Best Android cloud apps
The 9 best Android cloud apps – securing your smartphone data
  • Tools

As Android smartphone users will know, a complete backup of the operating system can only be created with the internal backup function that leaves a lot to be desired. The solution? Using a cloud storage solution like Google Drive. However, if you don’t feel comfortable handing all your data over to Google, you will have to search for another online Android storage option to back-up your personal...

The 9 best Android cloud apps – securing your smartphone data
Delete Snapchat account
How to delete your Snapchat account
  • Social media

Snapchat’s recipe for success is that images and videos that have been sent are automatically deleted immediately after they have been viewed. However, many people will eventually want to delete their Snapchat account completely. There are several possible reasons for this – the question of data protection could be one. However, this function is not available on the app, you have to go elsewhere...

How to delete your Snapchat account
Deleting a Telegram account
How to delete a Telegram account
  • Social media

Deleting a Telegram account is almost as easy as making one. We explain why people are making the move away from Telegram, how to completely delete your account, and what happens after you’re done. You should be aware that you can’t recover a deleted telegram account. Keep reading for a step-by-step guide including screenshots.

How to delete a Telegram account
YouTube alternatives: an overview of the best portals
The 10 best YouTube alternatives at a glance
  • Social media

YouTube has revolutionized the Internet: since it was founded, it has been inundated with video content and more than two billion users have been recorded. No other alternative has come close to this impressive number. But what are the other video portals are available and what do they have to offer? Here are the 10 best YouTube alternatives at a glance.

The 10 best YouTube alternatives at a glance
How does data backup work for databases?
How to backup databases
  • Security

Backing up your data is a popular option for securing your database. In order to create backup copies, you need additional hardware and to install a suitable backup structure. How do you secure your own network and web server against attacks and proceed to protect your databases?

How to backup databases
DKIM (DomainKeys)
What is a DKIM record and how to create a DKIM record?
  • E-Mail security

Fake emails pose a major threat to recipients. At the same time, it’s becoming increasingly difficult to verify the authenticity of emails and sender addresses. One effective method of verifying the sending mail server and checking the authenticity of emails is called DKIM (DomainKeys Identified Mail). What is DKIM and how do you set it up?

What is a DKIM record and how to create a DKIM record?
Hash table
Hash table | Fast database access to hash values
  • Security

A hash table is created using the hash function. This is a method for reducing digital information in such a way that extensive data sets can be retrieved quickly in internet-based databases. This method also makes it possible to implement sophisticated security features using encryption when transferring data.

Hash table | Fast database access to hash values
BGP (Border Gateway Protocol)
What is BGP (Border Gateway Protocol)? Definition and use
  • Know-how

The BGP protocol, or Border Gateway Protocol, is a global routing protocol for connecting autonomous systems and networks. BGP routing is used to manage packet forwarding, exchange router information, and stabilize networks even in the event of router failures. Read on to find out what BGP is all about and how it’s used.

What is BGP (Border Gateway Protocol)? Definition and use
Encryption software
Encryption software and tools in comparison
  • Security

A good encryption software keeps your data secure. It enables you to easily protect a folder, hide hard drives, or sync encrypted data to a cloud, for example. Find out more information about recommended encryption tools and what they do, and get an overview of their advantages and disadvantages in our dedicated article.

Encryption software and tools in comparison
DRaaS
Disaster Recovery as a Service (DRaaS)
  • Security

Throughout the course of digitization, employees and employers became aware of the importance of backups. The 3-2-1 rule was considered the golden rule - where two redundant copies of each file are kept. As technology continues to evolve, cloud-based solutions are becoming more popular. Thus, Disaster Recovery as a Service has established itself as an important cloud service.

Disaster Recovery as a Service (DRaaS)