Protocols

401 error: What can you do about it?

You’re surfing around on the internet, but instead of getting the desired content you only receive an error message: annoying or even downright frustrating. Especially if you don’t exactly know what the status is supposed to mean. How are you expected to solve the problem, if you don’t know what’s causing it? This also goes for the error 401. Here we explain what the error means and what you can [...]   

HTTP 400 Bad Request | finding the causes

Internet users are often confronted with error messages. HTTP status codes can be especially annoying, and even more so if you don’t understand what they mean. The message 'HTTP 400 – Bad Request' is a mystery for many internet users, but luckily it can be solved in most cases. We explain what the error message means and how to fix the error.   

Web stacks: the basics and examples

Terms like web stack or web application stack refer to software packages that are used to develop and operate websites and web applications. The most well-known example of this technology, the LAMP stack, has witnessed increasing competition through the likes of JavaScript-based framework bundles, which feature unified programming languages for servers and clients. This gives them a considerable [...]   

ERR_SSL_PROTOCOL_ERROR: the best solutions

Chrome is the world’s most widely-used internet browser. The application scores points not only when it comes to security and speed, but also with its features such as cross-device synchronisation of user data. But errors can occur even when surfing with Google’s wonder weapon. These can lead to the browser crashing or prevent certain pages from being accessed. The error message [...]   

Log analysis: User statistics from the server log

How many pages are accessed by a single user when they’re visiting your website? And which links or search queries did they use to lead them to you? To answer such questions, well-known web analysis tools like Google Analytics seem to be the only option. But the web server’s automatically generated log file also provides a solid foundation for user information. The following guide discusses the [...]   

Encryption methods: An overview

E-mail, instant messaging, or voice-over IP: If you want to communicate over the internet, you should make sure that the data transfer process can be trusted. The same goes for the World Wide Web. With online banking and digital shopping, money transactions are increasingly being carried out online. Popular encryption methods like DES, AES, or RSA should guarantee the security of passwords, credit [...]   

How to set up a proxy server in your browser

Proxy settings can be established quickly and easily via the operating system’s control panel or browser menu. Discover exactly how to do this with our comprehensive step-by-step introductions for Windows 7, 8, and 10. A faulty proxy configuration can cause connection failures, but there are simple ways to detect the causes and rectify these errors.   

IP Spoofing: Fundamentals and counter-measures

Sending data over networks is one of the most important and highest utilised functions of the modern computer era. But the structure of the necessary TCP/IP connections makes it all too easy for criminals to intercept data packets along their way and either view or alter their contents. One of the most common methods of attack is IP spoofing, which allows DoS and DDoS attacks, among other things [...]   

DHCP: An overview of the Client/Server protocol

If you’re connected to an internet router and power on your computer, it automatically obtains the necessary network parameters, such as the IP address, subnet mask, or DNS server. This is made possible by the Dynamic Host Configuration Protocol (DHCP), which simplifies address assignment when connecting to the internet and makes setting up local networks easy as pie.   

What are the benefits of IPv6?

IPv6 is the newest version of the internet protocols, and should overcome the central issues of its predecessors. Included in these issues is the impending shortage of IPv4 addresses as well as the violation of the end-to-end principle by the strict separation of public and private IPs. This article gives an overview of the functions of IPv6 as well as the structure and distribution of address [...]