What is a botnet?
What are Botnets?
  • Security

Botnets are tricky to spot, but they’re all over the internet and they cause all kinds of damage every day. They lurk inconspicuously in the background and use millions of private computers for malicious purposes. This guide explains how botnets work, how to keep them away, and how you can avoid falling victim to an illegal network.

What are Botnets?
Comparison of the best antivirus programs
Which is the best Antivirus software?
  • Security

Antivirus software has sadly become indispensable as new types of threats against your system emerge regularly. Viruses, worms, Trojan horses, and many other types of malware threaten to infect your system and could cause significant damage. To counteract these threats, software makers try to fight off malware attacks with intelligent antivirus programs. Find out which rank top in our antivirus...

Which is the best Antivirus software?
Cryptojacking
What is Cryptojacking?
  • Security

Malware comes in many different forms, but the goal is always the same: making a profit. That of course is the case for illegal mining of cryptocurrencies, a practice known as cryptojacking. In cryptojacking, infected devices are misused to secretly mine cryptocurrencies – often as part of botnets. We explain how you can recognize cryptojacking and how you can protect your devices.

What is Cryptojacking?
Cyberattacks
How to prevent Cyberattacks
  • Security

Cyberattacks threaten individuals, companies, and public authorities alike. Criminals are always coming up with new techniques to cause as much damage as possible. The motives behind their actions vary from greed to political goals. So how can you protect yourself against cyberattacks? Our article tells you everything you need to know.

How to prevent Cyberattacks
Photo backup
How to backup photos
  • Security

There are many ways to back up photos. Which solutions are best for backing up your own pictures? Ever-improving image qualities lead to larger image files, and that’s why cloud-based photo backups are coming more and more into focus. How safe is it to store your photos there and what advantages does the cloud have over conventional data carriers when it comes to image storage?

How to backup photos
Public key encryption
What is Asymmetric encryption?
  • Security

If you want to secure your digital data with the best possible protection, there is no getting around the issue of encryption. For example, asymmetric cryptography plays an essential role in secure data transfer. Here, you will learn how it works, how it is different from traditional symmetric encryption, and where it is used.

What is Asymmetric encryption?
Single point of failure
What is a single point of failure (SPOF)?
  • Security

Single point of failure, or SPOF for short, is a dreaded system malfunction. A SPOF can lead to the failure of an entire system. In complex systems it can take considerable effort to detect the responsible SPOF. Our dedicated article explains the different types of SPOF and how to prevent them. Read on to find out more.

What is a single point of failure (SPOF)?
Redundancy
What is redundancy in computer science?
  • Security

In IT, intentional redundancy protects storage systems and data centers from data loss and system failures. The duplication and repeated design of data sets, supply paths and technical components strengthen the resilience of databases and IT systems. Find out here how redundancy works, when it makes sense, and when it unintentionally becomes a hurdle.

What is redundancy in computer science?
How to use SSH tunnels
How to use SSH tunnels and SSH port forwarding
  • Security

SSH tunnels are used for secure data transfers and for accessing websites that you otherwise wouldn’t have access to via your network. Reverse SSH tunnels make port forwarding possible with private IP addresses. Keep reading our dedicated article to find out what SSH tunnels are, what they’re used for and how to set one up.

How to use SSH tunnels and SSH port forwarding
Security vulnerability: Log4Shell
What is Log4Shell? Causes and effects of the Java vulnerability
  • Security

A shock was felt around the world at the end of 2021 when the Log4Shell vulnerability became known to the public. Attackers were able to completely take over remote systems without much effort. All major companies and many of the most widely used services were affected by it. In our article, we’ll explain why Log4Shell was so disastrous, how the exploits work, and what protective measures are...

What is Log4Shell? Causes and effects of the Java vulnerability