How to recognize and remove malware

Malicious software: how to recognize, remove, and prevent malware

 

Practically every PC user fears Trojan horses and computer viruses. Security is paramount if you are managing sensitive data or setting up a server. You need a comprehensive security concept to protect yourself against insidious malware. It’s helpful to know the different types...

 

TLS vs. SSL

TLS vs. SSL: what is the difference?

SSL and TLS are two encryption protocols that are frequently used in email programs and browsers. Have you ever wondered which one you should choose when you are prompted to pick one when configuring an email client, for example? Here, you will learn what the differences between SSL and TLS are and why only one of them is still viable today.

Microsoft Exchange Zero Day Attack

Reaction to Microsoft Exchange zero-day attack

On March 6, Microsoft pointed out vulnerabilities in the Microsoft Exchange software. IONOS had already learned of the vulnerability on March 3 and immediately applied updates provided by Microsoft to all Exchange systems it operated itself in order to eliminate the vulnerabilities. IONOS systems were not affected by the attack wave.

What is IAM (Identity and Access Management)?

IAM – What is Identity and Access Management?

In any system based on user accounts, Identity and Access Management has a role to play. So does every application use IAM? How important are Identity and Access Management systems when it comes to corporate compliance? And what features do these systems offer?

What is credential stuffing?

Credential stuffing: how security leaks become a data sieve

There are billions of stolen logins circulating on the dark web today. Hackers use these combinations of logins and passwords to break into user accounts and steal sensitive data using a technique known as “credential stuffing”. To protect your data, you need to know how credential stuffing works and what countermeasures you can take to protect yourself.

Comparison of the best antivirus programs

Antivirus software: Which software is best?

Antivirus software has sadly become indispensable as new types of threats against your system emerge regularly. Viruses, worms, Trojan horses, and many other types of malware threaten to infect your system and could cause significant damage. To counteract these threats, software makers try to fight off malware attacks with intelligent antivirus programs. Find out which rank top in our antivirus...

Ethical hacking

Ethical hacking – addressing security breaches and preventing cybercrime

Ethical hacking has been booming worldwide for several years. A growing number of companies voluntarily choose to be hacked and commission skilled IT professionals to target them by attacking their own infrastructure. Real stress tests under real conditions are intended to reveal weaknesses in their systems and prevent illegal hack attacks that could have dire consequences. The procedure is also...

Hash function

What is a hash function? Definition, usage, and examples

Hash functions are used in many areas of computer science. They generate hash values that represent digital information in a consistent manner according to defined parameters. They provide additional security (using encryption) during data transmission and allow data to be accessed more quickly. We explain what hash functions are, how they are used and provide some examples.

What is Mandatory Access Control (MAC)?

Mandatory Access Control (MAC): how does it work?

Data protection is very important, especially when it comes to high-security branches like the government and the military. Users in most organizations only have access to the data they need to do their job, and when it comes to highly sensitive data, it’s important to have a system that’s as tamper-proof as possible. That’s where Mandatory Access Control comes in. Keep reading to find out how...

What is role-based access control (RBAC)?

How does role-based access control (RBAC) work?

Organizations restrict access permissions in systems to protect sensitive data from unauthorized access and modification. However, assigning access permissions to users individually is a high-maintenance and error-prone process. In the case of role-based access control (RBAC), permissions are assigned based on previously assigned roles. Here, we explain how role-based access control works.

Hash table

The hash table: fast database access to hash values

A hash table is created using the hash function. This is a method for reducing digital information in such a way that extensive data sets can be retrieved quickly in internet-based databases. This method also makes it possible to implement sophisticated security features using encryption when transferring data.


Buy one .com, get one .us free!
Protect and grow your American-made brand
Celebrate this July with two popular domains for an unbeatable price.