English
+370 5 205 5502 sales@monovm.com

At MonoVM we provide you with the underlying facts, assumptions and rules which a computer system has.

Search

Search:

Despite the name, the cloud has nothing to do with the white fluffy things you see floating in the sky. In the field of IT, the cloud describes a global network of servers, each with its own unique function. Unlike a server, it is not a physical thing but a vast network of servers spread all around the world. All these servers operate as a single ecosystem. The cloud has many uses such as storing and managing data, running applications or delivering content and services like video streaming and social media. These services can all be accessed online from any internet-capable device. Just...

27

Jun, 19

The distance between a client and a server substantially affects the load times the client experiences. Based on that assumption, a sure way to maximize user experience would be to have multiple servers hosting the website in strategically-placed locations around the globe. Although theoretically, this solution would work, in practice it would be quite inefficient. Hosting the entire website on multiple servers would just take up additional space without a good purpose. Therefore, a similar yet way more efficient and optimized method was created. It was named CDN, which stands for Content...

19

Jun, 19

The Internet is not a single network, but a huge network of networks. It has grown so much in the past decades that there are about 7 billion internet-connected devices in the world and that number grows daily. Thanks to the internet-of-things (i.e. IoT), researchers expect there to be more than 64 billion devices that are connected to the internet by 2025. The sheer number of internet-using devices and the fast rate of growth is putting severe pressure on the local networks that make up the internet. To combat this, simply having powerful resources are no longer sufficient. That is where...

First of all, before we begin this tutorial and its configuration, we will introduce SFTP so that users who are not familiar with this file transfer protocol by SSH will have a better understanding of it. Introducing SFTP The SFTP, or the SSH File Transfer Protocol, is a file transfer protocol that is activated by default after installing Secure Shell on the Linux operating system. Using SFTP, you will be able to transfer or receive your files through a secure Linux tunnel. This protocol is often confused with the FTP protocol or its unsecured form, but it should be noted that this...

First of all, before we begin this tutorial and its configuration, we will introduce SFTP so that users who are not familiar with this file transfer protocol by SSH will have a better understanding of it. Introducing SFTP The SFTP, or the SSH File Transfer Protocol, is a file transfer protocol that is activated by default after installing Secure Shell on the Linux operating system. Using SFTP, you will be able to transfer or receive your files through a secure Linux tunnel. This protocol is often confused with the FTP protocol or its unsecured form, but it should be noted that this...

Both Telnet and Secure Shell (i.e. SSH) are network protocols used to connect to remote servers and both have been used widely at different points in time. Telnet is the original protocol that was used when the internet was first launched in 1969. It was developed to be used in private networks and has no security measures, making it irrelevent when used on public networks. This is the main reason why SSH was developed as a replacement for Telnet. We will discuss the differences between telnet and SSH, however lets first understand what each one is.   What is TELNET? Telnet is a...

23

Apr, 19

What is DDoS? A DDoS or Distributed-Denial-of-Service attack is an unauthorized attempt to increase the traffic of a targeted server or network by staggering the target or its surrounding infrastructure with a huge amount of internet traffic. A DDoS attack achieves effectiveness by using multiple computer systems as the source of the traffic. In short, a DDoS attack is when hackers attempt to make a website or computer unavailable by flooding or crashing the website with too much traffic. How does a DDoS attack work? A DDoS attack happens when an attacker takes control of a network of...

19

Apr, 19

What is the OSI model? The OSI model or Open System Interconnection model is a conceptual model that describes the functionality of the networking system with no regard to the underlying technology infrastructure. The OSI model was introduced in 1984. Here it is divided into seven abstract layers of data communication and standardized protocols into appropriate groups of networking functionality. The purpose of the OSI reference model is to guide vendors and developers so the digital communication products and software programs they create will interoperate, and to facilitate clear...

18

Apr, 19

We are used to transmitting data through regular copper wires, however they come with a great deal of disadvantages. The reason for this is that copper wires use electrical signals to transmit data, creating challenges such as signal degradation, electromagnetic interference and low bandwidth limits. At some point in the last century, the entire internet relied on copper wires for worldwide data transmission, however innovation came from a completely unexpected direction. In the 1950s, optical fibers were originally developed for use in endoscopes to help doctors see inside the human body...

In general, most people assume that their bandwidth is their internet speed, however that is not true. It is simply the amount of data they can receive in a second. For example, if your internet provider offers you 100Mbps, it does not mean that you will have a download speed of 100 megabits per second, but that you could possibly receive 100 megabits every second with your connection. Your true internet speed comes from a combination of bandwidth and latency.   What is Latency? Latency is defined as the amount of time it takes to send information from one machine to another. It could...