Data Protection

What is a proxy server?

What is a proxy server?

A proxy server is a network component that provides an interface between a private network and the internet. A proxy makes it possible to have an influence on the data traffic, to cache packet data, and to conceal the identity of the communication partners by using different IP addresses.

How to recognize and remove malware

Malicious software: how to recognize, remove, and prevent malware

Practically every PC user fears Trojan horses and computer viruses. Security is paramount if you are managing sensitive data or setting up a server. You need a comprehensive security concept to protect yourself against insidious malware. It’s helpful to know the different types of malicious software that exist, and how to combat and safely remove them.

What is a backup?

What is a backup and how does it effectively protect your data?

Technical issues, hacker attacks, and malware can lead to costly and serious data loss at any time. To minimize the risks, it is recommended that you perform regular comprehensive backups. It is important to have a suitable backup strategy that properly meets your specific requirements.

ModSecurity Apache Module on a Cloud Server with Ubuntu

Use the ModSecurity Apache Module on a Cloud Server with Ubuntu 16.04

ModSecurity is a free web application firewall (WAF) which is a simple, powerful way to protect a server against web-based malware and hacking attempts. Learn how to install ModSecurity and the officially-recommended OWASP Core Rule Set (CRS) which will protect a server against malware and hacking in the form of SQL injection, session hijacking, cross-site scripting, Trojans, and many other forms...

Password Protect a Directory with Apache

Password Protect a Directory with Apache

Learn how to password protect a directory using Apache's basic HTTP authentication. This method will allow you to set up a restricted area of your website which will require a username and password for access.

MongoDB: Sharding vs Replication

MongoDB: Sharding vs Replication

In this set of scenarios we will explore the difference between MongoDB sharding and replication, and explain when each is the most appropriate solution. Both replication and sharding are forms of horizontal scaling to create a high availability (HA) setup.

PrestaShop – the modular system for e-commerce

PrestaShop: the shop platform with HQ in Europe and Miami

The search for the perfect software to meet your requirements of design and functionality for e-commerce can be a long and tedious affair. Some platforms just don’t quite give you the design you’re after, while others might look great but lack important shop functions like flexible payment methods, legal certainty, or optimization for mobile devices. PrestaShop was developed especially for...

Alternatives to Google

Google alternatives at a glance

Numerous companies and nonprofit organizations offer web search services beyond the Google algorithm. The competition is usually stuck with an outsider status when it comes to their alternatives to Google but they also present interesting approaches and innovative business models that don’t necessarily rely on the advertising industry. The trend toward anonymous web searches is also starting to...

Microsoft Exchange Zero Day Attack

Reaction to Microsoft Exchange zero-day attack

On March 6, Microsoft pointed out vulnerabilities in the Microsoft Exchange software. IONOS had already learned of the vulnerability on March 3 and immediately applied updates provided by Microsoft to all Exchange systems it operated itself in order to eliminate the vulnerabilities. IONOS systems were not affected by the attack wave.


Wait! We’ve got something for you!
Have a look at our great prices for different domain extensions.


Enter the web address of your choice in the search bar to check its availability.
.org
$1/1st year
then $20/year
.com
$1/1st year
then $15/year
.info
$1/1st year
then $20/year
.me
$1/1st year
then $20/year