Debian – the universal system software

Debian: what does this Linux kernel offer?

Anyone looking to learn about Linux operating systems will come across Debian soon enough. The GNU/Linux distribution was one of the first of its kind and is still one of the most widely used today. Over 1,000 community members work on the Debian project, furthering the development of the collection. But how did Debian become so successful? And what makes this system software so interesting to...

Edge computing

Edge Computing – Calculating at the edge of the network

Autonomous cars, intelligent factories and self-regulating supply networks – a dream world for large-scale data-driven projects that will make our lives easier. However, what the cloud model is and how it works is not enough to make these dreams a reality. The challenge of effectively capturing, evaluating and storing mass data requires new data processing concepts. With edge computing, IT...

Video conferencing

Video conferencing: How to make virtual meetings a success

Flexible working models are hard to imagine without video conferencing. Employees from different locations can meet easily for personal exchanges on a digital platform. But which software is recommended for optimal video conferencing? How can you make video conferencing more effective? We have compiled the most important tips.

SYN flood

SYN flood attack: variants and countermeasures

The attack pattern of a SYN flood attack has been known since the early years of the World Wide Web. Over time, new attack variants and appropriate protective measures have arisen. DDoS attacks with massive data flows originating from botnets are currently the norm. Learn how SYN flood attacks work. We will explain the concepts of these attacks and countermeasures.

Shutdown Commands via CMD

Shutdown via CMD: An overview of windows shutdown commands

In Windows, you can adapt frequently required shutdown routines to your individual needs in many different ways. For this, Windows provides an appropriate tool in the command line, which is also referred to as the prompt – CMD or cmd.exe. We introduce shutdowns via CMD, which can handle efficient, simple, but also more complex shutdown routines.

Ping flood

Ping flood

The ping flood is a type of denial-of-service attack that can affect commercial providers and home users alike. This attack relies on the ICMP protocol and the ping command. In order to unleash a particularly powerful flood, attackers often use a network of bots. Learn how the ping flood works and how you can protect yourself from one.

Telnet – the system-wide remote protocol

What is telnet?

Remote access to remote computer systems has always been a part of well-organised networks. Administrators can manage individual users as well as work on the move since a remote connection enables access to company data. One of the first protocols developed specifically for this purpose was Telnet.

Network protocol: Standards for data exchange

Network protocol: The basis of electronic data exchange

For computer systems to be able to communicate with each other and exchange information, they need common ground, just like humans must share a common language. But computers don’t rely on foreign language lessons, and instead only need the appropriate network protocol to successfully communicate. This provides guidelines and structures for the data transfer, and so plays a decisive role in the...

Intrusion detection systems and prevention systems

The intrusion detection and intrusion prevention systems at a glance

A stable network is characterised not only by the appropriate hardware structures, but also by a watertight security concept. In addition to back-up solutions and intelligent fail-safe systems, protection against external access attempts is a must. Intrusion detection systems (IDS) and intrusion protection systems (IPS) are an excellent addition to the classic firewall and are therefore a sensible...

UDP flood

UDP flood

UDP flood attacks have been used in the past for denial-of-service attacks. Even servers for major organisations have collapsed under the massive amounts of data. We’ll explain how a UDP flood attack works and provide you with an overview of its technical background, proven security measures, and how it is different from other DoS attacks.

Wait! We’ve got something for you!
Get your domain for just £1/1st year.

Enter the web address of your choice in the search bar to check its availability.
12 month for £1/1st year
then £10/year