Network

Ping flood

Ping flood

The ping flood is a type of denial-of-service attack that can affect commercial providers and home users alike. This attack relies on the ICMP protocol and the ping command. In order to unleash a particularly powerful flood, attackers often use a network of bots. Learn how the ping flood works and how you can protect yourself from one.

Internet lite: North Korea’s 28 Domains

North Korea: 28 domains for 25 million inhabitants

In so far as is possible, the communist state of North Korea has managed to shut itself off from the rest of the world. However, a western IT expert recently succeeded in sneaking a peek at their internet domains and as a result we now know that there are only 28 domains for the entire country. From recipes to maritime affairs, here you’ll find an insight into what a North Korean can find online. ...

Raspberry Pi projects

25 Raspberry Pi projects that show the possibilities of the mini computer

Raspberry Pi is an inexpensive micro-computer that can behave like a standard computer in many respects. The innovative mini device can be used for a wide range of tasks - from setting up an operating system to surfing the web, to using it as a server or a media centre. Discover these interesting Raspberry Pi projects to try out at home.

Deleting a Telegram account

Deleting a Telegram account

Deleting a Telegram account is almost as easy as making one. We explain why people are making the move away from Telegram, how to completely delete your account, and what happens after you’re done. You should be aware that you can’t recover a deleted telegram account. Keep reading for a step-by-step guide including screenshots.

Set up a Raspberry Pi web server with LAMP

Using Raspberry Pi as a web server

Have you always wanted to operate your own web server? Raspberry Pi makes this goal more realistic, without commanding a high price and expert-level knowledge for set-up: hosting a website’s test environment or a private cloud is just as manageable for the small computer as controlling light sources, heaters, or other home devices (home automation). In our tutorial, you’ll find out all you need to...

Brute force attack: definition and protective measures

Brute force attacks: when passwords are served on a silver platter

Being constantly faced with headlines about stolen passwords, it’s understandable that many users are concerned. Your best bet is to make your passwords as complicated as possible and have them consist of many different types of characters. But even this won’t help if it’s the actual log-in area that isn’t secure enough. Even today, attackers are still successful with the notorious and simple...

What is Google Chat?

Google Chat: Communication tool for virtual teamwork

Google Chat facilitates virtual team communication and quick exchange of information and documents. The new tool from Google replaces Google Hangouts and offers a range of features. For example, you can send direct messages, create chat rooms, and connect directly to Google Workspace and Google Meet. In this article, we’ll go over Chat’s most important features and functions.

ECC RAM: memory solution for secure data

ECC RAM – the error-correcting code memory

Memory is one of the most important components of a computer system and is particularly important for processing large amounts of data. In addition to increasing the storage capacity, it is also necessary to guarantee the security of the data. Bit errors, for example, are one of the key foes that ECC RAM is battling against to protect the main memory. To date these error-correcting memory modules...

Video conferencing

Video conferencing: How to make virtual meetings a success

Flexible working models are hard to imagine without video conferencing. Employees from different locations can meet easily for personal exchanges on a digital platform. But which software is recommended for optimal video conferencing? How can you make video conferencing more effective? We have compiled the most important tips.

Squid: the license-free caching server for your web project

Squid - the cross-platform open source proxy

If you’re optimising your website, then you shouldn’t just turn to content and design; it’s important to also make sure that you invest ample time into the functionality of your website. Usability and loading time are just as important for a website’s success as high-quality and regularly offered content. A long loading time is one of the main causes of high bounce rates. The simple solution: a...


Own your online success
IONOS takes care of your online challenges
Create your website with the perfect domain and the UK's fastest hosting!