Redundancy
What is redundancy in computer science?
  • Security

In IT, intentional redundancy protects storage systems and data centers from data loss and system failures. The duplication and repeated design of data sets, supply paths and technical components strengthen the resilience of databases and IT systems. Find out here how redundancy works, when it makes sense, and when it unintentionally becomes a hurdle.

What is redundancy in computer science?
How to use SSH tunnels
How to use SSH tunnels and SSH port forwarding
  • Security

SSH tunnels are used for secure data transfers and for accessing websites that you otherwise wouldn’t have access to via your network. Reverse SSH tunnels make port forwarding possible with private IP addresses. Keep reading our dedicated article to find out what SSH tunnels are, what they’re used for and how to set one up.

How to use SSH tunnels and SSH port forwarding
Security vulnerability: Log4Shell
What is Log4Shell? Causes and effects of the Java vulnerability
  • Security

A shock was felt around the world at the end of 2021 when the Log4Shell vulnerability became known to the public. Attackers were able to completely take over remote systems without much effort. All major companies and many of the most widely used services were affected by it. In our article, we’ll explain why Log4Shell was so disastrous, how the exploits work, and what protective measures are...

What is Log4Shell? Causes and effects of the Java vulnerability
How to Protect Access to your Cloud
Using cloud services securely
  • Security

In the digital age, we are increasingly resorting to cloud services: At work, people collaborate on projects together in the cloud, and in their free time, they share photos from their last vacation. At the same time, cloud storage is by no means free from security risks. The multi-cloud environments of larger companies, in particular, are becoming a challenge for cloud security. Here, we will...

Using cloud services securely
Backing up data
Backing up data: methods and storage media
  • Security

Whether important documents or holiday photos: regular data backups on your PC or smartphone should be part of your digital routine. A regular back up of data is crucial for all companies, especially since more and more processes are being digitalized. Find out what’s important when backing up data, how to perform a data back up, and what the pros and cons of various storage media are.

Backing up data: methods and storage media
Photo backup
What are the options for a photo backup?
  • Security

There are many ways to back up photos. Which solutions are best for backing up your own pictures? Ever-improving image qualities lead to larger image files, and that’s why cloud-based photo backups are coming more and more into focus. How safe is it to store your photos there and what advantages does the cloud have over conventional data carriers when it comes to image storage?

What are the options for a photo backup?
PostgreSQL backup
PostgreSQL backup with pg_dump and pg_restore
  • Security

Creating database backups is one of the standard tasks of web and system admins. Each database management system comes with its own tools for creating backups. PostgreSQL has the command line programs pg_dump and pg_restore. The command line interface psql is also used. We’ll present you with the most common backup scenarios with examples of the required code.

PostgreSQL backup with pg_dump and pg_restore
MySQL backup
MySQL backup with MySQL dump
  • Security

You might already know this warning message if you work with WordPress or similar CMS; “Create a backup of the database before updating”. The mysqldump tool is often used to create the backup. But what does MySQL dump mean? We’ll explain what is meant by this term and show you how to create a database backup with the mysqldump tool.

MySQL backup with MySQL dump
Comparison of the best antivirus programs
Antivirus software: Which software is best?
  • Security

Antivirus software has sadly become indispensable as new types of threats against your system emerge regularly. Viruses, worms, Trojan horses, and many other types of malware threaten to infect your system and could cause significant damage. To counteract these threats, software makers try to fight off malware attacks with intelligent antivirus programs. Find out which rank top in our antivirus...

Antivirus software: Which software is best?
Protect sensitive data with a strong password
Optimal password protection: how to choose a strong password
  • Security

It only takes a few seconds for a hacker to gain access to your private data without you having any idea. More often than not, a password is the only means of protection when logging into online services; and if it is too obvious, it will not prove too much of a challenge for criminals to crack. There are numerous options to increase password security.

Optimal password protection: how to choose a strong password