Data Protection

How to recognize and remove malware
What is Malware and how to prevent it
  • Security

Practically every PC user fears Trojan horses and computer viruses. Security is paramount if you are managing sensitive data or setting up a server. You need a comprehensive security concept to protect yourself against insidious malware. It’s helpful to know the different types of malicious software that exist, and how to combat and safely remove them.

What is Malware and how to prevent it
Terminal Servers – the Secret Behind Remote Hosts
Terminal servers: definition, basics, and advantages
  • Know-how

In the days of mainframe computers and the first smaller networks, terminals were a crucial building block for sharing hardware and software resources. It is no coincidence that terminal servers – the central administrative entity of such networks – are in demand decades later, now that applications are to be made available to multiple users.

Terminal servers: definition, basics, and advantages
What is a network attached storage (NAS)?
Network attached storage (NAS)
  • Know-how

Growing sums of data require cost-effective, high-performance storage solutions. One option for fulfilling this requirement is a network attached storage. In business contexts, this model has already established itself as a viable alternative to file servers, hard drives, and the cloud. Private users have also caught on and use NAS systems at home. But what is a NAS? Read on, and we’ll show you...

Network attached storage (NAS)
Tips for legal certainty for your online store
How to make your online store legally watertight
  • Online sales

In recent years, many online stores found themselves receiving warnings due to not properly adhering to website legalities. Given the growing number of online businesses, it’s not surprising that companies are now springing up, which specialize in identifying legal violations and then fining the operator. Therefore, it’s all the more important to understand the legal basics of your web store to...

How to make your online store legally watertight
Introduction to netstat
Introduction to netstat: what is netstat and how does it work?
  • Tools

Various computer networks are connected with one another via the Internet. In order to build up such connections, both the sending as well as the receiving systems have to provide transfer interfaces, or ports. The command line program netstat allows you to find out which ports are opened by your own system and which active connections exist — all of this helps reduce the risk of undesired access...

Introduction to netstat: what is netstat and how does it work?
What is a proxy server?
What is a proxy server?
  • Know-how

A proxy server is a network component that provides an interface between a private network and the internet. A proxy makes it possible to have an influence on the data traffic, to cache packet data, and to conceal the identity of the communication partners by using different IP addresses.

What is a proxy server?
Server Name Indication
What is the Server Name Indication (SNI)?
  • Know-how

What is server name identification, really? Encryption technologies play a big role when it comes to surfing on the net. Credit card data and other personal information must not fall into the hands of criminals. For now, TLS is one of the protocols used for this purpose. But it has a disadvantage: it only functions when each IP address only hosts one domain. If multiple virtual services are...

What is the Server Name Indication (SNI)?
E-mail marketing trends
Email marketing trends 2023: 9 ideas for the new year
  • E-mail marketing

To ensure that your newsletter campaigns continue to be effective in the future, you shouldn’t miss out on these email marketing trends in 2023. There are even more automation possibilities, new design options and stricter data protection. In our article on this year’s newsletter email trends, we explain what you should look for in your future strategies and how you can enhance your email...

Email marketing trends 2023: 9 ideas for the new year
Deleting a Google result and protecting personal data
Deleting personal data with Google
  • Digital law

The internet never forgets – is it always true? In some cases, search engines are obliged to grant users permission to delete defamatory search results. If Google displays personal data that is outdated or of no interest to the public, users can request the search engine to delete links to that data from the results pages permanently. But what exactly is the ‘Right to be Forgotten’ act, and when...

Deleting personal data with Google
Alternatives to Google
What is the best Google alternative?
  • Search engine marketing

Numerous companies and non-profit organizations offer web searches using very different algorithms to Google’s. The competition may not be that popular with their Google alternatives, but they do offer innovative approaches and business models that don’t rely on advertising to exist. Decide which Google alternative is right for you.

What is the best Google alternative?