Windows

Ping Command

How to use the ping command in Windows

The ping command line program is available to you on all current operating systems. Using a step-by-by step tutorial, we’ll show you how you can activate ping in Windows via the command prompt and how to employ the tool for network diagnostics to verify the connection between two computers.

Linux vs. Windows

Windows vs. Linux: a comparison

Most PC users are only familiar with Windows in its various versions, but there are alternative operating systems on the market. Linux distributions offer many advantages compared to Microsoft’s product. Nonetheless, there are many things to take into consideration before switching. So, who should you fight for in the great battle – Linux or Windows?

Windows 10 split screen

Windows 10: split your screen with your mouse or shortcuts

When you use two or more programs at the same time, the back and forth between them can be tiresome and ineffective. Luckily, there’s a practical solution to this in Windows 10: split screen mode. With split screen, two windows can be presented in one half of the monitor (or four programs for a quarter of the monitor). We’ll show you how to split your screen in Windows 10 using your mouse or...

Module tests in software development

Software quality assurance: module tests

Module tests are one of the most effective methods of identifying as many errors in the source code as possible early on in the software development process. The special feature: the smallest isolatable components of a program are placed in a neutral test environment. If errors appear, it’s obvious they are occurring in the module being tested, which makes them easy to correct.

What is MAC spoofing?

What is MAC spoofing?

MAC spoofing is a method by which unique hardware addresses are masked using a Locally Administered Address (LAA) in the software. MAC spoofing can offer protection for your privacy when using public LAN or WLAN networks, but can also be used for illegal network activities. We explain to you here how MAC spoofing works and which settings in Windows must be accessed in order to change your MAC...

Make a bootable USB drive

Make a bootable USB drive and save your computer

Optical installation media are yesterday’s news. A bootable USB drive is not only faster and more practical than a CD-ROM, it can also do a lot more: For example, create a portable operating system with which you can use Windows as well as Linux computers. The most important function, though, is the ability to boot and repair a PC following a serious system problem. To make such a bootable USB...

The best browsers for Windows and Mac

The search for the best browser

Google Chrome, Mozilla Firefox, Apple Safari, Opera, or good old Internet Explorer? The debate about which web browser is number one has been going on for years among the internet community. But what is a browser exactly? And is there one in particular that can trump the competition and truly be the best browser?

Introduction to netstat

What is netstat?

Various computer networks are connected with one another via the internet. In order to build up such connections, both the sending as well as the receiving systems have to provide transfer interfaces, or ports. Netstat allows you to find out which ports are opened by your own system and which active connections exist — all of this helps reduce the risk of undesired access attempts.

Rotate screen

Rotate your screen – it’s easy!

There are different reasons for why you might want to rotate your computer screen. Some users rotate their screen to use it as an upright, vertical display. Others have done this by mistake. Luckily, Windows 7, 8, and 10 offer an easy fix for adjusting display settings. You might even be able to use shortcuts on your PC or laptop to rotate your screen.

Securing a server: correctly configuring Linux, etc.

The right configuration to secure your server

If you operate or rent your own server, it is your responsibility to protect it against failures and external access. You can immediately begin to set the foundation for this when configuring the server, if you have the necessary administrative rights. The correct settings can work wonders, especially with encrypted remote connections via SSH protocol, and greatly increase security.


We’re all in this together. At IONOS we are
#hereforyou
Coronavirus is a challenge we need to face together.
We've created special offers on key products to help
your business keep going.
3 months free
Online Shop
Be where your customers are with your own online store.