Security

Encryption methods: An overview

Encryption methods: An overview

E-mail, instant messaging, or voice-over IP: If you want to communicate over the internet, you should make sure that the data transfer process can be trusted. The same goes for the World Wide Web. With online banking and digital shopping, money transactions are increasingly being carried out online. Popular encryption methods like DES, AES, or RSA should guarantee the security of passwords, credit...

Has my e-mail been hacked? These tools reveal the truth

Has my e-mail been hacked? How to find out!

Large-scale hacker attacks constantly make their way into the news, which then causes panic among users. Hackers exploit e-mail addresses and passwords by using them for criminal purposes. Victims often don’t even realize that their data has been stolen. We introduce four tools to help you check whether your e-mail has been hacked.

How to identify phishing e-mails and protect your data

Identifying phishing e-mails: the telltale signs at a glance

Scammers send out dubious e-mails attempting to obtain sensitive data from internet users every day. This is known as phishing and isn’t just annoying; fraudulent e-mails cost millions each year as internet users fall victim to them. We reveal how to identify phishing e-mails and how to render your inbox harmless.

Sign e-mails with a digital signature

More security online: sign e-mails with a digital signature

Spam e-mails may be annoying, but they’re mostly harmless. What’s more problematic is phishing – a technique whereby fraudsters try to con you by posing as trustworthy sender addresses in an attempt to get hold of sensitive data. These messages appear genuine too, because without a digital signature, it’s very easy to assume a trusted identity online. In order to protect customers and their own...

Creating Mac Backups

How to create a Mac backup

You can use the native software Time Machine to create a complete backup of your Mac computer in just a few steps. We’ll guide you through starting and running the backup process and show you other ways to back up data on Macs – from manual backups to cloud-based services.

ModSecurity Apache Module on a Cloud Server with Ubuntu

Use the ModSecurity Apache Module on a Cloud Server with Ubuntu 16.04

ModSecurity is a free web application firewall (WAF) which is a simple, powerful way to protect a server against web-based malware and hacking attempts. Learn how to install ModSecurity and the officially-recommended OWASP Core Rule Set (CRS) which will protect a server against malware and hacking in the form of SQL injection, session hijacking, cross-site scripting, Trojans, and many other forms...

NGINX Password Authentication

Set up Password Authentication with NGINX

Learn how to set up a basic HTTP authentication system. This will allow you to password protect particular directories on your website, so that they can only be accessed after logging in with a username and password.


Wait! We’ve got something for you!
Discover our special deals at IONOS!
Our most popular products, including cloud storage, hosting,
domains and more - now on sale.