Screenshots for Mac – here’s how it’s done

Screenshots can be extremely helpful and beneficial. Regardless of whether you are sending them to friends or using them professionally, it is always going to be easier to demonstrate it this way than having to describe it. Making iMac or MacBook screenshots is very easy – as long as you know how it all works. Here we show you all the keyboard shortcuts for making screenshots on a Mac, as well as...

Create a screenshot on Windows: How it works

With screenshots, you can show your colleagues and friends with just a few clicks what you’ve just seen on your screen. This can be an important part of your daily workload as well as something you use in your free time. But how do you actually create a screenshot? On Windows, the necessary resources are already built in. We explain to you how to use them correctly.

What is the hosts file and how do you edit it?

The hosts file used to resolve website names so that certain IP addresses could be accessed. The method was largely replaced by the DNS (domain name system). However, the hosts file is still indispensable for local networks. In addition, certain rules can be set for websites e.g. to block them. We show you where you can find and edit the hosts file in your operating system.

SAN storage: how to safely store large volumes of data

Due to rising worldwide data usage, more and more companies around the world are moving away from dedicated data servers and instead opting for more holistic solutions in the form of centrally stored data networks. This structure is carried out in the form of storage area networks, or SANs. SAN storage users profit from quick data access and comprehensive hardware redundancy.

Raspberry Pi: activating and using SSH access

Raspberry Pi has established itself as a reliable basis for servers of various types. Access – for configuration and maintenance purposes – rarely takes place on the mini computer itself, but mostly on a desktop computer in the same network. The communication protocol is the secure SSH (secure shell), which isn’t enabled by default and hasn’t been for some time. How to activate the Raspberry Pi...

Create a ZIP File: compress your files

Send multiple images and videos via email, archive large amounts of data without using too much space, or encrypt confidential documents - you can do all of this by zipping files. We show you how to create a compressed ZIP file in Windows as well as macOS in our step-by-step guide. We also show you how to protect your files with a password if needed. This way, you can manage your storage space...

Network time protocol (NTP): definition and functionality

Computer systems and applications use time stamps for communication purposes. Synchronous system times are highly important for these so-called temporal signatures to be of any use – especially for systems that exchange information via the internet. A protocol that has provided valuable assistance for decades is the network time protocol (NTP) – here is an introduction to NTP, as well as some...

Introduction to PowerShell – Tools for system administrators

For a long time, Windows users were left behind when it came to command interpreters because the command prompt did not allow full access to operating system internal components, and scripting also offered only limited possibilities. This should finally change thanks to Microsoft’s PowerShell. The cross-platform program not only does much better than cmd.exe, it also provides remote computer...

CSMA/CD: Explanation of the process

Rules must be observed when communicating in a group. This is no different with local networks: CSMA/CD regulates how data packet collisions must be handled in a LAN network. But what happens if several participants attempt to simultaneously carry out a transmission and the information gets lost? Carrier Sense Multiple Access with Collision Detection is an important procedure for smooth network...

CSMA/CA: definition and explanation of the method

How do you achieve order in a wireless network? If all devices were to send information amongst themselves in an uncoordinated way, the data would rarely reach the recipient without problems. With CSMA/CA, there is a protocol that organizes the process and avoids collisions – without the need for central coordination. It’s a complex time management system. We go through the process step by step so...

1