UDP flood

UDP flood

UDP flood attacks have been used in the past for denial-of-service attacks. Even servers for major organizations have collapsed under the massive amounts of data. We’ll explain how a UDP flood attack works and provide you with an overview of its technical background, proven security measures, and how it is different from other DoS attacks.

HTTP Flood Attacks

What is an HTTP flood attack?

DDoS attacks are occurring more and more frequently. Among the most insidious are HTTP flood attacks. Disguised as regular users on the website, thousands of complex requests are sent to the server until a system failure occurs. Here you will learn what exactly an HTTP flood attack is, how you can identify them, and how you can protect yourself from them.

Ping flood

Ping flood

The ping flood is a type of denial-of-service attack that can affect commercial providers and home users alike. This attack relies on the ICMP protocol and the ping command. In order to unleash a particularly powerful flood, attackers often use a network of bots. Learn how the ping flood works and how you can protect yourself from one.

TAN procedures

iTAN, mTAN, chipTAN? An overview of all TAN procedures

Security in online banking has always been a cornerstone of the industry – TAN procedures like chipTAN are what make it possible. However, there are also many other variants of this two-factor authentication system that can be used to protect your banking transactions. As they say, a chain is only as strong as its weakest link – and in this case, it’s the user. Find out which TAN procedures are...

SYN flood

SYN flood attack: variants and countermeasures

The attack pattern of a SYN flood attack has been known since the early years of the World Wide Web. Over time, new attack variants and appropriate protective measures have arisen. DDoS attacks with massive data flows originating from botnets are currently the norm. Learn how SYN flood attacks work. We will explain the concepts of these attacks and countermeasures.

Ping of death

Ping of death

The ping of death was a cause for alarm in the early days of the Internet: A malicious hacker could cause a remote system to crash with a simple ping command. Keep reading to find out how the attack works on a technical level and why you don’t have to worry about it today.

Shoulder surfing

Shoulder surfing – an underestimated threat?

Malicious hackers gain unauthorized access to sensitive data by identifying weaknesses in security mechanisms and exploiting them. However, technical skills are not always required to be able to steal data. This is the case for shoulder surfing which exploits the greatest weakness of every computer system and security measure – the human being.

What is DevSecOps?

What is DevSecOps and what are its uses?

DevSecOps is the optimal approach for achieving faster software development, without having to make any cutbacks to security. Security packages are directly integrated into the development process. We’ll explain its pros and cons and clarify the various possibilities for using the system.

Turning off the Windows firewall

How to turn off the Windows firewall

Among other things, Windows includes a built-in firewall that protects your device from attacks by hackers and unwanted network traffic. To ensure you can use the Internet safely, you shouldn’t turn off the firewall permanently. However, you may sometimes find you need to temporarily disable it, for example, to install software. Read on to find out how to do this.


Wait! We’ve got something for you!
Have a look at our great prices for different domain extensions.


Enter the web address of your choice in the search bar to check its availability.
.org
$1/1st year
then $20/year
.com
$1/1st year
then $15/year
.info
$1/1st year
then $20/year
.me
$1/1st year
then $20/year