En­cryp­tion

Image: How to encrypt and sign your emails with S/MIMEVictor MoussaShut­ter­stock

How to encrypt and sign your emails with S/MIME

Sending an email without extra security is akin to sending a postcard: If every­thing goes as expected, the message arrives intact and unread by anyone else. But if the postcard or email is in­ter­cept­ed during transit, the content can be read or altered freely. Discover how the…

Read more
Image: How to use two-factor authentication to protect your accountji­jo­math­aidesign­ersshut­ter­stock

How to use two-factor au­then­ti­ca­tion to protect your account

With two-factor au­then­ti­ca­tion, accounts can be ef­fec­tive­ly protected against hacking or phishing attacks. Since more than just a password is needed for login, internet criminals can’t do much with in­ter­cept­ed login details. In our guide, we explain how two-factor au­then­ti­ca­tion…

Read more
Image: What is utf-8 and why is it important for global digital communication?ASAG StudioShut­ter­stock

What is utf-8 and why is it important for global digital com­mu­ni­ca­tion?

UTF-8 is a character encoding under Unicode that aims to encompass all modern languages for data pro­cess­ing. What exactly does “UTF-8” mean? And what is special about UTF-8 in the Unicode character set? Here you’ll learn about the structure of the coding and which bytes are…

Read more
Image: Which is the best anti-virus software? A comparisonnobeast­sofierceShut­ter­stock

Which is the best anti-virus software? A com­par­i­son

Antivirus software has sadly become in­dis­pens­able as new types of threats against your system continue to emerge. Viruses, worms, Trojan horses, and many other types of malware threaten to infect your system and could cause sig­nif­i­cant damage. To coun­ter­act these threats,…

Read more
Image: What are cyberattacks and how to prevent themBits And Splitsshut­ter­stock

What are cy­ber­at­tacks and how to prevent them

Cy­ber­at­tacks pose a threat to in­di­vid­u­als, busi­ness­es, and gov­ern­ment agencies alike. Criminals are con­stant­ly coming up with new tech­niques to cause as much damage as possible. Their motives vary widely—from pure greed to the pursuit of political goals. But how can you protect…

Read more
Image: What is port scanning?SP-PhotoShut­ter­stock

What is port scanning?

It’s easy to lose track of all the different programs that are re­spon­si­ble for inbound and outbound data traffic. Networks hosting a large number of computer systems that are con­stant­ly com­mu­ni­cat­ing with online services often require technical backup. High-per­for­mance tools…

Read more
Image: What is a penetration test (pen test)?agsandrewshut­ter­stock

What is a pen­e­tra­tion test (pen test)?

The more complex a network is, the more vul­ner­a­ble it is to attacks. In times when customers and partners have access to internal network struc­tures via the internet, and can control various ap­pli­ca­tions via web in­ter­faces, IT employees are en­coun­ter­ing more and more problems.…

Read more
Image: WLAN security: the best protection for your networkwk1003mikeShut­ter­stock

WLAN security: the best pro­tec­tion for your network

When you’re traveling with portable devices, you’ll find public WLAN every­where, giving you access to the world wide web. Even in res­i­den­tial and work spaces, practical wireless net­work­ing is wide­spread. It’s easy to forget that there’s a risk involved when trans­fer­ring data…

Read more
Image: How to protect your email address on your website from spamal­phaspir­it.itShut­ter­stock

How to protect your email address on your website from spam

Spam robots, so-called har­vesters, con­sis­tent­ly search the internet for email addresses that can be used for unlawful ad­ver­tis­ing, phishing emails, and spreading viruses, worms, and Trojans. You’re rec­om­mend­ed to have your contact details on your website, but how do you stop them…

Read more
Image: How to recognize and remove malwareAndrey_PopovShut­ter­stock

How to recognize and remove malware

Prac­ti­cal­ly every PC user fears Trojan horses and computer viruses. Security is paramount if you are managing sensitive data or setting up a server. You need a com­pre­hen­sive security concept to protect yourself against insidious malware. It’s helpful to know the different types…

Read more