Regular backups are one of the most important factors of IT security. With Linux systems – which are often the backbone of a webserver – you can very efficiently create backup copies with the program tar. What can the archiving program do? We explain to you how tar functions and what its special features are. So that you’re able to create regular backups with tar in the future, we explain step by [...]
Bare metal – the latest product on the web hosting market evokes power from its name alone, and not for nothing: servers with this nickname focus on high-performance hardware. With a bare metal server, the user's access extends practically down to the bare metal. Software components based on this product are subject to user control and can be installed and configured according to individual [...]
Double is better, especially when it comes to data backups. Backups shouldn’t only contain important files like documents, tables, presentations, or videos. Generate a comprehensive storage image of your entire system with the help of image-based backup tools and completely restore it including configurations in the event of total failure. Find what makes a good image tool and which functions you [...]
CaaS – Container-as-a-Service – is the latest model in the cloud computing market: users can find suitable platforms for all established infrastructure providers. But what actually is CaaS? And what is the difference between CaaS and other cloud services, like Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS)? Here we introduce hosted container [...]
Without the domain name system, surfing on the internet would be much more difficult, as we would have to memorise a lot of IP addresses. With the help of DNS servers, we can instead use a memorable domain name to access our favorite website. Find out how you can set up your own DNS server and learn more about the basics of the World Wide Web. All you need is the minicomputer Raspberry Pi and an [...]
MS Access is widely used office software and enables people with no prior programming knowledge to work with databases. The license for the programme, however, is not exactly cheap. Several free alternatives to Microsoft Access promise to do essentially the same thing. But which are the best Microsoft Access alternatives? And can they actually keep up with the range of functions and standard of [...]
With screenshots, you can show your colleagues and friends with just a few clicks what you’ve just seen on your screen. This can be an important part of your daily workload as well as something you use in your free time. But how do you actually create a screenshot? On Windows, the necessary resources are already built in. We explain to you how to use them correctly.
Screenshots can be extremely helpful and beneficial. Regardless of whether you are sending them to friends or using them professionally, it is always going to be easier to demonstrate it this way than having to describe it. Making iMac or MacBook screenshots is very easy – as long as you know how it all works. Here we show you all the keyboard shortcuts for making screenshots on a Mac, as well as [...]
Proxy settings can be established quickly and easily via the operating system’s control panel or browser menu. Discover exactly how to do this with our comprehensive step-by-step introductions for Windows 7, 8, and 10. A faulty proxy configuration can cause connection failures, but there are simple ways to detect the causes and rectify these errors.