Network

What is Neighbourhood Discovery Protocol(NDP)?

Neighbour Discovery Protocol (NDP) – what is it?

Network configurations today are done quickly. For those who do not rely on their own fixed settings for routers, computers, and more, the Internet Protocol family provides the appropriate set of automatic mechanisms to determine critical parameters, such as the default gateway, IP address, and MAC address.

What is a floating IP?

What is a floating IP?

IP addresses are essential for modern digital communication. They are the 'connection numbers' of all devices in the network and this is why they are one of key foundation elements of the internet as well as other networks. Communication is based on a common 'language': the internet protocol. But what exactly is a floating IP and what is it used for? What is the difference between a floating IP of...

Nagios – an overview of all network processes

Nagios: the standard server for monitoring IT infrastructure

IT departments are not to be envied: all devices, servers, databases, etc., must not only be integrated into the network, but also work at any time. In order to prevent any problems that might arise in advance, Nagios is the monitoring tool you need in your standard IT repertoire. What makes the open source solution so special and what are the alternatives?

Port scanning: introduction and basics

How port scanning contributes to your system’s security

It’s easy to lose track of all the different programs that are responsible for inbound and outbound data traffic. Networks hosting a large number of computer systems that are constantly communicating with online services often require technical backup. High-performance tools check the activities of various applications or computers and can close existing security gaps. Using port scanners is one...

Penetration testing – the complete network check

Penetration test: how to find weak points in your network

The more complex a network is, the more vulnerable it is to attacks. In times when customers and partners have access to internal network structures via the internet, and can control various applications via web interfaces, IT employees are encountering more and more problems. Large companies, in particular, prefer to use penetration testing to check how well their security concept works. This...

Display advertising vs. real-time advertising (RTA)

Display advertising/display marketing vs. real-time advertising (RTA)

Banner ads and other forms of display marketing have been proven to be effective marketing strategies for products and services online. The new practice in this field is real-time advertising (RTA) and its real-time bidding (RTB) approach. This new strategy carries out an automated bidding war in milliseconds to decide which advert will be displayed. But how does it differ from traditional display...

iptables tutorial –  rule sets for creating data packets

iptables tutorial: how to configure the filter tables of Linux kernels

Since the first version, Linux kernel has been implementing packet filter modules, with which filter tables can be created. However, additional programs such as iptables are required to configure the rule set. In our tutorial, we present the free software for the Linux kernel 2.4 and 2.6 and give you a little insight into how it all works.

What is a demilitarized zone?

Demilitarised zones: internal network protection

Companies hosting their own websites, an online shop, or e-mail inboxes should make sure to separate the corresponding server of these from the local network. This makes it possible to protect devices within the company network from hacker attacks that take place on public networks. Solid protection comes in the form of a demilitarised zone, which separates endangered systems from sensitive...

Hardware firewall: the more stable firewall solution

Hardware firewall – the external security system

Most computer users are at least aware of the term firewall. When activated, they help protect computers. But notifications about blocked applications can become a source of irritation for many users, especially when the background information for such messages is unknown. But how do firewalls work? And what role do hardware firewalls play in protecting your computer?

Web server: definition, background, software tips

What is a web server? And which web server software is there?

The equation is simple - without it, there’s simply no web content: when a web server is out of order, then it’s no longer possible to call up any websites that are connected to it. Web servers are what allow online presences to reach the internet in the first place. But just how do these systems work? Which functions do the programmes responsible for this task offer? And what’s an example of a...


Wait! We’ve got something for you!
Get your .co.uk domain for just £1/1st year.

Enter the web address of your choice in the search bar to check its availability.
12 months for £1
then £10/year