Encryption software

Encryption software: A comparison of encryption tools

A good encryption software keeps your data secure. It enables you to easily protect a folder, hide hard drives, or sync encrypted data to a cloud, for example. Find out more information about recommended encryption tools and what they do, and get an overview of their advantages and disadvantages in our dedicated article.

Cryptojacking

Cryptojacking: How to detect and protect against infection

Malware comes in many different forms, but the goal is always the same: making a profit. That of course is the case for illegal mining of cryptocurrencies, a practice known as cryptojacking. In cryptojacking, infected devices are misused to secretly mine cryptocurrencies – often as part of botnets. We explain how you can recognize cryptojacking and how you can protect your devices.

Scareware

What is scareware and how can you protect yourself against it?

Scammers use scareware to trick users out of their money or to get them to install more malware. Fortunately, there are effective ways to protect yourself against scareware, as well as signs that can help you identify threats before you fall victim. Our article has everything you need to know about scareware so let’s get started.

Anonymous

Anonymous: what is the hacker collective?

Supposedly fun mass attacks on people who were easy targets used to be organized on image boards like 4chan. These are the beginnings of Anonymous, but they don’t have much in common with the collective’s actions today. Political commitment is the group’s main aim nowadays. Anonymous are known for wearing the Guy Fawkes mask. But beware, it’s not always Anonymous behind every mass attack.

Cyberattacks

Cyberattacks: the dangers lurking online

Cyberattacks threaten individuals, companies, and public authorities alike. Criminals are always coming up with new techniques to cause as much damage as possible. The motives behind their actions vary from greed to political goals. So how can you protect yourself against cyberattacks? Our article tells you everything you need to know.

Manage passwords in Chrome

Manage passwords in Google Chrome – here’s how

A forgotten password quickly becomes a problem if it is not written down anywhere. Google does offer ways to recover forgotten passwords. However, it is better not to let it happen in the first place. The solution: Use the integrated password manager to manage passwords in Chrome or use an alternative password manager app.

RSA cryptosystems

How do RSA cryptosystems work?

RSA encryptions are asymmetric encryptions and are put to use in many areas of digital data transfers because they can be easily used but not easily decrypted with an algorithm. Here, we explore how RSA keys work, what they are used for, and in which fields RSA cryptosystems can also be useful. Read on to find out more.

Checking open ports

Port tests: Checking open ports with a port check

Ports are the doors through which operating systems and software communicate with the Internet. Data can be transmitted in both directions via open ports and assigned to specific target addresses and local applications. At the same time, open ports can create a vulnerability and a point of entry for malware and hackers. As such, regularly checking for open ports is recommended. Learn how to check...

ISO 27001

ISO 27001: Standardizing Information Security in Companies

By complying with the ISO 27001 standard, companies can prove they carefully handle information and plan for exceptional circumstances. Public certificates and standards according to the ISO certification create trust among consumers and attest to the company’s secure and tested treatment of data. The certification is performed by an independent institute.

VPN Windows 10

VPN in Windows 10: how to set up VPN

Want to use a secure, encrypted connection or access your company or home network while on the road? A VPN connection on Windows 10 is the solution. VPN connections route your encrypted data through a secure tunnel and provide improved data security. Learn all you need to know for setting up a VPN in Windows 10.


Wait! We’ve got something for you!
Have a look at our great prices for different domain extensions.


Enter the web address of your choice in the search bar to check its availability.
.org
$1/1st year
then $20/year
.com
$1/1st year
then $15/year
.info
$1/1st year
then $20/year
.me
$1/1st year
then $20/year