Network

Internet lite: North Korea’s 28 Domains

North Korea: 28 domains for 25 million inhabitants

In so far as is possible, the communist state of North Korea has managed to shut itself off from the rest of the world. However, a western IT expert recently succeeded in sneaking a peek at their internet domains and as a result we now know that there are only 28 domains for the entire country. From recipes to maritime affairs, here you’ll find an insight into what a North Korean can find online. ...

SNMP: Simple Network Management Protocol

SNMP (Simple Network Management Protocol): the protocol for network management

The communication protocol SNMP (Simple Network Management Protocol) is an elementary component of many network management applications. It defines a number of message types that greatly simplify the monitoring and administration of individual network participants such as PCs, routers, servers, switches, firewalls, or printers. How exactly the SNMP protocol works and what fundamental adjustments...

MPLS:  What is Multiprotocol label switching?

MPLS: What’s behind the network technology

Speed and reliability play an important role for data transfer in networks. They reflect the quality of the connection, which is why providers do everything they can to guarantee the agreed services. A method primarily used in virtual private networks is the so-called multiprotocol label switching (MPLS).

Broadcast address

What is a broadcast address and how does it work?

Broadcasting is one of the most diverse means of communicating in a network. A data packet is sent to an entire network from one point, without having to specify one or more recipients. You direct your data packet to the broadcast address to do this. In this article, we explain what the broadcast IP is and how you can find out this address. We also give you a simple explanation of what a broadcast...

SNTP: simple network time protocol

Simple network time protocol: the stripped-back protocol for time synchronization

An exact system time on a computer is especially important when devices need to exchange data. Cross-system processes quickly come to a standstill if the generated time stamps are very different from the time that applies to the system. Synchronisation methods that keep the clocks of the individual network participants in sync are utterly indispensable. One of the simplest methods to achieve time...

Protection against ransomware, spyware, and scareware

Ransomware, adware, etc. – how can you protect yourself?

The internet is a playground for cybercriminals and fraudsters – for many, this is an annoying and frightening reality. The threats from unwanted software range from harmless advertising to trojans, which can paralyse complete computer networks. The forms of malicious software or malware are diverse, the countermeasures often very simple. In our article, you can read about how ransomware, spyware,...

ARP Spoofing: Attacks from the internal network

ARP Spoofing – flaws in network security

When it comes to network security, administrators focus primarily on attacks from the internet. But often times, the danger lurks in the internal network. If the LAN turns out to be a blind spot in the security IT, then internal attackers have an easy time. A popular method of attack is ARP spoofing. With this, hackers switch undetected between two communication partners in order to intercept,...

Err_Connection_Timed_Out

Correcting the error “Err_Connection_Timed_Out”

The error message “Err_Connection_Timed_Out” appears frequently on Google Chrome and means that an error has occurred when trying to access a webpage. This is usually caused by the target server taking too long to send a reply, which results in the browser terminating the communication attempt. Find out in our guide what “Err_Connection_Timed_Out” means, what measures you can take to correct the...

VPN server set-up via Raspberry Pi and OpenVPN

Set up Raspberry Pi as a VPN server: OpenVPN tutorial

If you set up your own VPN server, then you can access your local network from any internet connection, not to mention allowing you to move around the internet more securely, while also being encrypted, from public WLAN networks. This tutorial shows that the Raspberry Pi mini-computer and the already established OpenVPN programme are perfectly sufficient for the creation and operation of a VPN...

What is a VPN (virtual private network)?

VPN — secure data transfer through public networks

VPN implementations offer an affordable alternative for locally connecting networks, as well as making network resources available for external devices. In contrast to corporate networks, no private communication network is required. Instead, like the internet, VPNs rely on networks, and protect sensitive data through a process known as tunneling.


Wait! We’ve got something for you!
Get your .co.uk domain now, the first year is free.

Enter the web address of your choice in the search bar to check its availability.
12 month for £0/year
then £10/year