What is OpenStack?
What is OpenStack?
  • Tools

Cloud computing makes working with data quicker, simpler, and safer. Through common standards and simple access methods, private users such as companies can benefit from the advantages of cloud-based data processing. One of the most successful cloud systems is the former NASA project OpenStack. Walmart and Amazon have even made it their standard system.

What is OpenStack?
The best online backup services
The best online backup services
  • Tools

Many people use several devices and have data stored on them. What should you do if your data carrier fails, or the data gets lost? Backing up data is extremely important, and an online backup makes perfect sense. By doing this, you don’t risk losing your important files. What is the best option? Here is a comparison of online backup service providers.

The best online backup services
Telnet – the system-wide remote protocol
Telnet
  • Tools

Remote access to remote computer systems has always been a part of well-organized networks. Administrators can manage individual users as well as work on the move since a remote connection enables access to company data. One of the first protocols developed specifically for this purpose was Telnet.

Telnet
Telnet commands
Telnet commands
  • Tools

You use Telnet commands to control the connection between your PC or laptop and an external system, such as a web server. It is not only important to know the corresponding commands, but also which are appropriate. This is because Telnet commands are only effective when parameters are specified. Read on to find out more.

Telnet commands
Sync to Google Drive
How to sync Google Drive with Drive for Desktop
  • Tools

With Google Drive, you can store data in the cloud and access it regardless of the device you’re using. The Google Drive for desktop tool lets you upload files to the cloud from any device and sync local changes made to files. By synchronizing Google Drive with your PC, your cloud backup is always up to date.

How to sync Google Drive with Drive for Desktop
SSH: Secure Shell
SSH - Secure Shell simply explained
  • Tools

If you want to establish a secure connection to your server via the internet, you will need SSH. Whether sending commands, uploading files, or during remote maintenance, secure shell ensures that criminals cannot gain access to your sensitive data. Effective encryption and correct authentication are essential for this. To help you understand what is behind the SSH protocol, we reveal how it works...

SSH - Secure Shell simply explained
Single sign-on
Single sign-on (SSO)
  • Tools

Online activity could be so simple – just enter your access data once and automatically be logged in for all accounts and services on the web, instead of having to remember dozens of passwords. This is, in fact, a reality for many websites, and the process is called SSO – single sign-on – and is becoming ever more popular among private and professional users. But what are the benefits of SSO, and...

Single sign-on (SSO)
Podman Tutorial
Podman Tutorial
  • Tools

Released in 2018, Podman is increasingly seen as an interesting alternative to Docker. Compared to the forerunner of the container management sector, Podman focuses more on flexibility when combining and configuring containers, allowing management with common user rights. Read on for extensive information and a Podman tutorial for beginners.

Podman Tutorial
Open Command Prompt
How to open the command Prompt in Windows
  • Tools

Command Prompt in Windows is used to enter command line instructions. The Microsoft operating system provides several options to launch Command Prompt. The method you choose ultimately depends on your personal user habits. You can also open Command Prompt in a special mode with administrator privileges if required for certain system tasks.

How to open the command Prompt in Windows
Nagios – an overview of all network processes
What is Nagios?
  • Tools

IT departments are not to be envied: all devices, servers, databases, etc., must not only be integrated into the network, but also work at any time. In order to prevent any problems that might arise in advance, Nagios is the monitoring tool you need in your standard IT repertoire. What makes the open source solution so special and what are the alternatives?

What is Nagios?

Server

IONOS Server Guide: professional tips on configuration and administration

Servers are what make up the physical basis of the internet. Setting up your own professional site, putting products online for sale, or connecting multiple company locations with one another: all of these tasks require the support of high-performance computers. And it doesn’t matter if you purchase hardware resources for your own data center or opt for the flexibility of cloud services: operating a server comes with the challenge of independently configuring and administering hardware components. But don’t worry, there’s a lot of support out there for these tasks. In the Server Guide of IONOS’s Digital Guide series, you’ll find regular articles, news, and tutorials on how to operate this indispensable component of today’s IT infrastructure.

 

Server information for businesses, developers, and tech hobbyists

Packed with practical tips, our guide covers a wide spectrum of topics primarily aimed at mid-sized companies, freelance developers, and tech hobbyists. While some articles, like ‘What is a server?’ or ‘DNS – name resolution online’ cater more to beginners, experts are by no means left hanging; there’s a wide range of detailed texts and tutorials on important tasks like choosing the best operating system, filling security gaps, or getting the best possible performance out of your software and hardware.

 

What you can expect in the IONOS Server Guide

If you take a look, you’ll notice our guide is divided into four different subcategories, each covering a different topic. The ‘KnowHow’ area sets out to familiarize beginners with the basics of operating a server. Details on different server types and how to use them are also laid out here. Tips and tricks on managing server software is found under the keyword, ‘Configuration’. The category, ‘Security’ is all about dealing with potential problems server operators may encounter from online threats. Conventional methods of attack, like viruses, worms, and Trojans, and what you can do to combat them are explained here. And the category, ‘Tools’, provides useful guidance on what resources can help make administering your server a more manageable task.