

Have you always wanted to operate your own web server? Raspberry Pi makes this goal more realistic, without commanding a high price and expert-level knowledge for set-up: hosting a website’s test environment or a private cloud is just as manageable for the small computer as controlling light sources, heaters, or other home devices (home automation). In our tutorial, you’ll find out all you need to...

iptables tutorial –  rule sets for creating data packets

iptables tutorial: how to configure the filter tables of Linux kernels

Since the first version, Linux kernel has been implementing packet filter modules, with which filter tables can be created. However, additional programs such as iptables are required to configure the rule set. In our tutorial, we present the free software for the Linux kernel 2.4 and 2.6 and give you a little insight into how it all works.

What is a demilitarized zone?

Demilitarised zones: internal network protection

Companies hosting their own websites, an online shop, or e-mail inboxes should make sure to separate the corresponding server of these from the local network. This makes it possible to protect devices within the company network from hacker attacks that take place on public networks. Solid protection comes in the form of a demilitarised zone, which separates endangered systems from sensitive...

Hardware firewall: the more stable firewall solution

Hardware firewall – the external security system

Most computer users are at least aware of the term firewall. When activated, they help protect computers. But notifications about blocked applications can become a source of irritation for many users, especially when the background information for such messages is unknown. But how do firewalls work? And what role do hardware firewalls play in protecting your computer?

Web server: definition, background, software tips

What is a web server? And which web server software is there?

The equation is simple - without it, there’s simply no web content: when a web server is out of order, then it’s no longer possible to call up any websites that are connected to it. Web servers are what allow online presences to reach the internet in the first place. But just how do these systems work? Which functions do the programmes responsible for this task offer? And what’s an example of a...

Log file analysis with open source tool, GoAccess

How log file analysis works with GoAccess

The log files of web servers and cloud services reveal a lot about the users that access them. They contain information about which browser or operating system is being used, which search terms have been entered and how many different pages a user has accessed, for example. Since manually analysing these extensive text files is nigh on impossible, you can use log file analysis programs such as...


Wait! We’ve got something for you!
Get your .co.uk domain now, the first year is free.

Enter the web address of your choice in the search bar to check its availability.
12 month for £0/year
then £10/year