Raspberry Pi Plex
Raspberry Pi and Plex: how to turn a single-board computer into a media server
  • Configuration

Plex is among the most popular and user-friendly solutions for creating a media server in your home network. In contrast to many other applications, which are often Windows-only, the Plex server is compatible with Linux, Mac, and even single-board computers like the Raspberry Pi. In this Raspberry Pi and Plex tutorial, you will learn what technical requirements must be fulfilled and how...

Raspberry Pi and Plex: how to turn a single-board computer into a media server
Dynamic IP addresses
What is a dynamic IP address?
  • Know-how

Dynamic or static? This is a common question when it comes to allocating an IP address. While static IP addresses are mostly used for servers or peripheral devices such as printers and speakers, other devices such as laptops and computers will often have a dynamic IP. What is the difference and what benefits does a dynamic IP address offer? Read on to find out more.

What is a dynamic IP address?
Guilded
What does the Guilded game chat app offer?
  • Know-how

The game chat app Guilded is now considered just as popular as Discord within the gaming community. Guilded actually offers more benefits for chat servers and channels when compared with Discord, such as more free features, high-quality video and audio streaming, voice text chats, server groups, and a focus on eSports. In our article, we’ll show discuss Guilded and compare it to the other chat...

What does the Guilded game chat app offer?
Client server model
How does the client server model work?
  • Know-how

How does the distribution of services and tasks work when clients and servers interact in a network? To answer this question, the client server model tends to be used. The underlying principle is that servers provide services that clients use. What exactly is behind it and what are the pros and cons of the model?

How does the client server model work?
Rack server
How do rack servers work?
  • Know-how

Scalability, fail safety and redundancy are essential when processing information. Space-saving, durable server technologies that offer plenty of capacity and simple configuration are essential for this. That’s why rack servers tend to be used frequently in data centers. Find out how rack servers work and what their pros and cons are.

How do rack servers work?
Zero-day exploit
What is a Zero-day exploit?
  • Security

The risk for businesses to fall victim to a zero-day exploit has increased in recent years. More and more often, cybercriminals can take advantage of as-yet undiscovered weak points in business software in order to steal or manipulate data. It is difficult to protect against these attacks, but businesses can take some measures to improve their security.

What is a Zero-day exploit?
Wipe hard drive
How to wipe a hard drive (HDD or SSD) securely
  • Security

Even formatting a hard drive under Windows or Mac does not completely wipe all data. Although wiping it is not impossible, it requires additional tools to be able to wipe a Mac hard drive or Windows hard drive with the utmost thoroughness. These can be used to safely wipe and overwrite data on both an HDD and an SSD. You can find out how this works here.

How to wipe a hard drive (HDD or SSD) securely
What is spoofing?
What is spoofing?
  • Security

Spoofing attacks encompass a wide range of potential attack scenarios. Besides conventional approaches like IP spoofing and DNS spoofing, they also include particularly dangerous phishing attacks. Read this article to find out how spoofing attacks work and what measures you can take to protect yourself effectively.

What is spoofing?
Blade server
How do blade servers work?
  • Know-how

Blade servers are among the smallest, most powerful server technologies. They are scalable, save space and are designed with high server density in mind. The strengths of blade servers include their dedicated use for highly specific applications and a low power consumption. Find out more about the pros and cons of blade servers and how they differ from rack servers.

How do blade servers work?
What is SIEM?
What is SIEM (Security Information and Event Management)?
  • Security

Security gaps in IT infrastructure can risk a company’s reputation or even threaten its survival. Where criminals manage to shut down company networks or gain access to sensitive data, financial and image-related damage becomes a certainty. SIEM (Security Information and Event Management) allows businesses to detect danger in real-time, allowing for appropriate and timely reactions.

What is SIEM (Security Information and Event Management)?

Server

IONOS Server Guide: professional tips on configuration and administration

Servers are what make up the physical basis of the internet. Setting up your own professional site, putting products online for sale, or connecting multiple company locations with one another: all of these tasks require the support of high-performance computers. And it doesn’t matter if you purchase hardware resources for your own data center or opt for the flexibility of cloud services: operating a server comes with the challenge of independently configuring and administering hardware components. But don’t worry, there’s a lot of support out there for these tasks. In the Server Guide of IONOS’s Digital Guide series, you’ll find regular articles, news, and tutorials on how to operate this indispensable component of today’s IT infrastructure.

 

Server information for businesses, developers, and tech hobbyists

Packed with practical tips, our guide covers a wide spectrum of topics primarily aimed at mid-sized companies, freelance developers, and tech hobbyists. While some articles, like ‘What is a server?’ or ‘DNS – name resolution online’ cater more to beginners, experts are by no means left hanging; there’s a wide range of detailed texts and tutorials on important tasks like choosing the best operating system, filling security gaps, or getting the best possible performance out of your software and hardware.

 

What you can expect in the IONOS Server Guide

If you take a look, you’ll notice our guide is divided into four different subcategories, each covering a different topic. The ‘KnowHow’ area sets out to familiarize beginners with the basics of operating a server. Details on different server types and how to use them are also laid out here. Tips and tricks on managing server software is found under the keyword, ‘Configuration’. The category, ‘Security’ is all about dealing with potential problems server operators may encounter from online threats. Conventional methods of attack, like viruses, worms, and Trojans, and what you can do to combat them are explained here. And the category, ‘Tools’, provides useful guidance on what resources can help make administering your server a more manageable task.