Security

What Is Pharming?
What is pharming and how to protect pharming attacks
  • E-Mail security

The internet is not only a vast marketplace for companies, but also a gold mine for criminals. They attempt to steal user data and redirect financial transactions by constantly developing new methods. One popular technique is called pharming. But how does pharming work and how can internet users protect themselves?

What is pharming and how to protect pharming attacks
How to identify phishing e-mails and protect your data
How to recognize phishing e-mails and protect your data
  • E-Mail security

Scammers send out dubious e-mails attempting to obtain sensitive data from internet users every day. This is known as phishing and isn’t just annoying; fraudulent e-mails cost millions each year as internet users fall victim to them. We reveal how to identify phishing e-mails and how to render your inbox harmless.

How to recognize phishing e-mails and protect your data
Encrypting a flash drive
How to encrypt a flash drive using Windows
  • Configuration

Although cloud solutions are becoming more and more popular, lots of people still use flash drives to save and back up data. If you do this, it’s a good idea to password protect your USB drive to keep your data safe. Windows comes with a number of tools for this, or you can download a special program like VeraCrypt. This guide gives step-by-step instructions for three different methods.

How to encrypt a flash drive using Windows
Creating Mac Backups
How to back up your Mac
  • Configuration

You can use the native software Time Machine to create a complete backup of your Mac computer in just a few steps. We’ll guide you through starting and running the backup process and show you other ways to back up data on Macs – from manual backups to cloud-based services.

How to back up your Mac
0x800f0922 error
How to fix error 0x800f0922 in Windows 10 and 11
  • Configuration

When something goes wrong while installing updates in Windows, the system often displays the cryptic 0x800f0922 error. The reason for this is usually a problem with updating or upgrading Windows. Various causes such as corrupt files or insufficient memory can be responsible. We’ll show you how to fix error 0x800f0922 in Windows 10 and 11.

How to fix error 0x800f0922 in Windows 10 and 11
Cryptojacking
Cryptojacking: How to detect and protect against infection
  • Security

Malware comes in many different forms, but the goal is always the same: making a profit. That of course is the case for illegal mining of cryptocurrencies, a practice known as cryptojacking. In cryptojacking, infected devices are misused to secretly mine cryptocurrencies – often as part of botnets. We explain how you can recognize cryptojacking and how you can protect your devices.

Cryptojacking: How to detect and protect against infection
Best cloud storage providers
The best cloud storage providers – an overview of the best online storage
  • Tools

Storing files online on a cloud platform has become part of everyday life for many people. Storing files with online storage providers takes the load off your hard drive and ensures that they are available anytime and from anywhere. But what are the best cloud storage providers on the market? And what differences are there between them? Which one would be best for me?

The best cloud storage providers – an overview of the best online storage
Ubuntu SSH
How to install and enable Ubuntu SSH
  • Configuration

There’s no way around the SSH security procedure if you want to enable secure remote connections to an Ubuntu system. OpenSSH from Ubuntu has an SSH server in the software package which fulfills all the important requirements. However, Ubuntu SSH is disabled by default, so it must be set up and activated first. We’ll tell you how to complete the installation.

How to install and enable Ubuntu SSH
Redundancy
What is redundancy in computer science?
  • Security

In IT, intentional redundancy protects storage systems and data centers from data loss and system failures. The duplication and repeated design of data sets, supply paths and technical components strengthen the resilience of databases and IT systems. Find out here how redundancy works, when it makes sense, and when it unintentionally becomes a hurdle.

What is redundancy in computer science?
How to use SSH tunnels
How to use SSH tunnels and SSH port forwarding
  • Security

SSH tunnels are used for secure data transfers and for accessing websites that you otherwise wouldn’t have access to via your network. Reverse SSH tunnels make port forwarding possible with private IP addresses. Keep reading our dedicated article to find out what SSH tunnels are, what they’re used for and how to set one up.

How to use SSH tunnels and SSH port forwarding