Malware comes in many different forms, but the goal is always the same: making a profit. That of course is the case for illegal mining of cryptocurrencies, a practice known as cryptojacking. In cryptojacking, infected devices are misused to secretly mine cryptocurrencies – often as part of botnets. We explain how you can recognize cryptojacking and how you can protect your devices.Cryptojacking: How to detect and protect against infection
Cryptos are the new gold. Unsurprisingly then that cryptomining evokes some association to the historical gold rush. The rise of cryptocurrencies like Bitcoin has led to tremendous hype surrounding digital money and cryptomining. Mining, in this case, refers to the mining or verification of cryptos through computing power and cryptominers. Read on to learn about the function and the dangers of...Cryptomining: meaning, function, and dangers
The Domain Name System, or DNS for short, plays an important role when surfing the web because it is used to translate domain names into server IP addresses. We explain what DNS is and show you exactly how the system works and which servers are used. We also explain the risks associated with DNS so that you’re well aware.What is DNS? Overview of the Domain Name System
Cloud storage can be used for a variety of functions including sharing photos, collaborating on documents and backing up important files. There are loads of cloud storage solution providers to choose from. In the following article, we will compare two of the longest standing ones out there and their key features. Dropbox vs. Google Drive – which provider should you choose?Dropbox vs. Google Drive: comparing cloud storage services
Storing files online on a cloud platform has become part of everyday life for many people. Storing files with online storage providers takes the load off your hard drive and ensures that they are available anytime and from anywhere. But what are the best cloud storage providers on the market? And what differences are there between them? Which one would be best for me?The best cloud storage providers – an overview of the best online storage
If you’re a fan of online gaming but don’t like the constraints placed on your creativity when playing a normal game, you can easily change that. Hosting your own server enables you to take control of creative aspects such as modding the game world and characters. It also enables you to play with your friends playing by your rules. Learn more.How to set up your own Path of Titans server hosting
There’s no way around the SSH security procedure if you want to enable secure remote connections to an Ubuntu system. OpenSSH from Ubuntu has an SSH server in the software package which fulfills all the important requirements. However, Ubuntu SSH is disabled by default, so it must be set up and activated first. We’ll tell you how to complete the installation.How to install and enable Ubuntu SSH
Ubuntu has been one of the most popular server operating systems for years. The software has low hardware requirements and it is open source, making it freely available to everyone. Installation is simple in comparison to other operating systems thanks to its ready for use and downloadable images. Our article will detail the installation and what to keep in mind when setting up an UbuntuHow to install and set up an Ubuntu server
In IT, intentional redundancy protects storage systems and data centers from data loss and system failures. The duplication and repeated design of data sets, supply paths and technical components strengthen the resilience of databases and IT systems. Find out here how redundancy works, when it makes sense, and when it unintentionally becomes a hurdle.What is redundancy in computer science?
The Ubuntu-based Linux variant Zorin OS 16 is treated as a competitor to Windows 11. The visually appealing, Windows-like layout “Zorin Desktop” makes the switch to the Linux variant particularly easy for Windows users. Other features include a link with Android devices, preinstalled software, and easy installation. Here, we present Zorin OS in more detail.What are pros and cons of Zorin OS?
IONOS Server Guide: professional tips on configuration and administration
Servers are what make up the physical basis of the internet. Setting up your own professional site, putting products online for sale, or connecting multiple company locations with one another: all of these tasks require the support of high-performance computers. And it doesn’t matter if you purchase hardware resources for your own data center or opt for the flexibility of cloud services: operating a server comes with the challenge of independently configuring and administering hardware components. But don’t worry, there’s a lot of support out there for these tasks. In the Server Guide of IONOS’s Digital Guide series, you’ll find regular articles, news, and tutorials on how to operate this indispensable component of today’s IT infrastructure.
Server information for businesses, developers, and tech hobbyists
Packed with practical tips, our guide covers a wide spectrum of topics primarily aimed at mid-sized companies, freelance developers, and tech hobbyists. While some articles, like ‘What is a server?’ or ‘DNS – name resolution online’ cater more to beginners, experts are by no means left hanging; there’s a wide range of detailed texts and tutorials on important tasks like choosing the best operating system, filling security gaps, or getting the best possible performance out of your software and hardware.
What you can expect in the IONOS Server Guide
If you take a look, you’ll notice our guide is divided into four different subcategories, each covering a different topic. The ‘KnowHow’ area sets out to familiarize beginners with the basics of operating a server. Details on different server types and how to use them are also laid out here. Tips and tricks on managing server software is found under the keyword, ‘Configuration’. The category, ‘Security’ is all about dealing with potential problems server operators may encounter from online threats. Conventional methods of attack, like viruses, worms, and Trojans, and what you can do to combat them are explained here. And the category, ‘Tools’, provides useful guidance on what resources can help make administering your server a more manageable task.