Have you always wanted to operate your own web server? Raspberry Pi makes this goal more realistic, without commanding a high price and expert-level knowledge for set-up: hosting a website’s test environment or a private cloud is just as manageable for the small computer as controlling light sources, heaters, or other home devices (home automation). In our tutorial, you’ll find out all you need to know about using Raspberry Pi as a web server and how to set this system up. [...] ►
Being constantly faced with headlines about stolen passwords, it’s understandable that many users are concerned. Your best bet is to make your passwords as complicated as possible and have them consist of many different types of characters. But even this won’t help if it’s the actual log-in area that isn’t secure enough. Even today, attackers are still successful with the notorious and simple brute force method. [...] ►
The most effective system break-ins often happen without a scene. Instead of disrupting central network devices with DDoS attacks or sneaking through onto operating systems with Trojan horse techniques, hackers increasingly try to exploit the human security gap. There are various such methods that fall within the broader category of social engineering: a technique that sees hackers gather publicly available information. They then use it to attempt to trick company employees by exploiting their normal human traits, such as helpfulness or fear in order to obtain privileged information and passwords. Find out how social engineering works, and what you can do to prevent it. [...] ►
Although the software itself doesn’t contain any functions for monitoring hosts, services, or events, Nagios is one of the most in-demand IT monitoring solutions. This task is left up to Nagios’ plugins, which can be installed in addition to the core files. Check out our digital guide and find out more about these indispensable modules and how to use these for your own Nagios installation. [...] ►
Archiving and compressing data adds security and stability to systems. For Linux and other Unix-like systems, there are countless free programs that can be used to help create and unpack files via the command line that are unaltered or compressed. One of the classic packing programs for Linux is tar. Even today, the tool is considered to be one of the most important archiving tools, especially for compression tools like bzip2. [...] ►
IT departments are not to be envied: all devices, servers, databases, etc., must not only be integrated into the network, but also work at any time. In order to prevent any problems that might arise in advance, Nagios is the monitoring tool you need in your standard IT repertoire. What makes the open source solution so special and what are the alternatives? [...] ►
If you’re developing a website, it’s important to regularly ensure that all the elements function as intended. Although there are no specific tools required for creating a basic info page with static content, it’s not possible to preview a project containing dynamic elements without some additional tools. The simplest solution is to use an all-in-one development environment like MAMP. [...] ►
The software packet XAMPP is a collection of popular applications like the web server Apache, a leading database management system (either MySQL or MariaDB), the scripting languages PHP and Perl, and more – all together in a compact test server. Our XAMPP tutorial will take you through the installation and configuration process, with the aid of clear instructions and screenshots, to help you set up XAMPP as a test environment for your online project. [...] ►
Dropbox is one of the most famous and most successful cloud storage services available. Its success is largely due to its many functions and ease of use. But when it comes to data protection and maximum free online storage space, this popular app isn’t the pick of the bunch. There are other file hosting services that offer different approaches. Here’s our collection of some of the top alternatives to Dropbox, with a review of their advantages and disadvantages. [...] ►
Various computer networks are connected with one another via the internet. In order to build up such connections, both the sending as well as the receiving systems have to provide transfer interfaces, or ports. The command line program netstat allows you to find out which ports are opened by your own system and which active connections exist — all of this helps reduce the risk of undesired access attempts. [...] ►
1&1 Server Guide: professional tips on configuration and administration
Servers are what make up the physical basis of the internet. Setting up your own professional site, putting products online for sale, or connecting multiple company locations with one another: all of these tasks require the support of high-performance computers. And it doesn’t matter if you purchase hardware resources for your own data center or opt for the flexibility of cloud services: operating a server comes with the challenge of independently configuring and administering hardware components. But don’t worry, there’s a lot of support out there for these tasks. In the Server Guide of 1&1’s Digital Guide series, you’ll find regular articles, news, and tutorials on how to operate this indispensable component of today’s IT infrastructure.
Server information for businesses, developers, and tech hobbyists
Packed with practical tips, our guide covers a wide spectrum of topics primarily aimed at mid-sized companies, freelance developers, and tech hobbyists. While some articles, like ‘What is a server?’ or ‘DNS – name resolution online’ cater more to beginners, experts are by no means left hanging; there’s a wide range of detailed texts and tutorials on important tasks like choosing the best operating system, filling security gaps, or getting the best possible performance out of your software and hardware.
What you can expect in the 1&1 Server Guide
If you take a look, you’ll notice our guide is divided into four different subcategories, each covering a different topic. The ‘KnowHow’ area sets out to familiarize beginners with the basics of operating a server. Details on different server types and how to use them are also laid out here. Tips and tricks on managing server software is found under the keyword, ‘Configuration’. The category, ‘Security’ is all about dealing with potential problems server operators may encounter from online threats. Conventional methods of attack, like viruses, worms, and Trojans, and what you can do to combat them are explained here. And the category, ‘Tools’, provides useful guidance on what resources can help make administering your server a more manageable task.