Know-how

Explore the possibilities with these 10 Raspberry Pi projects

Raspberry Pi is an inexpensive small form factor PC that can behave like a standard computer in many respects. Users can use this innovative mini-computer for all kinds of functions, from setting up an operating system to surfing the web, to using it as a server or a media center, and much more besides. Discover 10 interesting Raspberry Pi projects to try out at home. [...]  

What is a root server? Definition and mechanics

When you call up a website, the entered domain first needs to be turned into an IP address and read out from the browser so that the page can finally appear in the browser. This process is known as name resolution. Here, the root name server or (DNS) root server in the domain name system plays a key role. But what is a root server? And what exactly goes on when they receive requests for translating a domain name into an IP address? [...]  

Alternatives to Docker: an overview of the container platform

Docker is currently doing very well for itself, but there are many forerunner technologies and competitor products following in the market leader’s wake. They also offer attractive alternative solutions for resource-saving virtualization on an operating system level. We give you an overview of the most important options in the container industry, and introduce established container formats and virtualization concepts. [...]  

MPLS: What’s behind the network technology

Speed and reliability play an important role for data transfer in networks. They reflect the quality of the connection, which is why providers do everything they can to guarantee the agreed services. A method primarily used in virtual private networks is the so-called multiprotocol label switching (MPLS). [...]  

Neighbor Discovery Protocol (NDP) – what is it?

Network configurations today are done quickly. For those who do not rely on their own fixed settings for routers, computers, and more, the Internet Protocol family provides the appropriate set of automatic mechanisms to determine critical parameters, such as the default gateway, IP address, and MAC address. [...]  

Dynamic DNS (DynDNS): making remote control easier

Being able to access your home computer from another location is no longer a complicated matter thanks to remote connection. It is handy to be able to use your computer from the office and swap files. But IP addresses change often and this throws a spanner in the works. DynDNS (DDNS) services are the solution. In this article, we explain what these are and how you can access your computer via the internet. [...]  

What is CentOS?

Finding a suitable operating system that meets your own requirements is usually not very difficult in the private sector. Most of the time, it’s just down to personal taste whether you favor Windows, macOS, or Linux. The search for a system solution for enterprise and server environments is far more difficult and complex. When selecting, factors such as long-term support, security, and cost play a decisive role. An often underestimated operating system for this sector is the RHEL derivative, CentOS. [...]  

Debian: what does this Linux kernel offer?

Anyone looking to learn about Linux operating systems will come across Debian soon enough. The GNU/Linux distribution was one of the first of its kind and is still one of the most widely used today. Over 1,000 community members work on the Debian project, furthering the development of the collection. But how did Debian become so successful? And what makes this system software so interesting to server operators? [...]  

Network protocol: The basis of electronic data exchange

For computer systems to be able to communicate with each other and exchange information, they need common ground, just like humans must share a common language. But computers don’t rely on foreign language lessons, and instead only need the appropriate network protocol to successfully communicate. This provides guidelines and structures for the data transfer, and so plays a decisive role in the ultimate arrival of sent data packets to the addressee. [...]  

Penetration test: how to find weak points in your network

The more complex a network is, the more vulnerable it is to attacks. In times when customers and partners have access to internal network structures via the internet, and can control various applications via web interfaces, IT employees are encountering more and more problems. Large companies, in particular, prefer to use penetration testing to check how well their security concept works. This article explains what this comprehensive testing process is all about. [...]