Data Protection

What is the EU-US Privacy-Shield?

Privacy Shield – controversial data transfer agreement between the EU and the US

For some years, the Privacy Shield has regulated the transfer of personal data from the EU to the US. But in July 2020, the Court of Justice for the European Union (CJEU) invalidated the Privacy Shield. For many companies, the end of the privacy agreement came as a complete surprise. What were the contents of the EU-US Privacy Shield, what made it fail, and what do SMEs have to take into account...

What is a session ID?

What is a session ID?

When a website is visited, the server generates a session ID and assigns it to the user. This session ID is temporarily created by the server and assigned to the user for a during their active session to identify the user and their data exchanges throughout the session.

E-mail account hacked: what now?

E-mail account hacked: what now?

E-Mail accounts are one of our most important communication tools: we use them to register for online portals, for private and business exchanges, and as an organizer and digital address book. It is therefore all the more important to make sure your account is well-protected. But what if your e-mail account does get hacked? Our guide explains what methods internet criminals use to gain access to...

What is Big Data?

Big Data: definition and examples

When we shop online, book vacations, and search for gift ideas, we hardly give a second thought to the fact that each search entry leaves behind a trail of our identity. Busy web bots are never far behind and sweep up this information. The result of all of this is Big Data: massive volumes of data that are analyzed and used for a variety of reasons. But is there reason to be wary of leaving behind...

Image copyright online

The most important facts on image copyright online

Just because a photograph or artwork is available to view on the internet, doesn’t mean that you can use it for your own purposes. The creator’s consent and payment for royalties are often required. The rules don’t solely apply to sharing images that don’t belong to you; even if you use your own, you have to stick to certain guidelines.

Clearing the Cache

Clearing the cache: deleting the browser’s cache

Information is often cached so that visited website can be loaded quickly and videos and gifs can be viewed offline. However, if the cache contains a large, or very large amount of data, it can cause problems and adversely affect computer performance. Therefore, it makes sense to delete the cache from time to time.

The best Google Analytics alternatives

The best Google Analytics alternatives

Website tracking is very important in online marketing to be able to see how users are interacting on your site. The first choice is normally the tracking tool offered by the search engine, Google. But for data protection reasons, more and more users are looking for alternatives to Google Analytics. We will examine applications with similar features to those offered by Google Analytics.

What is a botnet?

Botnets: definition and protection tips

Botnets are tricky to spot, but they’re all over the internet and they cause all kinds of damage every day. They lurk inconspicuously in the background and use millions of private computers for malicious purposes. This guide explains how botnets work, how to keep them away, and how you can avoid falling victim to an illegal network.

clear cookies

Deleting cookies: how to clear stored data

Some cookies can be very helpful – they let you sleep on those impulse purchases and keep them from disappearing out of your shopping cart, or log into social media sites with just one click. But not all cookies make surfing the web easier, and some may even forward unwanted information to third parties. It is a good idea to learn how to clear cookies, and this guide will show you how to clear...

Scamming: How to protect yourself against online fraud

Scamming: What is behind the fraud?

The internet is not new territory for scammers: Scamming encompasses all tricks that criminals use online in chats, via mail, or over social networks, to get unsuspecting people to give them their money. The criminals play their victims through deceitful methods on almost every platform across the internet: They build up a relationship, and eventually, lead their victims to make advance money...


Wait! We’ve got something for you!
Have a look at our great prices for different domain extensions.


Enter the web address of your choice in the search bar to check its availability.
.org
$1/1st year
then $20/year
.com
$1/1st year
then $15/year
.info
$1/1st year
then $20/year
.me
$1/1st year
then $20/year