Security

Ping of death

Ping of death

The ping of death was a cause for alarm in the early days of the Internet: A malicious hacker could cause a remote system to crash with a simple ping command. Keep reading to find out how the attack works on a technical level and why you don’t have to worry about it today.

Ping flood

Ping flood

The ping flood is a type of denial-of-service attack that can affect commercial providers and home users alike. This attack relies on the ICMP protocol and the ping command. In order to unleash a particularly powerful flood, attackers often use a network of bots. Learn how the ping flood works and how you can protect yourself from one.

General Data Protection Regulation: New rules for businesses

General Data Protection Regulation: new laws since the spring of 2018

Since May 25, 2018 a new European law on data protection has been in place. However, despite it being relevant to day-to-day business, many companies and website operators are still unattuned to the General Data Protection Regulation (GDPR). On top of this, high fines are imposed on those violating the regulations. Here we summarize everything worth knowing on the new EU GDPR for entrepreneurs and...

Gain users’ confidence with a privacy policy

Getting a privacy policy for your website

An important part of a website that many operators underestimate is the privacy policy. This notifies site visitors of the information they are disclosing about themselves and what their data will be used for. But what kind of information should this declaration contain, what has changed since the EU General Data Protection Regulation law, and how does this affect companies in the US?

Create WordPress backup

How to back up your WordPress site

WordPress backups allow you to safeguard websites created with the WordPress content management system in the event of unintended data loss. You have the ability to regularly back up WordPress sites with the help of your provider or cloud service provider. On the other hand, a manual backup requires a little extra work but gives you full control.

Comparison of the best antivirus programs

Antivirus software: Which software is best?

Antivirus software has sadly become indispensable as new types of threats against your system emerge regularly. Viruses, worms, Trojan horses, and many other types of malware threaten to infect your system and could cause significant damage. To counteract these threats, software makers try to fight off malware attacks with intelligent antivirus programs. Find out which rank top in our antivirus...

Windows 10: creating a backup

Windows 10 backup: how the data backup works

In Windows 10, making a backup is the most secure way to protect your data in the event of a system crash or hardware issue. The Windows 10 backup allows you to save all your programs, private data, and system settings as an exact system image. If your computer or laptop gets damaged, the Windows 10 backup can easily be transferred to another device.

What is a backup?

What is a backup and how does it effectively protect your data?

Technical issues, hacker attacks, and malware can lead to costly and serious data loss at any time. To minimize the risks, it is recommended that you perform regular comprehensive backups. It is important to have a suitable backup strategy that properly meets your specific requirements.

Windows 8: creating backups

How to back up Windows 8 computers: tutorial

A broken PC can be hugely frustrating for many reasons. In some situations, you may even need to replace the hardware, risking the loss of your vacation photos, documents, or important data. Creating a backup of your files can help prevent this situation. Windows 8 ships with its own tools for this purpose. We’ll provide a detailed overview of how Windows 8 backups work.

ModSecurity Apache Module on a Cloud Server with Ubuntu

Use the ModSecurity Apache Module on a Cloud Server with Ubuntu 16.04

ModSecurity is a free web application firewall (WAF) which is a simple, powerful way to protect a server against web-based malware and hacking attempts. Learn how to install ModSecurity and the officially-recommended OWASP Core Rule Set (CRS) which will protect a server against malware and hacking in the form of SQL injection, session hijacking, cross-site scripting, Trojans, and many other forms...


Wait! We’ve got something for you!
Have a look at our great prices for different domain extensions.


Enter the web address of your choice in the search bar to check its availability.
.org
$1/1st year
then $20/year
.com
$1/1st year
then $15/year
.info
$1/1st year
then $20/year
.me
$1/1st year
then $20/year