Network

What is a network attached storage (NAS)?

Network attached storage (NAS): the basics of network storage

Growing sums of data require cost-effective, high-performance storage solutions. One option for fulfilling this requirement is a network attached storage. In business contexts, this model has already established itself as a viable alternative to file servers, hard drives, and the cloud. Private users have also caught on and use NAS systems at home. But what is a NAS? Read on, and we’ll show you...

Everything you need to know about IANA

IANA: admins of the internet

A unique address is needed for a letter to reach the right person by post. It is similar on the internet. The network equivalent of a postal address is an IP address. One of the tasks of the Internet Assigned Numbers Authority (IANA) is to coordinate the worldwide pool of IP addresses, and thereby contributing to an integral part of millions of people’s lives.

Private Cloud

What is a private cloud? More control and security for your business

Should data and processes be handled in a private or public cloud? If a company wants to use cloud computing, they first need to choose one of the many providers available. Using the personalised services offered by a private cloud, companies can address a wide range of business related and operational challenges. Separating operations also makes a private cloud more secure than a public cloud.

Exchange server: Microsoft’s groupware at a glance

What is Exchange Server?

Microsoft Exchange Server is considered the standard solution for business e-mail traffic and computer-supported collaborative work. The software has many different usage models of available and these require purchasing special licenses. We’ll show you the licensing model here and give you an overview of the different functions of the collaborative software.

CIDR:Classless Inter Domain Routing

CIDR: what is classless inter-domain routing?

The internet – just like other large networks – must be precisely subdivided. The network classes, used until the 1990s and not yet completely gone from the scene, were far too inflexible for the requirements of the digital world. CIDR can help: With classless inter-domain routing, it’s possible to create effective subnets and routes. We explain how this works.

nslookup

nslookup: Here’s how the useful DNS check works

Those who want to access computer systems and applications in networks need host (or rather, domain) names. As long as the Domain Name System, which is responsible for the name conversions, is functioning normally, users remain unaware that machine-readable IP addresses are hidden behind these names. However, if complications with the DNS and the involved name servers arise, they can be quickly...

Set up your own Raspberry Pi mail server

Raspberry Pi mail server: using Raspberry Pi to manage e-mails

Why use e-mail servers from commercial e-mails service providers when you can just set up your own? You can create a private server easily and affordably with a small computer known as Raspberry Pi. Having your own e-mail server, however, requires a certain amount of work and also has its disadvantages. You can find out more about how to set up your personal Raspberry Pi mail server in this...

How to install an Apache web server

Installing and configuring an Apache web server

The Apache http server is the standard web server for providing HTTP documents on the internet. But did you know it’s also possible to install an apache web server locally on your Windows PC? This is a great method of testing out web pages and checking scripts. To get started, all you need is the free software package and a few minutes.

Man-in-the-middle attack: an overview of attack patterns

Man-in-the-middle attack: attack patterns and countermeasures

A man-in-the-middle attack is a deceitful espionage attack which aims to listen, record, or manipulate sensitive data being sent between unsuspecting internet users. To do this, hackers rely on methods that enable them to position themselves, unnoticed, between two or more computers communicating with one another. We introduce you to some well-known attack patterns and countermeasures that can be...


Wait! We’ve got something for you!
Get your .co.uk domain for just £1/1st year.

Enter the web address of your choice in the search bar to check its availability.
12 months for £1
then £10/year