Learning Center
Resources on cyber security and how the Internet works from QickHost. What is QickHost?
Learn about DDoS attacks
In a distributed denial-of-service (DDoS) attack, a network of computers work in tandem to overflow an access point and prevent legitimate users from accessing a service.
Learn about CDNs
In a content delivery network (CDN), a set of distributed servers work together to efficiently deliver Internet content, improving loading speed and reliability.
Learn about DNS
The domain name system (DNS) is often referred to as a phone book for the Internet. It’s the worldwide network that connects users to web content via domain names.
Learn about web application security
The nature of the Internet makes web applications vulnerable to a number of attacks. Web application security involves using a holistic approach to mitigate attacks.
Learn about performance
Web applications that load quickly see higher conversion rates and better SEO performance. Learn about the factors that impact application performance.
Learn about serverless
Serverless computing allows users to write and deploy code without the hassle of worrying about the underlying infrastructure. Learn why more and more developers are opting for a serverless architecture.
Learn about SSL
SSL, known today as TLS, is an encryption protocol that runs on top of the HTTP protocol to protect Internet communication between servers and clients.
Learn about bots
Bots are automated applications that can browse the web. Some bots, such as search engine crawlers, are helpful. But there are also malicious bots which can harm sites and applications in a number of ways.
Learn about the cloud
“The cloud” refers to servers that are accessed over the Internet, and the software and databases that run on those servers. Cloud servers are located in data centers all over the world.
Learn about zero trust
Unlike traditional perimeter-based network security, Zero Trust security trusts no one and no device by default. Learn about the principles and technologies comprising Zero Trust architecture.
Learn about SASE
Secure access service edge (SASE) is an IT model that combines software-defined wide area networking with core security services, and delivers them on the cloud edge. Learn about the core capabilities of SASE solutions.
Learn about the network layer
The “network layer” is the part of the Internet communications process where these connections occur, by sending packets of data back and forth between different networks.
Learn about privacy
Data privacy refers to one’s ability to determine for oneself when, how, and to what extent one’s personal information is shared with others.
Learn about video streaming
Streaming is the continuous transmission of audio or video files from a server to a client. Learn about all aspects of streaming video, from file formats to live stream encoding and delivery.
Learn about email security
Email security is the practice of preventing email-based cyber attacks, protecting email accounts from takeover, and securing the contents of emails. Learn all about email security: