Protocols

DHCP Snooping

DHCP Snooping: More Security for Your Network

DHCP snooping makes a network more secure. There are no two ways about it: DHCP makes network configuration so much easier. This is especially the case in large networks, where devices are constantly changing and the manual assignment of IP addresses is a never-ending task. Yet by using DHCP to simplify the process, you do relinquish controls, and criminals can take advantage of this. By using...

Trivial File Transfer Protocol

TFTP (Trivial File Transfer Protocol) – File Transfer Protocol made simple

The Trivial File Transfer Protocol (TFTP) is one of the oldest and simplest network protocols. It allows two systems to exchange files on the local area network without having to establish a connection beforehand. To do this, TFTP uses the connectionless transport protocol UDP, which serves as an alternative to the more common yet more complex TCP. What other features set the TFTP protocol apart,...

Server Name Indication

Server Name Indication (SNI): What’s behind the standard?

What is server name identification, really? Encryption technologies play a big role when it comes to surfing on the net. Credit card data and other personal information must not fall into the hands of criminals. For now, TLS is one of the protocols used for this purpose. But it has a disadvantage: it only functions when each IP address only hosts one domain. If multiple virtual services are...

Headless CMS: What are the benefits?

Get more from your own content with headless CMS

If you want to juggle more than one channel with your content management system, you’ll quickly reach the limits. A classic CMS offers many simplifications, but at the same time is limited with its design options. For this reason, content creators sometimes rely on another solution: a headless CMS. This separates the frontend from the backend so that different websites and mobile apps can be...

Client to Authenticator Protocol (CTAP)

CTAP: A protocol for more security & convenience on the web

Try and imagine a world where you don’t have to memorise passwords: Thanks to FIDO2, this could soon become a reality. Authentication in online shops or for online banking can be done through a fingerprint or hardware token. The latter can communicate with laptops of PCs through a USB, NFC or Bluetooth. To enable conversations between two devices, FIDO2 uses the Client to Authenticator Protocol...

Encryption methods: An overview

Encryption methods: An overview

E-mail, instant messaging, or voice-over IP: If you want to communicate over the internet, you should make sure that the data transfer process can be trusted. The same goes for the World Wide Web. With online banking and digital shopping, money transactions are increasingly being carried out online. Popular encryption methods like DES, AES, or RSA should guarantee the security of passwords, credit...

NGINX: basics, installation, and set-up

NGINX — the quick and efficient web server

For years, Apache had been the uncontested go-to web servers and comprised the basis of most websites published in the World Wide Web. The increasing technical requirements of modern web projects and the growing demands and expectations of internet users has brought on a sea change of sorts. Alternatives like NGINX are becoming ever more popular and are slowly creeping up on the classic server...

PPPoE – Point-to-Point Protocol

PPPoE: DNS protocol

How exactly do you access the internet? Those who have a DSL contract, for example, first have to contact their internet provider’s node each time they connect. The provider checks the access authorisation and establishes the connection to the internet. The so-called “Point-to-Point Protocol over Ethernet” (PPPoE) is used for this purpose. But how exactly does this protocol work?

csrss.exe

csrss.exe: What’s behind the Client Server Runtime Process

What is csrss.exe? If you inspect the processes currently running on your Windows system, you’ll inevitably come across the csrss.exe process. Your system can’t run without it because it’s responsible for important tasks such as launching processes. If you suspect that the file might be a virus, it’s a good idea to inspect whether it’s the genuine csrss.exe file. But can you spot the difference?

Bootp protocol

BOOTP: All information on the DHCP forerunner

If you want to connect a computer, smartphone, etc. to a network (LAN or Wifi), you can either assign the IP address manually, or get it automatically. The latter is possible thanks to the DHCP (dynamic host configuration protocol) communication protocol, which has established itself as the cross-platform standard solution for address management. The forerunner was the BOOTP bootstrap protocol...


Wait! We’ve got something for you!
Get your .co.uk domain for just £1/1st year.

Enter the web address of your choice in the search bar to check its availability.
12 months for £1
then £10/year