English
+370 5 205 5502 sales@monovm.com

Everythings you want and need to know in one place.

Search

Search:

30

Jul, 19

We have already spoken about what is IPv6 and its improvements over IPv4. Now let us tell you more about the features that come with IPv6. The successor of IPv4 is not designed to be backward compatible. Trying to keep the basic functionalities of IP addressing, IPv6 is redesigned entirely. It offers the following features:• Larger Address SpaceIn contrast to IPv4, IPv6 uses 4 times more bits to address a device on the Internet. This much of extra bits can provide approximately 3.4×1038 different combinations of addresses. This address can accumulate the aggressive requirement of...

30

Jul, 19

Internet Protocol version 6 (IPv6) is the next generation of the Internet Protocol (IP). IPv6 was developed by the Internet Engineering Task Force (IETF) to deal with the long-anticipated problem of IPv4 address exhaustion. Throughout this article, we will become familiar with the concept of IPv6. Overview Internet Protocol version 6 is a new addressing protocol designed to incorporate all the possible requirements of the future Internet known to us as Internet version 2. This protocol, like its predecessor, IPv4, works on the Network Layer (Layer-3) of the OSI model. Along with its...

01

Jul, 19

Despite the name, the cloud has nothing to do with the white fluffy things you see floating in the sky. In the field of IT, the cloud describes a global network of servers, each with its own unique function. Unlike a server, it is not a physical thing but a vast network of servers spread all around the world. All these servers operate as a single ecosystem. The cloud has many uses such as storing and managing data, running applications or delivering content and services like video streaming and social media. These services can all be accessed online from any internet-capable device. Just...

27

Jun, 19

The Advantages of Using a CDN

The distance between a client and a server substantially affects the load times the client experiences. Based on that assumption, a sure way to maximize user experience would be to have multiple servers hosting the website in strategically-placed locations around the globe. Although theoretically, this solution would work, in practice it would be quite inefficient. Hosting the entire website on multiple servers would just take up additional space without a good purpose. Therefore, a similar yet way more efficient and optimized method was created. It was named CDN, which stands for Content...

19

Jun, 19

The Guide to Network Optimization

The Internet is not a single network, but a huge network of networks. It has grown so much in the past decades that there are about 7 billion internet-connected devices in the world and that number grows daily. Thanks to the internet-of-things (i.e. IoT), researchers expect there to be more than 64 billion devices that are connected to the internet by 2025. The sheer number of internet-using devices and the fast rate of growth is putting severe pressure on the local networks that make up the internet. To combat this, simply having powerful resources are no longer sufficient. That is where...

First of all, before we begin this tutorial and its configuration, we will introduce SFTP so that users who are not familiar with this file transfer protocol by SSH will have a better understanding of it. Introducing SFTP The SFTP, or the SSH File Transfer Protocol, is a file transfer protocol that is activated by default after installing Secure Shell on the Linux operating system. Using SFTP, you will be able to transfer or receive your files through a secure Linux tunnel. This protocol is often confused with the FTP protocol or its unsecured form, but it should be noted that this...

First of all, before we begin this tutorial and its configuration, we will introduce SFTP so that users who are not familiar with this file transfer protocol by SSH will have a better understanding of it. Introducing SFTP The SFTP, or the SSH File Transfer Protocol, is a file transfer protocol that is activated by default after installing Secure Shell on the Linux operating system. Using SFTP, you will be able to transfer or receive your files through a secure Linux tunnel. This protocol is often confused with the FTP protocol or its unsecured form, but it should be noted that this...

26

Apr, 19

Both Telnet and Secure Shell (i.e. SSH) are network protocols used to connect to remote servers and both have been used widely at different points in time. Telnet is the original protocol that was used when the internet was first launched in 1969. It was developed to be used in private networks and has no security measures, making it irrelevent when used on public networks. This is the main reason why SSH was developed as a replacement for Telnet. We will discuss the differences between telnet and SSH, however lets first understand what each one is.   What is TELNET? Telnet is a...

23

Apr, 19

What is a DDoS Attack?

What is DDoS? A DDoS or Distributed-Denial-of-Service attack is an unauthorized attempt to increase the traffic of a targeted server or network by staggering the target or its surrounding infrastructure with a huge amount of internet traffic. A DDoS attack achieves effectiveness by using multiple computer systems as the source of the traffic. In short, a DDoS attack is when hackers attempt to make a website or computer unavailable by flooding or crashing the website with too much traffic. How does a DDoS attack work? A DDoS attack happens when an attacker takes control of a network of...

19

Apr, 19

What is the OSI Model?

What is the OSI model? The OSI model or Open System Interconnection model is a conceptual model that describes the functionality of the networking system with no regard to the underlying technology infrastructure. The OSI model was introduced in 1984. Here it is divided into seven abstract layers of data communication and standardized protocols into appropriate groups of networking functionality. The purpose of the OSI reference model is to guide vendors and developers so the digital communication products and software programs they create will interoperate, and to facilitate clear...