NAT: Network Address Translation in the router

NAT, the network address translation, is closely tied to the internet standard IPv4 and will disappear from the internet along with it. But the implementation of IPv6 is slow to take over, and many internet users worldwide still surf with the fourth version of the internet protocol. As a result, network address translation via NAT tables remains current. In our guide, we answer the questions: What...

ARP Spoofing – flaws in network security

When it comes to network security, administrators focus primarily on attacks from the internet. But often times, the danger lurks in the internal network. If the LAN turns out to be a blind spot in the security IT, then internal attackers have an easy time. A popular method of attack is ARP spoofing. With this, hackers switch undetected between two communication partners in order to intercept,...

What is MAC spoofing?

MAC spoofing is a method by which unique hardware addresses are masked using a Locally Administered Address (LAA) in the software. MAC spoofing can offer protection for your privacy when using public LAN or WLAN networks, but can also be used for illegal network activities. We explain to you here how MAC spoofing works and which settings in Windows must be accessed in order to change your MAC...

How port scanning contributes to your system’s security

It’s easy to lose track of all the different programs that are responsible for inbound and outbound data traffic. Networks hosting a large number of computer systems that are constantly communicating with online services often require technical backup. High-performance tools check the activities of various applications or computers and can close existing security gaps. Using port scanners is one...

Ransomware, adware, etc. – how can you protect yourself?

The internet is a playground for cybercriminals and fraudsters – for many, this is an annoying and frightening reality. The threats from unwanted software range from harmless advertising to trojans, which can paralyse complete computer networks. The forms of malicious software or malware are diverse, the countermeasures often very simple. In our article, you can read about how ransomware, spyware,...

Bonjour: What’s behind the zeroconf implementation

Manually organising a large local network can be a nerve-wracking and very complicated matter. Without your own DHCP and DNS servers to support you in the distribution of addresses and name resolution, all IPs would have to be entered manually and also updated independently if changes are made in the network. Zeroconf implementations like Bonjour, which connect network components almost without...

SQL Injection: Protect your database system

There are daily reports on how security gaps in applications are exploited – because hardly a day goes by without a new gap being discovered or a known gap being closed. One attack method, which has always been based on exploiting such weak points, is called SQL injection. But what is actually hidden behind the malicious database exploitation and how can you protect your database system from it?

Use subnetting to get the most out of your network

Dividing a corporate network into smaller subnets has some advantages in terms of speed, security, and logical organisation. However, many people find it difficult to set up. Binary computational operations and long series of numbers are frightening, but the principle itself is not so complicated. We explain what subnetting is, how to calculate a subnetmask, and what you need subnets for, so that...

Ubuntu: The versatile Linux distribution with long-term support

Whether a home PC, work laptop, or website server – without an operating system, the management of hardware resources wouldn’t be possible. Windows systems have proven themselves over the years, and Apple computers run with Mac OS X as the standard, but Linux distributions are no longer a niche in the server environment. Ubuntu, for example, continues to build on traditional open source...

Linux editor with a vast range of functions – Vim

In order to edit text files or receive source codes from software or websites, you require a text editor. Whether you’re using Linux, Windows, or Mac: the majority of operating systems these days already have them installed by default. There are also editors like Vim, which have a wider range of functions and simplify working with the confusing lines of code.