For server operators, security is of the utmost importance. Only those who have developed and set up a foolproof defense strategy are ready for drastic situations. As well as regular protection mechanisms, like security software, backups, and encryption, there are also some useful tools and frameworks that may come in handy in the fight against intruders. We have laid out essential details on the...How to Setup Fail2Ban
DDoS attacks are occurring more and more frequently. Among the most insidious are HTTP flood attacks. Disguised as regular users on the website, thousands of complex requests are sent to the server until a system failure occurs. Here you will learn what exactly an HTTP flood attack is, how you can identify them, and how you can protect yourself from them.What is an HTTP flood attack?
Data leaks and hacker attacks mean that internet security is becoming increasingly important for users. Standard passwords based on names and dates of birth can be cracked in seconds and give criminals access to all kinds of accounts. In combination with multi-factor authentication, TOTP can provide a solution: a password which is only valid for a short time. How does this work?What is TOTP? (Time-based one-time password)
In any system based on user accounts, Identity and Access Management has a role to play. So does every application use IAM? How important are Identity and Access Management systems when it comes to corporate compliance? And what features do these systems offer?What is IAM? (Identity and Access Management)
A Redundant Array of Independent Disks (RAID) can be used to improve data security or the performance of storage solutions. The specific advantages of a network depend on the selected RAID level. Find out how RAID 5 – a system of three or more hard drives – can improve security and throughput rate.What is RAID 5?
A Redundant Array of Independent Disks, or RAID for short, is a combination of several hard disks to form a single logical drive. Systems like these typically follows a redundant storage concept for higher security. The standard RAID 0 is an exception because it only seeks to optimize the data throughput by coupling several hard drives.What is RAID 0?
There are daily reports on how security gaps in applications are exploited – because hardly a day goes by without a new gap being discovered or a known gap being closed. One attack method, which has always been based on exploiting such weak points, is called SQL injection. But what is actually hidden behind the malicious database exploitation and how can you protect your database system from it?SQL Injection
The risk for businesses to fall victim to a zero-day exploit has increased in recent years. More and more often, cybercriminals can take advantage of as-yet undiscovered weak points in business software in order to steal or manipulate data. It is difficult to protect against these attacks, but businesses can take some measures to improve their security.What is a Zero-day exploit?
A forgotten password quickly becomes a problem if it is not written down anywhere. Google does offer ways to recover forgotten passwords. However, it is better not to let it happen in the first place. The solution: Use the integrated password manager to manage passwords in Chrome or use an alternative password manager app.How to manage Passwords in Google Chrome
The attack pattern of a SYN flood attack has been known since the early years of the World Wide Web. Over time, new attack variants and appropriate protective measures have arisen. DDoS attacks with massive data flows originating from botnets are currently the norm. Learn how SYN flood attacks work. We will explain the concepts of these attacks and countermeasures.SYN flood attack