In Windows, you can adapt frequently required shutdown routines to your individual needs in many different ways. For this, Windows provides an appropriate tool in the command line, which is also referred to as the prompt – CMD or cmd.exe. We introduce shutdowns via CMD, which can handle efficient, simple, but also more complex shutdown routines.
The ping flood is a type of denial-of-service attack that can affect commercial providers and home users alike. This attack relies on the ICMP protocol and the ping command. In order to unleash a particularly powerful flood, attackers often use a network of bots. Learn how the ping flood works and how you can protect yourself from one.
What is a network? Simply put, one of the most fundamental achievements in IT. Nowadays, most of us can no longer imagine a world without Wi-Fi, cell phones or the Internet. But how exactly do these computer networks work? And what does setting up a network involve? In this article, we’ll explain the most important principles of networks.
Remote access to remote computer systems has always been a part of well-organised networks. Administrators can manage individual users as well as work on the move since a remote connection enables access to company data. One of the first protocols developed specifically for this purpose was Telnet.
Netsh is a versatile command line tool for administrating networks on Windows. Once you’ve learned the syntax and its special structure, you can solve a range of tasks and problems. Get to know the Netsh commands and find out how to administrate Windows networks comfortably, and efficiently via Windows command prompt.
For computer systems to be able to communicate with each other and exchange information, they need common ground, just like humans must share a common language. But computers don’t rely on foreign language lessons, and instead only need the appropriate network protocol to successfully communicate. This provides guidelines and structures for the data transfer, and so plays a decisive role in the...
A stable network is characterised not only by the appropriate hardware structures, but also by a watertight security concept. In addition to back-up solutions and intelligent fail-safe systems, protection against external access attempts is a must. Intrusion detection systems (IDS) and intrusion protection systems (IPS) are an excellent addition to the classic firewall and are therefore a sensible...
UDP flood attacks have been used in the past for denial-of-service attacks. Even servers for major organisations have collapsed under the massive amounts of data. We’ll explain how a UDP flood attack works and provide you with an overview of its technical background, proven security measures, and how it is different from other DoS attacks.
The NTLM protocol was a practical solution for Windows devices for a long time: A user just had to sign in once and then gain direct access to various network services. However, this authentication method is now considered unsafe and is no longer in use. How does NTLM work, and why do users now prefer to use Kerberos?
The Banana Pi isn’t big, but the single-board computer can be successfully used for a variety of applications. For example, this versatile competitor of Raspberry Pi can be used as a cloud, VPN or file server as well as a smart home controller or a router. We will show you ten Banana Pi projects which demonstrate the remarkable potential of the compact miniature computer.