Configuration

Your own DNS server with Raspberry Pi: How to

Without the domain name system, surfing on the internet would be much more difficult, as we would have to memorize a lot of IP addresses. With the help of DNS servers, we can instead use a memorable domain name to access our favorite website. Find out how you can set up your own DNS server and learn more about the basics of the World Wide Web. All you need is the minicomputer Raspberry Pi and an internet connection! [...]  

Create a screenshot on Windows: How it works

With screenshots, you can show your colleagues and friends with just a few clicks what you’ve just seen on your screen. This can be an important part of your daily workload as well as something you use in your free time. But how do you actually create a screenshot? On Windows, the necessary resources are already built in. We explain to you how to use them correctly. [...]  

Screenshots for Mac – here’s how it’s done

Screenshots can be extremely helpful and beneficial. Regardless of whether you are sending them to friends or using them professionally, it is always going to be easier to demonstrate it this way than having to describe it. Making iMac or MacBook screenshots is very easy – as long as you know how it all works. Here we show you all the keyboard shortcuts for making screenshots on a Mac, as well as describing other ways to go about generating screengrabs using your Apple computer. [...]  

An overview of the most important Linux commands

Under Linux, all actions that you can carry out with the mouse and window system via the graphical user interface can also be performed using program calls in the terminal – provided you know the appropriate command and how to use it according to the correct syntax. To make working in the terminal easier, we provide you with an overview of basic Linux commands with detailed descriptions and practical examples. [...]  

Docker tutorial: Installation and operation of the container platform

The open source container platform Docker is quite exciting to the open source community. As an alternative to hardware virtualization based on virtual machines, Docker has made the use of software containers acceptable outside of the Linux universe. In our tutorial for beginners, we break down the Docker trend from the ground up. With these clear, step-by-step instructions, learn how to install Docker, what the deal is with its images, and how to download these images from the Docker hub and run them locally as containers. [...]  

Ubuntu FTP server: How the setup functions

For the past 30 years, the file transfer protocol (FTP) has supported computer users with the transfer of data in TCP/IP networks. FTP servers enabled not only the upload but also the download of files, in which each access is controlled via a separate connection. In this Ubuntu FTP server tutorial, you’ll learn how to install, configure, and run your own server under the Linux distribution. [...]  

Equip Raspberry Pi with a static IP address

Both the private Raspberry Pi IP address and the public IP address of the internet connection are constantly changing for most users. Such dynamic IP addresses aren’t practical for the use of a minicomputer. But if you want to use server software effectively on your Raspberry Pi, you need a static IP address for the computer in the local network. The internet access used to make the server accessible online also requires a constant address. This guide explains how to set it all up. [...]  

DHCP: What’s behind the Dynamic Host Configuration Protocol

If you’re connected to an internet router and power on your computer, it automatically obtains the necessary network parameters, such as the IP address, subnet mask, or DNS server. This is made possible by the Dynamic Host Configuration Protocol (DHCP), which simplifies address assignment when connecting to the internet and makes setting up local networks easy as pie. [...]  

The right configuration to secure your server

If you operate or rent your own server, it is your responsibility to protect it against failures and external access. You can immediately begin to set the foundation for this when configuring the server, if you have the necessary administrative rights. The correct settings can work wonders, especially with encrypted remote connections via SSH protocol, and greatly increase security. [...]  

HTTPoxy: Threatening the security of CGI applications

Fifteen years after the discovery of the security flaw HTTPoxy, it’s still an issue with CGI applications. The reason for this is the fact that the Common Gateway Interface standard provides the use of environment variables to process HTTP requests. These can include header contents that modify the original proxy configuration, allowing hackers to redirect data packets to a completely foreign server. [...]