Network

Telnet – the system-wide remote protocol

Telnet: a client-server protocol for cross-platform remote connections

Remote access to remote computer systems has always been a part of well-organised networks. Administrators can manage individual users as well as work on the move since a remote connection enables access to company data. One of the first protocols developed specifically for this purpose was Telnet.

SNMP: Simple Network Management Protocol

SNMP (Simple Network Management Protocol): the protocol for network management

The communication protocol SNMP (Simple Network Management Protocol) is an elementary component of many network management applications. It defines a number of message types that greatly simplify the monitoring and administration of individual network participants such as PCs, routers, servers, switches, firewalls, or printers. How exactly the SNMP protocol works and what fundamental adjustments...

Bonjour: Software for zero configuration networking

Bonjour: What’s behind the zeroconf implementation

Manually organising a large local network can be a nerve-wracking and very complicated matter. Without your own DHCP and DNS servers to support you in the distribution of addresses and name resolution, all IPs would have to be entered manually and also updated independently if changes are made in the network. Zeroconf implementations like Bonjour, which connect network components almost without...

Raspberry Pi at a glance: 10 great Raspberry Pi projects

Explore the possibilities with these 17 Raspberry Pi projects

Raspberry Pi is an inexpensive small form factor PC that can behave like a standard computer in many respects. Users can use this innovative mini-computer for all kinds of functions, from setting up an operating system to surfing the web, to using it as a server or a media center, and much more besides. Discover 10 interesting Raspberry Pi projects to try out at home.

MPLS:  What is Multiprotocol label switching?

MPLS: What’s behind the network technology

Speed and reliability play an important role for data transfer in networks. They reflect the quality of the connection, which is why providers do everything they can to guarantee the agreed services. A method primarily used in virtual private networks is the so-called multiprotocol label switching (MPLS).

The different network types

Network types at a glance

When several computers are connected to one another it is known as a network. Networks enable data exchange between different devices, making shared resources available. Different network types are implemented depending on which transmission techniques and standards are used. These differ in terms of the number of connected systems and potential reach.

SNTP: simple network time protocol

Simple network time protocol: the stripped-back protocol for time synchronization

An exact system time on a computer is especially important when devices need to exchange data. Cross-system processes quickly come to a standstill if the generated time stamps are very different from the time that applies to the system. Synchronisation methods that keep the clocks of the individual network participants in sync are utterly indispensable. One of the simplest methods to achieve time...

Protection against ransomware, spyware, and scareware

Ransomware, adware, etc. – how can you protect yourself?

The internet is a playground for cybercriminals and fraudsters – for many, this is an annoying and frightening reality. The threats from unwanted software range from harmless advertising to trojans, which can paralyse complete computer networks. The forms of malicious software or malware are diverse, the countermeasures often very simple. In our article, you can read about how ransomware, spyware,...

DHCP: An overview of the Client/Server protocol

DHCP: What’s behind the Dynamic Host Configuration Protocol

If you’re connected to an internet router and power on your computer, it automatically obtains the necessary network parameters, such as the IP address, subnet mask, or DNS server. This is made possible by the Dynamic Host Configuration Protocol (DHCP), which simplifies address assignment when connecting to the internet and makes setting up local networks easy as pie.

ARP Spoofing: Attacks from the internal network

ARP Spoofing – flaws in network security

When it comes to network security, administrators focus primarily on attacks from the internet. But often times, the danger lurks in the internal network. If the LAN turns out to be a blind spot in the security IT, then internal attackers have an easy time. A popular method of attack is ARP spoofing. With this, hackers switch undetected between two communication partners in order to intercept,...