Encryption

How to Protect Access to your Cloud
Using cloud services securely
  • Security

In the digital age, we are increasingly resorting to cloud services: At work, people collaborate on projects together in the cloud, and in their free time, they share photos from their last vacation. At the same time, cloud storage is by no means free from security risks. The multi-cloud environments of larger companies, in particular, are becoming a challenge for cloud security. Here, we will...

Using cloud services securely
Comparison of the best antivirus programs
Antivirus software: Which software is best?
  • Security

Antivirus software has sadly become indispensable as new types of threats against your system emerge regularly. Viruses, worms, Trojan horses, and many other types of malware threaten to infect your system and could cause significant damage. To counteract these threats, software makers try to fight off malware attacks with intelligent antivirus programs. Find out which rank top in our antivirus...

Antivirus software: Which software is best?
Server Name Indication
Server Name Indication (SNI): What’s behind the standard?
  • Know-how

What is server name identification, really? Encryption technologies play a big role when it comes to surfing on the net. Credit card data and other personal information must not fall into the hands of criminals. For now, TLS is one of the protocols used for this purpose. But it has a disadvantage: it only functions when each IP address only hosts one domain. If multiple virtual services are...

Server Name Indication (SNI): What’s behind the standard?
Public key encryption
Asymmetric encryption
  • Security

If you want to secure your digital data with the best possible protection, there is no getting around the issue of encryption. For example, asymmetric cryptography plays an essential role in secure data transfer. Here, you will learn how it works, how it is different from traditional symmetric encryption, and where it is used.

Asymmetric encryption
Encryption software
Encryption software: A comparison of encryption tools
  • Security

A good encryption software keeps your data secure. It enables you to easily protect a folder, hide hard drives, or sync encrypted data to a cloud, for example. Find out more information about recommended encryption tools and what they do, and get an overview of their advantages and disadvantages in our dedicated article.

Encryption software: A comparison of encryption tools
Cyberattacks
Cyberattacks: the dangers lurking online
  • Security

Cyberattacks threaten individuals, companies, and public authorities alike. Criminals are always coming up with new techniques to cause as much damage as possible. The motives behind their actions vary from greed to political goals. So how can you protect yourself against cyberattacks? Our article tells you everything you need to know.

Cyberattacks: the dangers lurking online
Encryption methods: An overview
Encryption methods: An overview
  • Security

E-mail, instant messaging, or voice-over IP: If you want to communicate over the internet, you should make sure that the data transfer process can be trusted. The same goes for the World Wide Web. With online banking and digital shopping, money transactions are increasingly being carried out online. Popular encryption methods like DES, AES, or RSA should guarantee the security of passwords, credit...

Encryption methods: An overview
Protecting your email address: how to do it
Protecting your email address: how to prevent spam
  • E-Mail security

Spam robots, so-called harvesters, consistently search the internet for email addresses that can be used for unlawful advertising, phishing emails, and spreading viruses, worms, and Trojans. You’re recommended to have your contact details on your website, but how do you stop them from being misused? This article gives you advice on how to protect your email address.

Protecting your email address: how to prevent spam
Brute force attack: definition and protective measures
Brute force attacks: when passwords are served on a silver platter
  • Security

Being constantly faced with headlines about stolen passwords, it’s understandable that many users are concerned. Your best bet is to make your passwords as complicated as possible and have them consist of many different types of characters. But even this won’t help if it’s the actual log-in area that isn’t secure enough. Even today, attackers are still successful with the notorious and simple...

Brute force attacks: when passwords are served on a silver platter
Raspberry Pi: How to set up an SSH server
Raspberry Pi: activating and using SSH access
  • Configuration

Raspberry Pi has established itself as a reliable basis for servers of various types. Access – for configuration and maintenance purposes – rarely takes place on the mini computer itself, but mostly on a desktop computer in the same network. The communication protocol is the secure SSH (secure shell), which isn’t enabled by default and hasn’t been for some time. How to activate the Raspberry Pi...

Raspberry Pi: activating and using SSH access