Encryption

How to find a suitable Hosting Provider

How to find a suitable Hosting Provider

  • Technical matters

If you want to release a new web project today, you need to find the right host. Hosts have become a popular alternative for large companies, since they enable convenient outsourcing of certain work areas or data, saving company resources. But how do you know which host and which hosting package best meets your needs? And why is the provider’s security concept such a crucial criterion nowadays?

How to find a suitable Hosting Provider
What is Malware and how to prevent it

What is Malware and how to prevent it

  • Security

Practically every PC user fears Trojan horses and computer viruses. Security is paramount if you are managing sensitive data or setting up a server. You need a comprehensive security concept to protect yourself against insidious malware. It’s helpful to know the different types of malicious software that exist, and how to combat and safely remove them.

What is Malware and how to prevent it
Terminal servers: definition, basics, and advantages

Terminal servers: definition, basics, and advantages

  • Know-how

In the days of mainframe computers and the first smaller networks, terminals were a crucial building block for sharing hardware and software resources. It is no coincidence that terminal servers – the central administrative entity of such networks – are in demand decades later, now that applications are to be made available to multiple users.

Terminal servers: definition, basics, and advantages
How to use cloud services securely

How to use cloud services securely

  • Security

In the digital age, we are increasingly resorting to cloud services: At work, people collaborate on projects together in the cloud, and in their free time, they share photos from their last vacation. At the same time, cloud storage is by no means free from security risks. The multi-cloud environments of larger companies, in particular, are becoming a challenge for cloud security. Here, we will…

How to use cloud services securely
ERR_SSL_PROTOCOL_ERROR: how to fix the Chrome bug

ERR_SSL_PROTOCOL_ERROR: how to fix the Chrome bug

  • Technical matters

Chrome is the world’s most widely-used internet browser. The application scores points not only when it comes to security and speed, but also with its features such as cross-device synchronization of user data. But errors can occur even when surfing with Google’s wonder weapon. These can lead to the browser crashing or prevent certain pages from being accessed. The error message…

ERR_SSL_PROTOCOL_ERROR: how to fix the Chrome bug
QUIC: What is behind the experimental Google Protocol?

QUIC: What is behind the experimental Google Protocol?

  • Technical matters

Quick UDP Internet Connections (QUIC for short), is an experimental network protocol from Google. Further development of the protocol is being driven by IETF, which has set up a dedicated group working towards it. The QUIC protocol is intended to offer a speed-optimized alternative to the current transport standard TCP and builds on the connectionless protocol UDP to achieve this.

QUIC: What is behind the experimental Google Protocol?
VPN (Virtual Private Network)

VPN (Virtual Private Network)

  • Know-how

VPN implementations offer an affordable alternative for locally connecting networks, as well as making network resources available for external devices. In contrast to corporate networks, no private communication network is required. Instead, like the internet, VPNs rely on networks, and protect sensitive data through a process known as tunneling.

VPN (Virtual Private Network)
What is the Server Name Indication (SNI)?

What is the Server Name Indication (SNI)?

  • Know-how

What is server name identification, really? Encryption technologies play a big role when it comes to surfing on the net. Credit card data and other personal information must not fall into the hands of criminals. For now, TLS is one of the protocols used for this purpose. But it has a disadvantage: it only functions when each IP address only hosts one domain. If multiple virtual services are…

What is the Server Name Indication (SNI)?
Port Scanning

Port Scanning

  • Know-how

It’s easy to lose track of all the different programs that are responsible for inbound and outbound data traffic.

Networks hosting a large number of computer systems that are constantly communicating with online services often require technical backup. High-performance tools check the activities of various applications or computers and can close existing security gaps. Using port scanners is one…

Port Scanning
How to do a Penetration test

How to do a Penetration test

  • Know-how

The more complex a network is, the more vulnerable it is to attacks. In times when customers and partners have access to internal network structures via the internet, and can control various applications via web interfaces, IT employees are encountering more and more problems. Large companies, in particular, prefer to use penetration testing to check how well their security concept works. This…

How to do a Penetration test
We use cookies on our website to provide you with the best possible user experience. By continuing to use our website or services, you agree to their use. More Information.