Network

nslookup

nslookup: Here’s how the useful DNS check works

Those who want to access computer systems and applications in networks need host (or rather, domain) names. As long as the Domain Name System, which is responsible for the name conversions, is functioning normally, users remain unaware that machine-readable IP addresses are hidden behind these names. However, if complications with the DNS and the involved name servers arise, they can be quickly...

Set up your own Raspberry Pi mail server

Raspberry Pi mail server: using Raspberry Pi to manage e-mails

Why use e-mail servers from commercial e-mails service providers when you can just set up your own? You can create a private server easily and affordably with a small computer known as Raspberry Pi. Having your own e-mail server, however, requires a certain amount of work and also has its disadvantages. You can find out more about how to set up your personal Raspberry Pi mail server in this...

How to install an Apache web server

Installing and configuring an Apache web server

The Apache http server is the standard web server for providing HTTP documents on the internet. But did you know it’s also possible to install an apache web server locally on your Windows PC? This is a great method of testing out web pages and checking scripts. To get started, all you need is the free software package and a few minutes.

Man-in-the-middle attack: an overview of attack patterns

Man-in-the-middle attack: attack patterns and countermeasures

A man-in-the-middle attack is a deceitful espionage attack which aims to listen, record, or manipulate sensitive data being sent between unsuspecting internet users. To do this, hackers rely on methods that enable them to position themselves, unnoticed, between two or more computers communicating with one another. We introduce you to some well-known attack patterns and countermeasures that can be...

Ethernet

What is Ethernet (IEEE 802.3)?

In the beginning, there was ARPANET and ALOHAnet. Then Ethernet followed as a groundbreaking innovation for local networks. Ethernet enabled collision-free interconnection of multiple devices via a common bus. For the first time, data packages could efficiently be exchanged between individual devices. Today, the technology is extensively used in the standard IEEE 802.3. With fiber optic cables,...

What are the benefits of IPv6?

IPv6: All about the new internet standard

IPv6 is the newest version of the internet protocols, and should overcome the central issues of its predecessors. Included in these issues is the impending shortage of IPv4 addresses as well as the violation of the end-to-end principle by the strict separation of public and private IPs. This article gives an overview of the functions of IPv6 as well as the structure and distribution of address...

Successful content promotion

Content promotion: maximum reach for your content

A content marketing strategy doesn’t just appear, but is rather the result of an intense analysis of goals, strengths, and content. Implementing the strategy requires a lot of personnel as well as finances. You design the content, write blog posts, produce videos, and put together whitepaper and e-books. After all this, you still aren’t finished. Nothing will happen if you don’t start promoting...

LinkedIn ads: B2B marketing in the business network

LinkedIn ads: Marketing geared toward the target group

LinkedIn is the first port of call for global B2B marketing. Contrary to Facebook, Instagram, or Pinterest, you can reach the community in your business network on a professional level instead of through funny videos. LinkedIn ads give you multiple formats to choose from to address your target group. From content marketing to classic banner adverts: We explain what the various options are good for...

Subnetting: How do subnets work?

Use subnetting to get the most out of your network

Dividing a corporate network into smaller subnets has some advantages in terms of speed, security, and logical organisation. However, many people find it difficult to set up. Binary computational operations and long series of numbers are frightening, but the principle itself is not so complicated. We explain what subnetting is, how to calculate a subnetmask, and what you need subnets for, so that...


Wait! We’ve got something for you!
Get your .co.uk domain for just £1/1st year.

Enter the web address of your choice in the search bar to check its availability.
12 month for £1/1st year
then £10/year