Network

Headless CMS: What are the benefits?

Get more from your own content with headless CMS

If you want to juggle more than one channel with your content management system, you’ll quickly reach the limits. A classic CMS offers many simplifications, but at the same time is limited with its design options. For this reason, content creators sometimes rely on another solution: a headless CMS. This separates the frontend from the backend so that different websites and mobile apps can be...

Comparison of the best antivirus programmes

Antivirus software: Which software is best?

Antivirus software has sadly become indispensable as new types of threats against your system emerge regularly. Viruses, worms, Trojan horses, and many other types of malware threaten to infect your system and could cause significant damage. To counteract these threats, software makers try to fight off malware attacks with intelligent antivirus programs. Find out which rank top in our antivirus...

How companies use social selling

Social selling: business relations on the social net

Purchasing decisions are rarely made out of the blue. Customers usually go through a decision-making phase, during which it’s up to the company to convince the customer of their need for the product. This is most effective when you present yourself and your products as trustworthy and honest as possible – particularly on social networks, where your target group conducts research, asks for...

The OSI model: a reference for standards and protocols

What’s the OSI model?

Those working with network technology are bound to encounter the ISO-OSI model sooner or later. This system subdivides communication between computer systems into seven different layers. Each of these layers is assigned a certain task. With the help of this layer model, subareas of abstract processes are able to be descriptively explained.

SQL injection: Fundamentals and safeguards

SQL Injection: Protect your database system

There are daily reports on how security gaps in applications are exploited – because hardly a day goes by without a new gap being discovered or a known gap being closed. One attack method, which has always been based on exploiting such weak points, is called SQL injection. But what is actually hidden behind the malicious database exploitation and how can you protect your database system from it?

Zero-day exploit

Zero-day exploit: Explanation and protection measures

The risk for businesses to fall victim to a zero-day exploit has increased in recent years. More and more often, cybercriminals can take advantage of as-yet undiscovered weak points in business software in order to steal or manipulate data. It is difficult to protect against these attacks, but businesses can take some measures to improve their security.

What is a reverse proxy?

Reverse proxy server – core components in security architecture

Cyber criminality is a big issue for most companies’ IT departments. Online attacks threaten the security of private networks and cause millions of dollars of damage per year. Popular targets are servers that provide online services and therefore require a permanent internet connection. An extra layer of security can be applied by using an upstream network component – the reverse proxy. This...

Ethernet frame

Ethernet frame: definition and variants of the frame format

Ethernet frames enable the transmission of data over an Ethernet connection and are essential for local area networks. Ethernet frames are structured and sized differently depending on the protocol, and contain important information such as MAC addresses, protocol information, length information, and much more. The established Ethernet standard IEEE 802.3 has also developed special frames for VLAN...

Broadcast address

What is a broadcast address and how does it work?

Broadcasting is one of the most diverse means of communicating in a network. A data packet is sent to an entire network from one point, without having to specify one or more recipients. You direct your data packet to the broadcast address to do this. In this article, we explain what the broadcast IP is and how you can find out this address. We also give you a simple explanation of what a broadcast...

MAMP: the practical software stack for Mac OS X

MAMP: the local development environment for Mac OS X

If you’re developing a website, it’s important to regularly ensure that all the elements function as intended. Although there are no specific tools required for creating a basic info page with static content, it’s not possible to preview a project containing dynamic elements without some additional tools. The simplest solution is to use an all-in-one development environment like MAMP.


Wait! We’ve got something for you!
Get your .co.uk domain for just £1/1st year.

Enter the web address of your choice in the search bar to check its availability.
12 month for £1/1st year
then £10/year