Data Protection

Introduction to netstat
Introduction to netstat: what is netstat and how does it work?
  • Tools

Various computer networks are connected with one another via the Internet. In order to build up such connections, both the sending as well as the receiving systems have to provide transfer interfaces, or ports. The command line program netstat allows you to find out which ports are opened by your own system and which active connections exist — all of this helps reduce the risk of undesired access...

Introduction to netstat: what is netstat and how does it work?
WeTransfer alternatives
WeTransfer alternatives
  • Tools

Those who have previously worked with WeTransfer, will be all too familiar with its basic principle: users can share large files without logging in or installing software. All you need to enter is the recipient’s email address. This was revolutionary when the platform first launched. However, nowadays numerous WeTransfer alternatives are available.

WeTransfer alternatives
The best PayPal alternative
The best alternatives to PayPal at a glance
  • Online sales

Americans love shopping online because it’s so convenient. Until recently, online payment systems were heavily dominated by one industry heavyweight: PayPal. But not everyone is enthused by this payment method, having been criticized for both security as well as data protection issues. Fortunately, there are plenty of PayPal alternatives out there. We’ll introduce a few here.

The best alternatives to PayPal at a glance
RSA cryptosystems
How do RSA cryptosystems work?
  • Security

RSA encryptions are asymmetric encryptions and are put to use in many areas of digital data transfers because they can be easily used but not easily decrypted with an algorithm. Here, we explore how RSA keys work, what they are used for, and in which fields RSA cryptosystems can also be useful. Read on to find out more.

How do RSA cryptosystems work?
ePrivacy Regulation: About the EU’s privacy policy
ePrivacy Regulation and its shadow! What to expect
  • Digital law

The EU plans to significantly tighten data security online: With the ePrivacy Regulation, the collection of personal data will only be allowed following explicit allowance. At this point, it’s not certain what exactly will be included in the ePrivacy Regulation: Here, we’ve consolidated what we already know. In this way, you can develop strategies now for complying with the regulation’s...

ePrivacy Regulation and its shadow! What to expect
Gain users’ confidence with a privacy policy
Getting a privacy policy for your website
  • Digital law

An important part of a website that many operators underestimate is the privacy policy. This notifies site visitors of the information they are disclosing about themselves and what their data will be used for. But what kind of information should this declaration contain, what has changed since the EU General Data Protection Regulation law, and how does this affect companies in the US?

Getting a privacy policy for your website
Data protection in e-commerce
Data protection in e-commerce
  • Digital law

Data protection and security in the area of e-commerce can be particularly tricky. Users are constantly leaving behind traces online - regardless of whether they are making online orders or simply surfing the web. Consumer data can be of great interest to businesses. It gives them the opportunity to advertise and make offers to potential customers. But which data are you actually allowed to...

Data protection in e-commerce
What is a proxy server?
What is a proxy server?
  • Know-how

A proxy server is a network component that provides an interface between a private network and the internet. A proxy makes it possible to have an influence on the data traffic, to cache packet data, and to conceal the identity of the communication partners by using different IP addresses.

What is a proxy server?
RAID level comparison
RAID level: the most important RAID concepts compared
  • Security

When combining hard disks in a RAID, you can choose between different standard setups called RAID levels. The predefined combinations determine the arrangement of individual hard disks and methods to store data in a RAID network. But what are the approaches of the most important RAID levels? And which one should you use?

RAID level: the most important RAID concepts compared
RAID 6
RAID 6: Storage technology to minimize data loss
  • Security

Combining hard drives to form a RAID is an attractive solution to optimize the performance and security of individual drives. One such approach that’s been hailed for its high safety factor is the RAID 6 technology. As an extension to the popular RAID 5 level, this network protects from data loss when two hard drives fail – all without having to duplicate your data manually.

RAID 6: Storage technology to minimize data loss