Data Protection

RAID 1
RAID 1
  • Security

Hardly a storage concept embodies the RAID principle (Redundant Arrays of Independent Disks) as well as RAID 1 in which two or more hard disks are linked to save copies of data for access in case of system failure. Find out more about RAID 1 and why mirroring makes this network so special.

RAID 1
Protect sensitive data with a strong password
How to choose a strong password
  • Security

It only takes a few seconds for a hacker to gain access to your private data without you having any idea. More often than not, a password is the only means of protection when logging into online services; and if it is too obvious, it will not prove too much of a challenge for criminals to crack. There are numerous options to increase password security.

How to choose a strong password
E-mail marketing trends
9 email marketing trends for 2023
  • E-mail marketing

To ensure that your newsletter campaigns continue to be effective in the future, you shouldn’t miss out on these email marketing trends in 2023. There are even more automation possibilities, new design options and stricter data protection. In our article on this year’s newsletter email trends, we explain what you should look for in your future strategies and how you can enhance your email...

9 email marketing trends for 2023
Delete Steam account
Delete your steam account: here’s how
  • Social media

If you no longer want to use Steam for downloads or to play computer games, you may want to delete your Steam account. In that case, it’s recommended to fully remove your data from the database. Unfortunately, this is currently only possible via Steam Support. If you want to delete your account, submit a deletion request. Here’s how this works.

Delete your steam account: here’s how
Using SSH keys for your network connection
How to use SSH keys
  • Security

Operating and managing a remote server located in a data center is often carried out by using a secure network connection provided by the SSH protocol. The necessary registration on the server is preceded by an authentication process. Usually this occurs in the form of the username and password. Alternative methods such as the public key authentication used by SSH, do have their advantages. But...

How to use SSH keys
Password managers: an overview of today’s best tools
Password-Manager | Overview and Comparsion
  • Security

Would you give your bank account pin number to a stranger? Certainly not. However, this is essentially just what you are doing if you don’t secure your online banking log-in with a password that can’t be figured out by hackers in a matter of seconds. In order to be able to create and manage all of your passwords in a completely secure way, it is worth making use of a password manager.

Password-Manager | Overview and Comparsion
Scamming: How to protect yourself against online fraud
How Scamming works and how to protect against it
  • Security

The internet is not new territory for scammers: Scamming encompasses all tricks that criminals use online in chats, via mail, or over social networks, to get unsuspecting people to give them their money. The criminals play their victims through deceitful methods on almost every platform across the internet: They build up a relationship, and eventually, lead their victims to make advance money...

How Scamming works and how to protect against it
How to recognize and remove malware
What is Malware and how to prevent it
  • Security

Practically every PC user fears Trojan horses and computer viruses. Security is paramount if you are managing sensitive data or setting up a server. You need a comprehensive security concept to protect yourself against insidious malware. It’s helpful to know the different types of malicious software that exist, and how to combat and safely remove them.

What is Malware and how to prevent it
RAID 10
What is RAID 10?
  • Security

RAIDs are a good solution for improving the performance of hard drives. The individual standardized levels provide different approaches to boost reliability or the throughput rate of system networks. RAID 10 relies on complete data redundancy. Data is stored in a distributed manner and can be read quickly. Find out what’s behind the RAID level!

What is RAID 10?
OAuth
OAuth (Open Authorization)
  • Security

The “pathway to hell” – this is how Eran Hammer-Lahav once called the security protocol OAuth 2.0, on which he himself had worked for years. Others, however, use the service without issue. It enables users to use data and functions across multiple platforms in multiple services – for example, with the convenient single sign-on – using secure API authorization. But how exactly does OAuth2 work and...

OAuth (Open Authorization)