Geo-blocking ban

Geo-blocking ban: what’s behind the new EU regulation

 

Since April 2018, Netflix and Spotify users have been able to use their accounts across borders in the EU. Thanks to the Portability Regulation, geo-blocking technologies used presently will no longer be permitted. With the geo-blocking regulation in December, the ban will also...

 

Perfect out of office message: Examples and templates

How to create the perfect out of office message

 

The out of office message is a crucial part of email communication in the workplace. If you don’t have access to your email, your contacts will want to know when you’ll be back and whether or not you’ll be represented by someone else in your absence. An out of office reply may be...

 

Chrome Updates

What is Chrome 68?

 

Early next month, Chrome 68 will be launched and the new browser will distrust all webpages that do not have HTTPS encryption as “not secure”. This is a big step in the recent trend towards emphasizing user safety on the internet, a not entirely selfless strategy from Google. In...

 

The biggest online marketplaces that you should know

Selling online: the top English-speaking online marketplaces

 

You want to sell online – but where? If you don’t want to be entirely responsible for your own online shop, then you should offer your products on e-commerce platforms. Aside from the giants Amazon and eBay, there are other interesting online marketplaces that are worth checking...

 

The best WhatsApp alternatives

The best WhatsApp alternatives

 

Invitations to dinner parties; updates about work; an away day with the college football team: if you’re not using WhatsApp, you run the risk of missing out on important information. With more than a billion worldwide users to date, the app is more popular than almost any other...

 

Keyloggers: how do they work and how do you protect yourself from them?

Keyloggers are programs or devices that get access to your credentials by recording your keystrokes. Keyloggers hide in operating system software and leak data. Some keylogger hardware is even more sophisticated, since it can document your keyboard behavior or tap directly into the data stream. Learn how keyloggers work and which variants are available in our guide. We also give you tips on how to...

B2G – business-to-government

In the course of setting up a business, there is no way around important authorities such as the tax or trade office. But a relationship to the tax returns office need not just be a purely functional one – sometimes, it is possible to enter into a business relationship with these authorities too. This kind of business relationship between companies and authorities is called B2G...

How to write a briefing that results in the perfect text

If you commission someone to write copy, a copywriter briefing is the most important tool for communicating your ideas and specifications. Good text briefings are clear, precise, and highlight the most important content and key points of the commissioned text in such a way that writers can execute the assignments well. This step-by-step guide lays out which sub-items are essential to writing a...

How to recover unsaved Word documents

If either Word or your PC crashes while working on a Word document, don’t panic! Recovering unsaved Word documents is easy to do; even damaged or deleted files are not always lost. Microsoft has numerous tools built into its popular text program which allow you to retrieve the edited or in-progress file. And if these tools don’t work, Windows and special repair and recovery tools offer plenty of...

What is SSH? The secure shell simply explained

If you want to establish a secure connection to your server via the internet, you will need SSH. Whether sending commands, uploading files, or during remote maintenance, secure shell ensures that criminals cannot gain access to your sensitive data. Effective encryption and correct authentication are essential for this. To help you understand what is behind the SSH protocol, we reveal how it works...

iTAN, mTAN, chipTAN? An overview of all TAN procedures

Security in online banking has always been a cornerstone of the industry – TAN procedures like chipTAN are what make it possible. However, there are also many other variants of this two-factor authentication system that can be used to protect your banking transactions. As they say, a chain is only as strong as its weakest link – and in this case, it’s the user. Find out which TAN procedures are...

Raspberry Pi and Plex: how to turn a single-board computer into a media server

Plex is among the most popular and user-friendly solutions for creating a media server in your home network. In contrast to many other applications, which are often Windows-only, the Plex server is compatible with Linux, Mac, and even single-board computers like the Raspberry Pi. In this Raspberry Pi and Plex tutorial, you will learn what technical requirements must be fulfilled and how...

Blockchain

Blockchains are a rather hot topic right now. Though the term is far less common than Bitcoin itself, its significance in today’s world far exceeds that of the latter. After all, cryptocurrencies are run entirely on blockchain technology, which combines peer-to-peer networks with cryptographic methods and various assumptions of game theory. The result: reliable infrastructures tailored for...

How are websites accessed?

In order to access a web page in a browser, you just have to enter the URL into the address bar in your web browser and the requested website will pop up on your screen. This seems simple enough, but the process that’s taking place in the background is a highly complex one. Learn about what happens when you access a website – from the URL translation to the relevant IP address via data transfer,...

Clearing your RAM: our step-by-step guide

Computers simplify our working life and everyday life in many ways. However, if they do not run as usual, they can become more of a hindrance than a help. The various possible causes of performance problems include excessive memory usage, which plays an important role in managing active processes. One possible solution is to clear the RAM, and thereby increase your RAM.