Network

What is a network?

What is a network? Definition, explanation, and examples

What is a network? Simply put, one of the most fundamental achievements in IT. Nowadays, most of us can no longer imagine a world without Wi-Fi, cell phones or the Internet. But how exactly do these computer networks work? And what does setting up a network involve? In this article, we’ll explain the most important principles of networks.

Telnet – the system-wide remote protocol

What is telnet?

Remote access to remote computer systems has always been a part of well-organised networks. Administrators can manage individual users as well as work on the move since a remote connection enables access to company data. One of the first protocols developed specifically for this purpose was Telnet.

Netsh

Netsh – how to manage networks with Netsh commands

Netsh is a versatile command line tool for administrating networks on Windows. Once you’ve learned the syntax and its special structure, you can solve a range of tasks and problems. Get to know the Netsh commands and find out how to administrate Windows networks comfortably, and efficiently via Windows command prompt.

Network protocol: Standards for data exchange

Network protocol: The basis of electronic data exchange

For computer systems to be able to communicate with each other and exchange information, they need common ground, just like humans must share a common language. But computers don’t rely on foreign language lessons, and instead only need the appropriate network protocol to successfully communicate. This provides guidelines and structures for the data transfer, and so plays a decisive role in the...

Intrusion detection systems and prevention systems

The intrusion detection and intrusion prevention systems at a glance

A stable network is characterised not only by the appropriate hardware structures, but also by a watertight security concept. In addition to back-up solutions and intelligent fail-safe systems, protection against external access attempts is a must. Intrusion detection systems (IDS) and intrusion protection systems (IPS) are an excellent addition to the classic firewall and are therefore a sensible...

UDP flood

UDP flood

UDP flood attacks have been used in the past for denial-of-service attacks. Even servers for major organisations have collapsed under the massive amounts of data. We’ll explain how a UDP flood attack works and provide you with an overview of its technical background, proven security measures, and how it is different from other DoS attacks.

NTLM (NT LAN Manager)

NTLM: How does this protocol work?

The NTLM protocol was a practical solution for Windows devices for a long time: A user just had to sign in once and then gain direct access to various network services. However, this authentication method is now considered unsafe and is no longer in use. How does NTLM work, and why do users now prefer to use Kerberos?

Banana Pi: useful applications and ideas for projects

10 Banana Pi projects that make the most of this mini-computer

The Banana Pi isn’t big, but the single-board computer can be successfully used for a variety of applications. For example, this versatile competitor of Raspberry Pi can be used as a cloud, VPN or file server as well as a smart home controller or a router. We will show you ten Banana Pi projects which demonstrate the remarkable potential of the compact miniature computer.

Hyper-converged systems: More order in IT?

Hyper-converged systems: The compact data center

The traditional data center could be significantly streamlined by migrating to a hyper-converged system. By eliminating the need for highly complex infrastructures and multiple work areas, the company’s IT department could function more efficiently, dynamically, and cost-effectively. This is made possible using preconfigured standard hardware and a complete virtualisation of the IT infrastructure....

DHCP Snooping

DHCP Snooping: More Security for Your Network

DHCP snooping makes a network more secure. There are no two ways about it: DHCP makes network configuration so much easier. This is especially the case in large networks, where devices are constantly changing and the manual assignment of IP addresses is a never-ending task. Yet by using DHCP to simplify the process, you do relinquish controls, and criminals can take advantage of this. By using...


Wait! We’ve got something for you!
Get your .co.uk domain for just £1/1st year.

Enter the web address of your choice in the search bar to check its availability.
12 months for £1
then £10/year