Security

Security vulnerability: Log4Shell
What is Log4Shell? Causes and effects of the Java vulnerability
  • Security

A shock was felt around the world at the end of 2021 when the Log4Shell vulnerability became known to the public. Attackers were able to completely take over remote systems without much effort. All major companies and many of the most widely used services were affected by it. In our article, we’ll explain why Log4Shell was so disastrous, how the exploits work, and what protective measures are...

What is Log4Shell? Causes and effects of the Java vulnerability
How to Protect Access to your Cloud
Using cloud services securely
  • Security

In the digital age, we are increasingly resorting to cloud services: At work, people collaborate on projects together in the cloud, and in their free time, they share photos from their last vacation. At the same time, cloud storage is by no means free from security risks. The multi-cloud environments of larger companies, in particular, are becoming a challenge for cloud security. Here, we will...

Using cloud services securely
General Data Protection Regulation: New rules for businesses
The EU General Data Protection Regulation (GDPR): summary, innovations and checklist
  • Digital law

Since May 25, 2018, a European law on data protection has been in place. However, despite it being relevant to day-to-day business, many companies and website operators are still unattuned to the General Data Protection Regulation (GDPR). On top of this, high fines are imposed on those violating the regulations. Here we summarize everything worth knowing on the EU GDPR for entrepreneurs and online...

The EU General Data Protection Regulation (GDPR): summary, innovations and checklist
PostgreSQL backup
PostgreSQL backup with pg_dump and pg_restore
  • Security

Creating database backups is one of the standard tasks of web and system admins. Each database management system comes with its own tools for creating backups. PostgreSQL has the command line programs pg_dump and pg_restore. The command line interface psql is also used. We’ll present you with the most common backup scenarios with examples of the required code.

PostgreSQL backup with pg_dump and pg_restore
MySQL backup
MySQL backup with MySQL dump
  • Security

You might already know this warning message if you work with WordPress or similar CMS; “Create a backup of the database before updating”. The mysqldump tool is often used to create the backup. But what does MySQL dump mean? We’ll explain what is meant by this term and show you how to create a database backup with the mysqldump tool.

MySQL backup with MySQL dump
Online identity theft protection
Online identity theft protection
  • Website creation

Many only know internet identity theft and similar crimes from movies or television. But stories of online fraudsters are not just mere phantasies of screenwriters; for many the experience is all too real. Online identity theft has become more and more of a problem over the past few years, and everyone is a potential victim. We have compiled some preventative steps than can help you stay out of...

Online identity theft protection
Data center tiers
Data center tiers explained
  • Know-how

What’s the difference between a tier 3 data center and a tier 4 data center? There are a number of different systems for classifying data centers and establishing national and international standards. Keep reading to find out about data center tiers, the most used standards, and international classification systems.

Data center tiers explained
Comparison of the best antivirus programs
Antivirus software: Which software is best?
  • Security

Antivirus software has sadly become indispensable as new types of threats against your system emerge regularly. Viruses, worms, Trojan horses, and many other types of malware threaten to infect your system and could cause significant damage. To counteract these threats, software makers try to fight off malware attacks with intelligent antivirus programs. Find out which rank top in our antivirus...

Antivirus software: Which software is best?
WordPress: rename wp-login
How to change your admin URL in WordPress
  • Blogs

WordPress enjoys great popularity not only among users, but also among criminals. The high degree of distribution and known security vulnerabilities basically invite illegal attacks on data and information. A popular target: the WordPress admin login. Learn in our article what the general problem with the login page is and how to change your WP admin URL in WordPress.

How to change your admin URL in WordPress
WordPress cookie plugins
The best cookie consent plugins for WordPress
  • Blogs

WordPress cookie plugins are an important component of any WordPress project because they ensure cookie compliance with a country’s legal requirements. Unless you’re using only technical cookies that are necessary for your website to function, you should ask a user’s permission to collect their information via cookies when they visit your WordPress site. Discover the five best plugins to create...

The best cookie consent plugins for WordPress