Graphic file formats: which formats are important?
Graphic file formats: the most important storage formats for images online
  • Web design

Whether you own an online store, run a corporate website, or write a blog, none of your web projects won’t be successful without photos or graphics. Images create visual stimuli that can enhance the content of your text and appeal to your visitors. However, it is crucial not only to find suitable graphical elements - but also to choose the appropriate graphic file format. The format needs to meet...

Graphic file formats: the most important storage formats for images online
Spear phishing
Spear phishing: targeted attacks on your data
  • E-Mail security

Internet users are constantly the target of cyberattacks. Most attacks are easy to fend off, but a new form of scam has proven to be especially dangerous. Spear phishing messages don’t contain absurd claims or bad spelling. These deceitful messages target specific individuals and look frighteningly real. How do these attacks work?

Spear phishing: targeted attacks on your data
snackable content
Snackable content – bite-sized web content
  • Online sales

Snackable content has become an online marketing buzzword. The term refers to content on the web that can be taken in quickly and easily. Examples of snackable content include posts and tweets, pictures or memes, and short videos. Snackable content is designed to suit the average attention span of web surfers, and is usually sensationalist or emotional, designed to pique a reader’s interest...

Snackable content – bite-sized web content
SSL stripping – how to protect your web project
SSL stripping: Basics and protection options
  • Technical matters

Data transmission via SSL/TLS is one of the most effective means to give a web project more security. Even before packets are sent, powerful algorithms ensure the encryption of the information. If third parties capture the data on the transmission path, the true content remains hidden from them. However, it becomes problematic if attackers are active with their tools, even before the encryption...

SSL stripping: Basics and protection options
HPKP: The security feature for SSL/TLS certification
HPKP: What is behind the public-key pinning extension for HTTP
  • Security

SSL/TLS certificates play an increasingly important role in the transmission of sensitive data. They guarantee that data packets reach the desired addressee without any detours. Problems only arise when internet users are deliberately redirected by invalid certificates from dubious certification bodies – a scenario that can be prevented using so-called HTTP public key pinning (HPKP).

HPKP: What is behind the public-key pinning extension for HTTP
Deep Learning
Deep Learning: When the human brain becomes a model
  • Search engine marketing

Deep learning, along with machine learning and artificial intelligence, is one of the main buzzwords in information technology. In discourse, though, the terms often get mixed up. What are the differences? What is the relationship between the methods? We provide you with an overview, show you how deep learning works, and what practical applications are possible.

Deep Learning: When the human brain becomes a model
Creating an IT disaster recovery plan
For when the going gets tough: the IT disaster recovery plan
  • Know-how

For businesses, a reliable IT infrastructure is just as integral to day-to-day operations as competent management, productive employees, and reasonable working conditions. A server outage is able to paralyze an entire company. Adequate preparation can help prevent some of the most common errors from occurring; unforeseen risks, however, will always remain a factor. In order to be on top of your...

For when the going gets tough: the IT disaster recovery plan
Startup folder in Windows 10
How to change startup programs in Windows 10
  • Configuration

Like all modern Microsoft operating systems, Windows 10 has a built-in feature that allows you to automatically run system programs, user-defined programs, service applications and processes. In this tutorial, you’ll learn how the startup folder works in Windows 10 and how to add or remove specific applications.

How to change startup programs in Windows 10
How to calculate time in Excel
How to calculate time in Excel quickly and easily
  • Online sales

You can use the SUM function to quickly add up several values. But if you want to calculate hours in Excel, you first have to adjust the format of the cells. The format has to be correct, otherwise you’ll encounter problems when you add up more than 24 hours. In that case, your total could be missing an entire day. We’ll teach you how to add hours in Excel and avoid common mistakes.

How to calculate time in Excel quickly and easily
Reverse DNS
Reverse DNS (rDNS): Explanation and Function
  • Know-how

Although address management on the internet is highly complex, it is clearly regulated by the Domain Name System. The system ensures that clients and servers can easily communicate with each other. It also allows reverse DNS checks which can find the hostname for any IPv4 or IPv6 address. This article explains how this works, and for what purpose these requests are made.

Reverse DNS (rDNS): Explanation and Function