Security

Ethical hacking
Ethical hacking – addressing security breaches and preventing cybercrime
  • Security

Ethical hacking has been booming worldwide for several years. A growing number of companies voluntarily choose to be hacked and commission skilled IT professionals to target them by attacking their own infrastructure. Real stress tests under real conditions are intended to reveal weaknesses in their systems and prevent illegal hack attacks that could have dire consequences. The procedure is also...

Ethical hacking – addressing security breaches and preventing cybercrime
PHP 7.2
PHP 7.2 – end-of-life (EOL) on November 30, 2020
  • Web development

PHP 7.2 will not be supported much longer. Now is the time to take advantage of the time left before the end-of-life date and replace outdated versions with more recent PHP code. This will make sure security gaps are closed, bugs are fixed, and the performance of web offers won’t fall short. The longer you wait, the more effort will be needed to update websites with dynamic web content.

PHP 7.2 – end-of-life (EOL) on November 30, 2020
Hash function
What is a hash function? Definition, usage, and examples
  • Security

Hash functions are used in many areas of computer science. They generate hash values that represent digital information in a consistent manner according to defined parameters. They provide additional security (using encryption) during data transmission and allow data to be accessed more quickly. We explain what hash functions are, how they are used and provide some examples.

What is a hash function? Definition, usage, and examples
What is role-based access control (RBAC)?
How does role-based access control (RBAC) work?
  • Security

Organizations restrict access permissions in systems to protect sensitive data from unauthorized access and modification. However, assigning access permissions to users individually is a high-maintenance and error-prone process. In the case of role-based access control (RBAC), permissions are assigned based on previously assigned roles. Here, we explain how role-based access control works.

How does role-based access control (RBAC) work?
Hash table
The hash table: fast database access to hash values
  • Security

A hash table is created using the hash function. This is a method for reducing digital information in such a way that extensive data sets can be retrieved quickly in internet-based databases. This method also makes it possible to implement sophisticated security features using encryption when transferring data.

The hash table: fast database access to hash values
WireGuard VPN: Basics
WireGuard VPN: the basics
  • Tools

Virtual private networks are becoming more and more popular among end users. However, the widespread VPN protocols are not optimized for modern use. With WireGuard, a lean alternative is now generally available. Boasting energy efficiency and low requirements on hardware, WireGuard could establish itself as the standard VPN solution of the future.

WireGuard VPN: the basics
Brute force attack: definition and protective measures
Brute force attacks: when passwords are served on a silver platter
  • Security

Being constantly faced with headlines about stolen passwords, it’s understandable that many users are concerned. Your best bet is to make your passwords as complicated as possible and have them consist of many different types of characters. But even this won’t help if it’s the actual log-in area that isn’t secure enough. Even today, attackers are still successful with the notorious and simple...

Brute force attacks: when passwords are served on a silver platter
What is SIEM?
What is SIEM (Security Information and Event Management)?
  • Security

Security gaps in IT infrastructure can risk a company’s reputation or even threaten its survival. Where criminals manage to shut down company networks or gain access to sensitive data, financial and image-related damage becomes a certainty. SIEM (Security Information and Event Management) allows businesses to detect danger in real-time, allowing for appropriate and timely reactions.

What is SIEM (Security Information and Event Management)?
What is spoofing?
What is spoofing?
  • Security

Spoofing attacks encompass a wide range of potential attack scenarios. Besides conventional approaches like IP spoofing and DNS spoofing, they also include particularly dangerous phishing attacks. Read this article to find out how spoofing attacks work and what measures you can take to protect yourself effectively.

What is spoofing?
What is a botnet?
Botnets: definition and protection tips
  • Security

Botnets are tricky to spot, but they’re all over the internet and they cause all kinds of damage every day. They lurk inconspicuously in the background and use millions of private computers for malicious purposes. This guide explains how botnets work, how to keep them away, and how you can avoid falling victim to an illegal network.

Botnets: definition and protection tips