As Apple's default browser, Safari is many users’ app of choice when surfing the World Wide Web on a daily basis. In terms of functionality, the web client is every bit as full-featured as alternative solutions like Firefox: For example, you can even import Safari bookmarks created with other browsers or on other devices. In this tutorial, we’ll show you how.
If you find an interesting website that you want to visit again later, you can simply save it as a bookmark in Apple’s default Safari browser – and do the same with projects that you need to open daily. You can even export Safari bookmarks to transfer them to another device or browser. We’ll explain how it works in this guide.
What do stamps, tickets, and posters have in common in the 21st century? More than you might think: Many companies now use QR codes on printed items for a variety of purposes. They can be used to quickly read data and execute commands. How does a QR code work? Which QR code scanner apps are the best? And what are the disadvantages of using these graphic codes?
For computer systems to be able to communicate with each other and exchange information, they need common ground, just like humans must share a common language. But computers don’t rely on foreign language lessons, and instead only need the appropriate network protocol to successfully communicate. This provides guidelines and structures for the data transfer, and so plays a decisive role in the...
Although the software itself doesn’t contain any functions for monitoring hosts, services, or events, Nagios is one of the most in-demand IT monitoring solutions. This task is left up to Nagios’ plugins, which can be installed in addition to the core files. Check out our digital guide and find out more about these indispensable modules and how to use these for your own Nagios installation.
WordPress is among the most frequently used content management systems for blogs, forums and other online publishing platforms. With one million users its popularity means that it is also a hive for criminal activity with hackers scanning websites for possible weak areas. The only way to prevent hackers from gaining back door access is by taking adequate safety precautions.
A stable network is characterized not only by the appropriate hardware structures, but also by a watertight security concept. In addition to back-up solutions and intelligent fail-safe systems, protection against external access attempts is a must. Intrusion detection systems (IDS) and intrusion protection systems (IPS) are an excellent addition to the classic firewall and are therefore a sensible...
If you want to create a blog or a website, you can choose from numerous help packages such as website construction kits or content management systems. However, these complete packages often prove to be far too extensive for many projects. The website generator, Jekyll, which is closely linked to the developer platform, GitHub, proves that simple web presences can also be created with few functions...
The Berkeley Packet Filter was developed in 1992 to filter, receive, and send data packets securely. The filter forms interfaces with security layers which are tasked with recognizing incoming corrupted data contents, for example. This allows them to be discarded or corrected right away. We explain how the BPF works.
When you set up your e-mail account you will sooner or later be faced with the decision of choosing between IMAP or POP3. Both transfer protocols help you receive your e-mails. But what are the differences between IMAP and POP3? And when is it best to use which protocol?