Security

The best PayPal alternative

The 7 best alternatives to PayPal at a glance

Americans love shopping online because it’s so convenient. Fast, easy, and secure payment methods have contributed to the rise of this sector. Until recently, online payment systems were heavily dominated by one industry heavyweight: PayPal. But not everyone is enthused by this payment method, having been criticized for both security as well as data protection issues. Fortunately, there are plenty...

General Data Protection Regulation: New rules for businesses

General Data Protection Regulation: new laws since the spring of 2018

Since May 25, 2018 a new European law on data protection has been in place. However, many companies and website operators are still unprepared for the new General Data Protection Regulation (GDPR) despite it being relevant to their day-to-day business. On top of this, high fines will be imposed for those violating the regulations. Here we summarize everything worth knowing on the new EU GDPR for...

Email encryption with SSL

Email encryption: How to encrypt your email traffic

Are the emails that you send and receive encrypted? If not, it’s about time you started. Only by encrypting the transmission and content of emails can you ensure that your data is secure while being sent. Otherwise, unauthorized persons can read your email traffic easily and possibly gain access to sensitive data such as passwords and bank information. We’ll show you the best protection...

Chrome 56: changes to make the web safer

Google is planning to label unsafe websites in Chrome

For two years now, Google has been actively promoting SSL encryption for websites. The search engine giant started acknowledging data transfer protection as a ranking factor in 2014, but now wants to go one step further. Users of Google’s browser, Chrome, will soon be actively warned about websites with unsafe data exchanges. This articles explains what the planned changes are and which...

Chrome Updates

What is Chrome 68?

Early next month, Chrome 68 will be launched and the new browser will distrust all webpages that do not have HTTPS encryption as “not secure”. This is a big step in the recent trend towards emphasizing user safety on the internet, a not entirely selfless strategy from Google. In this guide, we will explain what changes will be made, why they are happening, and how you can prepare your website...

Best cloud storage providers

The best cloud storage providers – an overview of the best online storage

Storing files online on a cloud platform has become part of everyday life for many people. Regardless if it’s your own holiday photos, or important documents for work - storing files with online storage providers takes the load off your hard drive, and also ensures that they are available anytime and from anywhere. But what are the best cloud storage providers on the market? And what differences...

How do I convert my site to SSL and HTTPS?

Internet security: secure websites with SSL and HTTPS

The topic of data security is becoming increasingly important for both private users as well as in the business world. As a website owner, you should take all the necessary precautions to ensure that a visit to your site is as secure as possible. Converting from HTTP to HTTPS or SSL is an important step in securing your website and gaining your customers’ trust.

HSTS: Reliably secure your HTTPS connections

HSTS: How the HTTPS expansion works

HTTPS, the network protocol for TLS-encrypted data transfer online can be circumvented in some cases. The danger is that encrypted websites can be accessed via unencrypted HTTP. But the HTTPS extension HSTS (HTTP Strict Transport Security) forces website access via TLS encryption, closing the security gaps that hackers like to use to intercept the HTTPS connection during transport using...

How HTTP/2 optimizes the World Wide Web

HTTP/2 – how the new version optimizes data transfer online

HTTP/2 has been released and is the official successor of the internet protocol HTTP/1.1. It is already compatible with many current web browsers and servers. Up to this point, many of the bigger website operators have switched to using the new transfer protocol. But what lies behind the Hyper Transfer Protocol and what are the advantages of the new version?

Has my e-mail been hacked? These tools reveal the truth

Has my e-mail been hacked? How to find out!

Large-scale hacker attacks constantly make their way into the news, which then causes panic among users. Hackers exploit e-mail addresses and passwords by using them for criminal purposes. Victims often don’t even realize that their data has been stolen. We introduce four tools to help you check whether your e-mail has been hacked.


Wait! We’ve got something for you!
Get your own .US domain now, the first year is free.


FREE in the 1st year*
then $17.76/year

Enter the web address of your choice in the search bar to check its availability.
* Offer valid for customers with a bona fide US presence and with the purchase of a new, two-year domain. Only one per customer.