Security

Apache SSL
How to configure Apache SSL step by step
  • Security

An Apache SSL configuration can be surprisingly complicated. This is because an SSL certificate is required in addition to the actual server. If the required files are available on the server, the Apache configuration is adjusted. In the last step, don’t forget to test the connection setup via HTTPS. We’ll explain how to configure Apache SSL.

How to configure Apache SSL step by step
Docker backup
Docker: Backup and restore
  • Security

Docker is a convenient way to manage containerized applications. While there is no uniform approach for creating backups of individual Docker data, there are several different commands which can be used in combination. We’ll show you how to create and restore Docker backups in our dedicated article. Let’s get started.

Docker: Backup and restore
Server Name Indication
Server Name Indication (SNI): What’s behind the standard?
  • Know-how

What is server name identification, really? Encryption technologies play a big role when it comes to surfing on the net. Credit card data and other personal information must not fall into the hands of criminals. For now, TLS is one of the protocols used for this purpose. But it has a disadvantage: it only functions when each IP address only hosts one domain. If multiple virtual services are...

Server Name Indication (SNI): What’s behind the standard?
Wipe hard drive
Wipe hard drive: Securely wipe an HDD or SSD
  • Security

Even formatting a hard drive under Windows or Mac does not completely wipe all data. Although wiping it is not impossible, it requires additional tools to be able to wipe a Mac hard drive or Windows hard drive with the utmost thoroughness. These can be used to safely wipe and overwrite data on both an HDD and an SSD. You can find out how this works here.

Wipe hard drive: Securely wipe an HDD or SSD
Public key encryption
Asymmetric encryption
  • Security

If you want to secure your digital data with the best possible protection, there is no getting around the issue of encryption. For example, asymmetric cryptography plays an essential role in secure data transfer. Here, you will learn how it works, how it is different from traditional symmetric encryption, and where it is used.

Asymmetric encryption
Encryption software
Encryption software: A comparison of encryption tools
  • Security

A good encryption software keeps your data secure. It enables you to easily protect a folder, hide hard drives, or sync encrypted data to a cloud, for example. Find out more information about recommended encryption tools and what they do, and get an overview of their advantages and disadvantages in our dedicated article.

Encryption software: A comparison of encryption tools
Membership site
How to create a membership site, i.e. a password-protected website
  • Website creation

It is not uncommon for websites to have a members’ area that contains exclusive content for registered members only in order to attract customers and foster loyalty long-term. Learn how to make a private website that requires a password, how to convert users, and what else you should consider when creating a membership site.

How to create a membership site, i.e. a password-protected website
Scareware
What is scareware and how can you protect yourself against it?
  • Security

Scammers use scareware to trick users out of their money or to get them to install more malware. Fortunately, there are effective ways to protect yourself against scareware, as well as signs that can help you identify threats before you fall victim. Our article has everything you need to know about scareware so let’s get started.

What is scareware and how can you protect yourself against it?
WordPress login how-to
How to log in to WordPress: WordPress admin login
  • Blogs

WordPress is a flexible content management system that can be extended and configured in many ways. However, it can be confusing when features differ between different WordPress installations. Our article shows what pitfalls there are with WordPress login, and explain how to simplify WordPress login as a user or admin.

How to log in to WordPress: WordPress admin login
Managed Security Services
Managed Security Services
  • Technical matters

With the help of managed security service providers, organizations benefit from the security expertise of experienced service providers. This results not only in better security but simultaneously reduces the overall costs. We will explain the exact services that MSSPs provide, delving into the underlying concepts of information security.

Managed Security Services