Encryption

What is port scanning?SP-PhotoShutterstock

What is port scanning?

  • Know-how

It’s easy to lose track of all the different programs that are responsible for inbound and outbound data traffic.

Networks hosting a large number of computer systems that are constantly communicating with online services often require technical backup. High-performance tools check the activities of various applications or computers and can close existing security gaps. Using port scanners is one…

What is port scanning?
What is a penetration test (pen test)?

What is a penetration test (pen test)?

  • Know-how

The more complex a network is, the more vulnerable it is to attacks. In times when customers and partners have access to internal network structures via the internet, and can control various applications via web interfaces, IT employees are encountering more and more problems. Large companies, in particular, prefer to use penetration testing to check how well their security concept works. This…

What is a penetration test (pen test)?
WLAN security: the best protection for your networkwk1003mikeShutterstock

WLAN security: the best protection for your network

  • Security

When you’re traveling with portable devices, you’ll find public WLAN everywhere, giving you access to the world wide web. Even in residential and work spaces, practical wireless networking is widespread. It’s easy to forget that there’s a risk involved when transferring data using one of these access points. In the following article, we explain the biggest security risks and show you how to make…

WLAN security: the best protection for your network
How to protect your email address on your website from spam

How to protect your email address on your website from spam

  • E-Mail security

Spam robots, so-called harvesters, consistently search the internet for email addresses that can be used for unlawful advertising, phishing emails, and spreading viruses, worms, and Trojans. You’re recommended to have your contact details on your website, but how do you stop them from being misused? This article gives you advice on how to protect your email address.

How to protect your email address on your website from spam
How to recognize and remove malware

How to recognize and remove malware

  • Security

Practically every PC user fears Trojan horses and computer viruses. Security is paramount if you are managing sensitive data or setting up a server. You need a comprehensive security concept to protect yourself against insidious malware. It’s helpful to know the different types of malicious software that exist, and how to combat and safely remove them.

How to recognize and remove malware
What is cloud security? Risks and best practices

What is cloud security? Risks and best practices

  • Security

In today’s world, we increasingly rely on cloud services. At the same time, cloud storage is by no means free from security risks. The multicloud environments of larger companies, in particular, pose a challenge for cloud security. Here, we’ll discuss the biggest security risks as well as best practices for using cloud services safely.

What is cloud security? Risks and best practices
HSTS

HSTS

  • Web development

HTTPS, the network protocol for TLS-encrypted data transfer online can be circumvented in some cases. The danger is that encrypted websites can be accessed via unencrypted HTTP. But the HTTPS extension HSTS (HTTP Strict Transport Security) forces website access via TLS encryption, closing the security gaps that hackers like to use to intercept the HTTPS connection during transport using…

HSTS
How to find the best Hosting Provider

How to find the best Hosting Provider

  • Technical matters

If you want to release a new web project today, you need to find the right host. Hosts have become a popular alternative for large companies, since they enable convenient outsourcing of certain work areas or data, saving company resources. But how do you know which host and which hosting package best meets your needs? And why is the provider’s security concept such a crucial criterion nowadays?

How to find the best Hosting Provider
Terminal servers: definition, basics, and advantagesDrHitchShutterstock

Terminal servers: definition, basics, and advantages

  • Know-how

In the days of mainframe computers and the first smaller networks, terminals were a crucial building block for sharing hardware and software resources. It is no coincidence that terminal servers – the central administrative entity of such networks – are in demand decades later, now that applications are to be made available to multiple users.

Terminal servers: definition, basics, and advantages
ERR_SSL_PROTOCOL_ERROR: how to fix the Chrome bugiunewindShutterstock

ERR_SSL_PROTOCOL_ERROR: how to fix the Chrome bug

  • Technical matters

Chrome is the world’s most widely-used internet browser. The application scores points not only when it comes to security and speed, but also with its features such as cross-device synchronization of user data. But errors can occur even when surfing with Google’s wonder weapon. These can lead to the browser crashing or prevent certain pages from being accessed. The error message…

ERR_SSL_PROTOCOL_ERROR: how to fix the Chrome bug
We use cookies on our website to provide you with the best possible user experience. By continuing to use our website or services, you agree to their use. More Information.