Network

Man-in-the-middle attack: an overview of attack patterns

Man-in-the-middle attack: attack patterns and countermeasures

A man-in-the-middle attack is a deceitful espionage attack which aims to listen, record, or manipulate sensitive data being sent between unsuspecting internet users. To do this, hackers rely on methods that enable them to position themselves, unnoticed, between two or more computers communicating with one another. We introduce you to some well-known attack patterns and countermeasures that can be...

Ethernet

What is Ethernet (IEEE 802.3)?

In the beginning, there was ARPANET and ALOHAnet. Then Ethernet followed as a groundbreaking innovation for local networks. Ethernet enabled collision-free interconnection of multiple devices via a common bus. For the first time, data packages could efficiently be exchanged between individual devices. Today, the technology is extensively used in the standard IEEE 802.3. With fiber optic cables,...

What are the benefits of IPv6?

IPv6: All about the new internet standard

IPv6 is the newest version of the internet protocols, and should overcome the central issues of its predecessors. Included in these issues is the impending shortage of IPv4 addresses as well as the violation of the end-to-end principle by the strict separation of public and private IPs. This article gives an overview of the functions of IPv6 as well as the structure and distribution of address...

Successful content promotion

Content promotion: maximum reach for your content

A content marketing strategy doesn’t just appear, but is rather the result of an intense analysis of goals, strengths, and content. Implementing the strategy requires a lot of personnel as well as finances. You design the content, write blog posts, produce videos, and put together whitepaper and e-books. After all this, you still aren’t finished. Nothing will happen if you don’t start promoting...

LinkedIn ads: B2B marketing in the business network

LinkedIn ads: Marketing geared toward the target group

LinkedIn is the first port of call for global B2B marketing. Contrary to Facebook, Instagram, or Pinterest, you can reach the community in your business network on a professional level instead of through funny videos. LinkedIn ads give you multiple formats to choose from to address your target group. From content marketing to classic banner adverts: We explain what the various options are good for...

Subnetting: How do subnets work?

Use subnetting to get the most out of your network

Dividing a corporate network into smaller subnets has some advantages in terms of speed, security, and logical organisation. However, many people find it difficult to set up. Binary computational operations and long series of numbers are frightening, but the principle itself is not so complicated. We explain what subnetting is, how to calculate a subnetmask, and what you need subnets for, so that...

SCTP

SCTP (Stream Control Transmission Protocol) – the reliable, message-orientated transport protocol

If two computer systems are to exchange data, they must agree on a common protocol basis. For example, the selected transport protocol determines how the information is to be transferred. One of the more recent representatives of this protocol division is the Stream Control Transmission Protocol (SCTP), which the IETF (Internet Engineering Task Force) published in 2000 as an alternative to known...

Bonjour: Software for zero configuration networking

Bonjour: What’s behind the zeroconf implementation

Manually organising a large local network can be a nerve-wracking and very complicated matter. Without your own DHCP and DNS servers to support you in the distribution of addresses and name resolution, all IPs would have to be entered manually and also updated independently if changes are made in the network. Zeroconf implementations like Bonjour, which connect network components almost without...

What is ARP? – Address resolution in networks

What is ARP (Address Resolution Protocol)?

When computer information is sent in TCP/IP networks, it is first decompressed into individual data frames. In this way, you can transfer data of nearly unlimited size. The frames also contain the target system’s MAC address, without which a transmission would not be possible. If the physical address is not known, the sender must first be determined using the ARP Address Resolution Protocol. Here,...

Provide Raspberry Pi with a static IP address

Equip Raspberry Pi with a static IP address

Both the private Raspberry Pi IP address and the public IP address of the internet connection are constantly changing for most users. Such dynamic IP addresses aren’t practical for the use of a minicomputer. But if you want to use server software effectively on your Raspberry Pi, you need a static IP address for the computer in the local network. The internet access used to make the server...


Own your online success
IONOS takes care of your online challenges
Create your website with the perfect domain and the UK's fastest hosting!