What is spoofing?

What is spoofing?

Spoofing attacks encompass a wide range of potential attack scenarios. Besides conventional approaches like IP spoofing and DNS spoofing, they also include particularly dangerous phishing attacks. Read this article to find out how spoofing attacks work and what measures you can take to protect yourself effectively.

What is a botnet?

Botnets: definition and protection tips

Botnets are tricky to spot, but they’re all over the internet and they cause all kinds of damage every day. They lurk inconspicuously in the background and use millions of private computers for malicious purposes. This guide explains how botnets work, how to keep them away, and how you can avoid falling victim to an illegal network.

What is SELinux?

What is SELinux?

The SELinux security module is built into the Linux kernel and can be activated on a number of Linux operating systems (distributions). By using SELinux, only essential access to the operating system is permitted. This gives administrators more control over running processes. With SELinux, there is far less risk of unsafe user programs endangering the overall system.

What is a one-time password (OTP)?

One-time password (OTP) – more security online

Whenever you go online, you constantly have to use passwords, whether for online banking, online shopping, or logging into a company network. Unfortunately, these passwords aren’t always as secure as they should be. Using a one-time password (OTP) is one way to better protect yourself. In this article, you’ll find out what a one-time password is and why you might want to use one.

What is a backup?

What is a backup and how does it effectively protect your data?

Technical issues, hacker attacks, and malware can lead to costly and serious data loss at any time. To minimize the risks, it is recommended that you perform regular comprehensive backups. It is important to have a suitable backup strategy that properly meets your specific requirements.

UDP flood

UDP flood

UDP flood attacks have been used in the past for denial-of-service attacks. Even servers for major organizations have collapsed under the massive amounts of data. We’ll explain how a UDP flood attack works and provide you with an overview of its technical background, proven security measures, and how it is different from other DoS attacks.

HTTP Flood Attacks

What is an HTTP flood attack?

DDoS attacks are occurring more and more frequently. Among the most insidious are HTTP flood attacks. Disguised as regular users on the website, thousands of complex requests are sent to the server until a system failure occurs. Here you will learn what exactly an HTTP flood attack is, how you can identify them, and how you can protect yourself from them.

Ping flood

Ping flood

The ping flood is a type of denial-of-service attack that can affect commercial providers and home users alike. This attack relies on the ICMP protocol and the ping command. In order to unleash a particularly powerful flood, attackers often use a network of bots. Learn how the ping flood works and how you can protect yourself from one.

TAN procedures

iTAN, mTAN, chipTAN? An overview of all TAN procedures

Security in online banking has always been a cornerstone of the industry – TAN procedures like chipTAN are what make it possible. However, there are also many other variants of this two-factor authentication system that can be used to protect your banking transactions. As they say, a chain is only as strong as its weakest link – and in this case, it’s the user. Find out which TAN procedures are...


Wait! We’ve got something for you!
Have a look at our great prices for different domain extensions.


Enter the web address of your choice in the search bar to check its availability.
.org
$1/1st year
then $20/year
.com
$1/1st year
then $15/year
.info
$1/1st year
then $20/year
.me
$1/1st year
then $20/year