Social engineering – the security gap at ‘layer 8’

Social engineering: human vulnerability exploited

The most effective system break-ins often happen without a scene. Instead of disrupting central network devices with DDoS attacks or sneaking through onto operating systems with Trojan horse techniques, hackers increasingly try to exploit the human security gap. There are various such methods that fall within the broader category of social engineering: a technique that sees hackers gather publicly...

What is MAC spoofing?

What is MAC spoofing?

MAC spoofing is a method by which unique hardware addresses are masked using a Locally Administered Address (LAA) in the software. MAC spoofing can offer protection for your privacy when using public LAN or WLAN networks, but can also be used for illegal network activities. We explain to you here how MAC spoofing works and which settings in Windows must be accessed in order to change your MAC...

Securing a server: correctly configuring Linux, etc.

The right configuration to secure your server

If you operate or rent your own server, it is your responsibility to protect it against failures and external access. You can immediately begin to set the foundation for this when configuring the server, if you have the necessary administrative rights. The correct settings can work wonders, especially with encrypted remote connections via SSH protocol, and greatly increase security.

Creating an IT disaster recovery plan

For when the going gets tough: the IT disaster recovery plan

For businesses, a reliable IT infrastructure is just as integral to day-to-day operations as competent management, productive employees, and reasonable working conditions. A server outage is able to paralyze an entire company. Adequate preparation can help prevent some of the most common errors from occurring; unforeseen risks, however, will always remain a factor. In order to be on top of your...

Headless CMS: What are the benefits?

Get more from your own content with headless CMS

If you want to juggle more than one channel with your content management system, you’ll quickly reach the limits. A classic CMS offers many simplifications, but at the same time is limited with its design options. For this reason, content creators sometimes rely on another solution: a headless CMS. This separates the frontend from the backend so that different websites and mobile apps can be...

Comparison of the best antivirus programs

Antivirus software: Which software is best?

Antivirus software has sadly become indispensable as new types of threats against your system emerge regularly. Viruses, worms, Trojan horses, and many other types of malware threaten to infect your system and could cause significant damage. To counteract these threats, software makers try to fight off malware attacks with intelligent antivirus programs. Find out which rank top in our antivirus...

How companies use social selling

Social selling: business relations on the social net

Purchasing decisions are rarely made out of the blue. Customers usually go through a decision-making phase, during which it’s up to the company to convince the customer of their need for the product. This is most effective when you present yourself and your products as trustworthy and honest as possible – particularly on social networks, where your target group conducts research, asks for...

The OSI model: a reference for standards and protocols

What’s the OSI model?

Those working with network technology are bound to encounter the ISO-OSI model sooner or later. This system subdivides communication between computer systems into seven different layers. Each of these layers is assigned a certain task. With the help of this layer model, subareas of abstract processes are able to be descriptively explained.

SQL injection: Fundamentals and safeguards

SQL Injection: Protect your database system

There are daily reports on how security gaps in applications are exploited – because hardly a day goes by without a new gap being discovered or a known gap being closed. One attack method, which has always been based on exploiting such weak points, is called SQL injection. But what is actually hidden behind the malicious database exploitation and how can you protect your database system from it?

Zero-day exploit

Zero-day exploit: Explanation and protection measures

The risk for businesses to fall victim to a zero-day exploit has increased in recent years. More and more often, cybercriminals can take advantage of as-yet undiscovered weak points in business software in order to steal or manipulate data. It is difficult to protect against these attacks, but businesses can take some measures to improve their security.

Wait! We’ve got something for you!
Have a look at our great prices for different domain extensions.

Enter the web address of your choice in the search bar to check its availability.
$1/1st year
then $20/year
$1/1st year
then $15/year
$1/1st year
then $20/year
$1/1st year
then $20/year