What is DoS (denial of service)?
Denial of Service (DoS) attacks
  • Know-how

Denial of service attacks – also called DoS attacks – are a relatively simple and effective method for cyber criminals to bring down a website, email traffic, or an entire network. Besides businesses, institutions such as the German parliament or Wikipedia have been victims of these types of attacks. This has raised the question: What exactly is denial of service, and what happens during an...

Denial of Service (DoS) attacks
What is Docker?
Docker (The container technology)
  • Know-how

The Docker virtualization solution has transformed application development. In some cases, standardized containers are used to create gigantic clusters of loosely coupled microservices. They run as distributed swarms across system and infrastructure boundaries. Special tools and workflows are used to deal with the resulting complexity.

Docker (The container technology)
What is DBaaS
DBaaS (Database as a Service)
  • Know-how

Relational database systems such as MySQL no longer necessarily have to be hosted in-house. With Database as a Service – or DBaaS for short – one or more databases are outsourced to the cloud, saving costs and capacity. Here we explain how DBaaS works, what it’s suitable for, and what advantages and disadvantages it has.

DBaaS (Database as a Service)
What is Cloud Storage?
Cloud Storage
  • Know-how

Portable storage media such as CDs or USB sticks are still in demand when making backups or transferring files to another device. More and more often however, users also rely on cloud storage solutions that allow data to be outsourced to an external server environment. But what exactly is cloud storage? And how does this storage model offered by various providers work?

Cloud Storage
What is Ceph?
Ceph
  • Know-how

Ceph is a storage solution that enables the shared filing of data in a network, which ensures the redundancy, scalability, and maximum performance of the existing infrastructure. The system was released with a GNU General Public License and can be used free of charge.

Ceph
What is CAP theorem?
CAP Theorem
  • Know-how

The CAP theorem states that distributed systems can only guarantee two out of the following three points at the same time: consistency, availability, and partition tolerance. In this article, we will explain where the CAP theorem originated and how it is defined. We will then provide some concrete examples which prove the validity of Brewer’s theorem, as it is also called.

CAP Theorem
What is block storage?
Block Storage explained
  • Know-how

Save your file and voilà! When deciding on a storage method, many users concentrate on the amount of space provided and don’t take anything else into account. However, there are a vast array of storage options, each with their own qualities. Let’s look at block storage. How does block storage work and what are its advantages?

Block Storage explained
What is BIOS
What is BIOS? The Basic Input/Output System
  • Know-how

BIOS has been around for almost as long as PCs themselves. If you frequently struggle with computer issues, you may have heard of the term, but few users know exactly what it is. Yet, the BIOS is fundamental to the operability of every PC. In this article, we discuss what’s behind the acronym, which functions the BIOS performs, and what its successors look like.

What is BIOS? The Basic Input/Output System
What is a VPS (virtual private server)?
What is a VPS (Virtual Private Server)?
  • Know-how

A virtual private server (VPS) is a compromise between shared hosting and a dedicated server. The VPS product allows web hosts to combine the strengths of both hosting models in one, cost-efficient IaaS solution. We’ll take a closer look at this hosting solution, demonstrating how a virtual private server works, exploring the advantages and disadvantages of it, and deciding who the model is best...

What is a VPS (Virtual Private Server)?
What is a VPN (virtual private network)?
VPN (Virtual Private Network)
  • Know-how

VPN implementations offer an affordable alternative for locally connecting networks, as well as making network resources available for external devices. In contrast to corporate networks, no private communication network is required. Instead, like the internet, VPNs rely on networks, and protect sensitive data through a process known as tunneling.

VPN (Virtual Private Network)

Server

IONOS Server Guide: professional tips on configuration and administration

Servers are what make up the physical basis of the internet. Setting up your own professional site, putting products online for sale, or connecting multiple company locations with one another: all of these tasks require the support of high-performance computers. And it doesn’t matter if you purchase hardware resources for your own data center or opt for the flexibility of cloud services: operating a server comes with the challenge of independently configuring and administering hardware components. But don’t worry, there’s a lot of support out there for these tasks. In the Server Guide of IONOS’s Digital Guide series, you’ll find regular articles, news, and tutorials on how to operate this indispensable component of today’s IT infrastructure.

 

Server information for businesses, developers, and tech hobbyists

Packed with practical tips, our guide covers a wide spectrum of topics primarily aimed at mid-sized companies, freelance developers, and tech hobbyists. While some articles, like ‘What is a server?’ or ‘DNS – name resolution online’ cater more to beginners, experts are by no means left hanging; there’s a wide range of detailed texts and tutorials on important tasks like choosing the best operating system, filling security gaps, or getting the best possible performance out of your software and hardware.

 

What you can expect in the IONOS Server Guide

If you take a look, you’ll notice our guide is divided into four different subcategories, each covering a different topic. The ‘KnowHow’ area sets out to familiarize beginners with the basics of operating a server. Details on different server types and how to use them are also laid out here. Tips and tricks on managing server software is found under the keyword, ‘Configuration’. The category, ‘Security’ is all about dealing with potential problems server operators may encounter from online threats. Conventional methods of attack, like viruses, worms, and Trojans, and what you can do to combat them are explained here. And the category, ‘Tools’, provides useful guidance on what resources can help make administering your server a more manageable task.