Proxy settings can be established quickly and easily via the operating system’s control panel or browser menu. Discover exactly how to do this with our comprehensive step-by-step introductions for Windows 7, 8, and 10. A faulty proxy configuration can cause connection failures, but there are simple ways to detect the causes and rectify these errors.
If you’re optimising your website, then you shouldn’t just turn to content and design; it’s important to also make sure that you invest ample time into the functionality of your website. Usability and loading time are just as important for a website’s success as high-quality and regularly offered content. A long loading time is one of the main causes of high bounce rates. The simple solution: a [...]
Combining different application systems has become increasingly important over the past few years. This trend is especially due to the increasing number of web applications being developed. In order to react to this trend, many different web services were developed that make data transfer across multiple systems possible. The Representational State Transfer (REST) is an architectural style that [...]
More and more website operators are turning to managed cloud hosting as a solution for their server environment. This option promises flexible scalability of required resources in real time, along with a wide range of services offered by the provider including the installation, maintenance, and protection of the hosting platform. So how does managed cloud hosting work? Find out what services [...]
A stable network is characterised not only by the appropriate hardware structures, but also by a watertight security concept. In addition to back-up solutions and intelligent fail-safe systems, protection against external access attempts is a must. Intrusion detection systems (IDS) and intrusion protection systems (IPS) are an excellent addition to the classic firewall and are therefore a sensible [...]
The log files of web servers and cloud services reveal a lot about the users that access them. They contain information about which browser or operating system is being used, which search terms have been entered and how many different pages a user has accessed, for example. Since manually analysing these extensive text files is nigh on impossible, you can use log file analysis programs such as [...]
SSL/TLS certificates play an increasingly important role in the transmission of sensitive data. They guarantee that data packets reach the desired addressee without any detours. Problems only arise when internet users are deliberately redirected by invalid certificates from dubious certification bodies – a scenario that can be prevented using so-called HTTP public key pinning (HPKP).
Under Linux, all actions that you can carry out with the mouse and window system via the graphical user interface can also be performed using programme calls in the terminal – provided you know the appropriate command and how to use it according to the correct syntax. To make working in the terminal easier, we provide you with an overview of basic Linux commands with detailed descriptions and [...]
When you call up a website, the entered domain first needs to be turned into an IP address and read out from the browser so that the page can finally appear in the browser. This process is known as name resolution. Here, the root name server or (DNS) root server in the domain name system plays a key role. But what is a root server? And what exactly goes on when they receive requests for [...]
The open source container platform Docker is quite exciting to the open source community. As an alternative to hardware virtualizsation based on virtual machines, Docker has made the use of software containers acceptable outside of the Linux universe. In our tutorial for beginners, we break down the Docker trend from the ground up. With these clear, step-by-step instructions, learn how to install [...]