Security

Reset MySQL MariaDB root password
How to Reset the MySQL/MariaDB Root Password
  • Technical matters

Learn basic MySQL/MariaDB disaster recovery and preparedness: How to reset the root MySQL/MariaDB password.

How to Reset the MySQL/MariaDB Root Password
NGINX Password Authentication
Set up Password Authentication with NGINX
  • Configuration

Learn how to set up a basic HTTP authentication system. This will allow you to password protect particular directories on your website, so that they can only be accessed after logging in with a username and password.

Set up Password Authentication with NGINX
Installing a Free SSL Certificate on Ubuntu
Installing a Free SSL Certificate on Ubuntu
  • Website creation

With this guide you can easily learn how to setup a ssl certificate from Let's Encrypt on your Cloud Server with Ubuntu.

Installing a Free SSL Certificate on Ubuntu
ModSecurity Apache Module on a Cloud Server with Ubuntu
Use the ModSecurity Apache Module on a Cloud Server with Ubuntu 16.04
  • Configuration

ModSecurity is a free web application firewall (WAF) which is a simple, powerful way to protect a server against web-based malware and hacking attempts. Learn how to install ModSecurity and the officially-recommended OWASP Core Rule Set (CRS) which will protect a server against malware and hacking in the form of SQL injection, session hijacking, cross-site scripting, Trojans, and many other forms...

Use the ModSecurity Apache Module on a Cloud Server with Ubuntu 16.04
How do I convert my site to SSL and HTTPS?
Internet security: secure websites with SSL and HTTPS
  • Website creation

The topic of data security is becoming increasingly important for both private users as well as in the business world. As a website owner, you should take all the necessary precautions to ensure that a visit to your site is as secure as possible. Converting your site from HTTP to HTTPS or SSL is an important first step to securing your website and gaining your customers’ trust.

Internet security: secure websites with SSL and HTTPS
The best online backup services
The best online backup services compared
  • Tools

Many people use several devices and have data stored on them. What should you do if your data carrier fails, or the data gets lost? Backing up data is extremely important, and an online backup makes perfect sense. By doing this, you don’t risk losing your important files. What is the best option? Here is a comparison of online backup service providers.

The best online backup services compared
Federated Learning of Cohorts
FLoC: Federated Learning of Cohorts
  • Web development

Google plans to axe third-party cookies that are used to generate individual user profiles from its Chrome browser over the coming years. Advertising and tracking, on the other hand, will continue to be available, which is why the search engine giant has been busy with Federated Learning of Cohorts (FLoC) as an alternative solution. So, what’s behind the method? And how does FLoC work?

FLoC: Federated Learning of Cohorts
Browser fingerprints: tracking without cookies
Browser fingerprints: the basics and protection options
  • Web analytics

In recent years, so-called browser fingerprinting has established itself as a tracking method that doesn’t rely on the use of cookies. Web servers capture different characteristics from visitors’ browsers and determine their digital fingerprint based on them. They enable visitors to be recognized at a later date. While some information is automatically transmitted, it is mainly active elements...

Browser fingerprints: the basics and protection options
What is IAM (Identity and Access Management)?
IAM – What is Identity and Access Management?
  • Security

In any system based on user accounts, Identity and Access Management has a role to play. So does every application use IAM? How important are Identity and Access Management systems when it comes to corporate compliance? And what features do these systems offer?

IAM – What is Identity and Access Management?
What is credential stuffing?
Credential stuffing: how security leaks become a data sieve
  • Security

There are billions of stolen logins circulating on the dark web today. Hackers use these combinations of logins and passwords to break into user accounts and steal sensitive data using a technique known as “credential stuffing”. To protect your data, you need to know how credential stuffing works and what countermeasures you can take to protect yourself.

Credential stuffing: how security leaks become a data sieve