HPKP: What is behind the public-key pinning extension for HTTP

SSL/TLS certificates play an increasingly important role in the transmission of sensitive data. They guarantee that data packets reach the desired addressee without any detours. Problems only arise when internet users are deliberately redirected by invalid certificates from dubious certification bodies – a scenario that can be prevented using so-called HTTP public key pinning (HPKP).

An overview of the most important Linux commands

Under Linux, all actions that you can carry out with the mouse and window system via the graphical user interface can also be performed using programme calls in the terminal – provided you know the appropriate command and how to use it according to the correct syntax. To make working in the terminal easier, we provide you with an overview of basic Linux commands with detailed descriptions and...

What is a root server? Definition and mechanics

When you call up a website, the entered domain first needs to be turned into an IP address and read out from the browser so that the page can finally appear in the browser. This process is known as name resolution. Here, the root name server or (DNS) root server in the domain name system plays a key role. But what is a root server? And what exactly goes on when they receive requests for...

Docker tutorial: Installation and operation of the container platform

The open source container platform Docker is quite exciting to the open source community. As an alternative to hardware virtualizsation based on virtual machines, Docker has made the use of software containers acceptable outside of the Linux universe. In our tutorial for beginners, we break down the Docker trend from the ground up. With these clear, step-by-step instructions, learn how to install...

Ubuntu FTP server: How the setup functions

For the past 30 years, the file transfer protocol (FTP) has supported computer users with the transfer of data in TCP/IP networks. FTP servers enabled not only the upload but also the download of files, in which each access is controlled via a separate connection. In this Ubuntu FTP server tutorial, you’ll learn how to install, configure, and run your own server under the Linux distribution.

Encryption methods: An overview

E-mail, instant messaging, or voice-over IP: If you want to communicate over the internet, you should make sure that the data transfer process can be trusted. The same goes for the World Wide Web. With online banking and digital shopping, money transactions are increasingly being carried out online. Popular encryption methods like DES, AES, or RSA should guarantee the security of passwords, credit...

Alternatives to Docker: an overview of the container platform

Docker is currently doing very well for itself, but there are many forerunner technologies and competitor products following in the market leader’s wake. They also offer attractive alternative solutions for resource-saving virtualisation on an operating system level. We give you an overview of the most important options in the container industry, and introduce established container formats and...

Equip Raspberry Pi with a static IP address

Both the private Raspberry Pi IP address and the public IP address of the internet connection are constantly changing for most users. Such dynamic IP addresses aren’t practical for the use of a minicomputer. But if you want to use server software effectively on your Raspberry Pi, you need a static IP address for the computer in the local network. The internet access used to make the server...

DHCP: What’s behind the Dynamic Host Configuration Protocol

If you’re connected to an internet router and power on your computer, it automatically obtains the necessary network parameters, such as the IP address, subnet mask, or DNS server. This is made possible by the Dynamic Host Configuration Protocol (DHCP), which simplifies address assignment when connecting to the internet and makes setting up local networks easy as pie.

MPLS: What’s behind the network technology

Speed and reliability play an important role for data transfer in networks. They reflect the quality of the connection, which is why providers do everything they can to guarantee the agreed services. A method primarily used in virtual private networks is the so-called multiprotocol label switching (MPLS).