Skip to content
  • About us
  • PRODUCTS
    • DDoS Protection
      • Corero
    • Firewalls
      • Fortinet
    • Load Balancer
      • A10 Networks
      • FortiADC
    • Email
      • Open Source based Mail Gateway
      • SEPPmail
      • Kerio Connect
    • Virtualisation
      • Proxmox VE
    • Apple
  • SERVICES
    • Audit
      • Security Analysis
    • Training
      • DNS – Domain Name Services Training
      • IPv6 in the wild
    • Consulting
      • Network Optimisation and Troubleshooting
      • IPv6 Basics Explained
      • Logging and Monitoring
    • Fortinet Expert
  • PROFILE
    • Peter Bruderer
    • Claudia Caroline Kobler Bruderer
    • Cédric Bruderer
  • Hints and Tips
  • Deutsch
Menu Close
  • About us
  • PRODUCTS
    • DDoS Protection
      • Corero
    • Firewalls
      • Fortinet
    • Load Balancer
      • A10 Networks
      • FortiADC
    • Email
      • Open Source based Mail Gateway
      • SEPPmail
      • Kerio Connect
    • Virtualisation
      • Proxmox VE
    • Apple
  • SERVICES
    • Audit
      • Security Analysis
    • Training
      • DNS – Domain Name Services Training
      • IPv6 in the wild
    • Consulting
      • Network Optimisation and Troubleshooting
      • IPv6 Basics Explained
      • Logging and Monitoring
    • Fortinet Expert
  • PROFILE
    • Peter Bruderer
    • Claudia Caroline Kobler Bruderer
    • Cédric Bruderer
  • Hints and Tips
  • Deutsch
Bruderer Research GmbH

Computer Communication Competence

What is IPv6

  • Post author:Peter Bruderer
  • Post published:26.12.2013
  • Post category:TCP/IP

For most people it is not obvious, what the change from IPv4 to IPv6 really means. It is actually very simple. IP addresses are like phone numbers. A long time…

Continue ReadingWhat is IPv6

Biggest risks of IPv6

  • Post author:Peter Bruderer
  • Post published:26.12.2013
  • Post category:Security/TCP/IP

Like any other protocol, IPv6 got it's own little problems. These weaknesses can mainly be exploited in the local network. The problem with IPv6 is the fact, the it is…

Continue ReadingBiggest risks of IPv6

Geotagging in Pictures

  • Post author:Peter Bruderer
  • Post published:25.12.2013
  • Post category:Privacy

Did you ever think about how great it is, if your new digital camera got GPS? In Apple's Photos or any other modern image management software you can automatically see…

Continue ReadingGeotagging in Pictures

Cloud Computing

  • Post author:Peter Bruderer
  • Post published:25.12.2013
  • Post category:Privacy

Up to now, you had to buy a software licsense and installed the software on your PC. According to Google, Microsoft, Apple and Adobe this is subject to change. Using…

Continue ReadingCloud Computing

Spam Trap

  • Post author:Peter Bruderer
  • Post published:25.12.2013
  • Post category:Privacy

To get the latest spam mails, you can build a spam trap. The spam trap consists of two parts. First, you have to force the spammers to send spam to…

Continue ReadingSpam Trap

Wireless LAN

  • Post author:Peter Bruderer
  • Post published:25.12.2013
  • Post category:Privacy

Using wireless networks has been completely accepted in the market. It is very comfortable to use wireless connections. At home, in the office. Do do not have to have cables…

Continue ReadingWireless LAN
  • Go to the previous page
  • 1
  • 2
  • 3
  • 4
  • 5
  • Go to the next page

Categories

  • Fortinet
  • General
  • Privacy
  • Proxmox
  • Security
  • TCP/IP
  • Threats

Tags

Apple Cloud Computing FortiGate Geotagging Google IPv6 KVM Malware Passwords Security Spam TCP/IP Threat Troubleshooting Virus Wireless

LINKS

  • Our tips and tricksOpens in a new tab
  • Space Wars Browser GameOpens in a new tab

Contact

  • Address:Fulachstrasse 46, CH-8200 Schaffhausen
  • Phone:+41 52 55 05 111
  • Email:info@brg.chOpens in your application