Spam

The double opt in process: Introduction and guidlines

The double opt in process: Introduction and guidlines

  • Technical matters

An inbox full of spam is enough to grind anyone’s gears. Too many marketers try to worm their way into the inboxes of potential customers without seeking permission. This is technically allowed in the US, but only until the recipient explicitly opts out. To ensure you don’t drive any customers away or ruin your company’s reputation by sending undesired newsletters, you should look into the double…

The double opt in process: Introduction and guidlines
How to protect websites from malware

How to protect websites from malware

  • Technical matters

A website operator is responsible for the security of a web project as well as the content. Neglecting security may lead to hackers easily infiltrating the system through security gaps. If a malware-infected website goes unnoticed, it could cause serious damage. It is therefore important to make sure your site is fully protected.

How to protect websites from malware
PHP 8: What you need to know about the latest version

PHP 8: What you need to know about the latest version

  • Web development

PHP is one of the most important languages on the Internet. Many content management systems like WordPress, TYPO3 or Joomla are based on PHP. With the release of PHP 8, various new features were introduced. Also some old features were reworked, meaning that errors may occur if the code is not up to date. You can find all the important information about the new features of PHP 8 here.

PHP 8: What you need to know about the latest version
Outlook spam filter: How to set it up, customize it and check the junk filter

Outlook spam filter: How to set it up, customize it and check the junk filter

  • E-Mail security

The Outlook spam filter automatically moves unwanted and potentially fraudulent emails to the junk folder. Even junk mail that doesn’t meet the typical spam criteria can be kept out of your Outlook inbox with the right settings. In case of errors, the Outlook junk filter can be easily adjusted manually.

Outlook spam filter: How to set it up, customize it and check the junk filter
How to recognize phishing e-mails and protect your data

How to recognize phishing e-mails and protect your data

  • E-Mail security

Scammers send out dubious e-mails attempting to obtain sensitive data from internet users every day. This is known as phishing and isn’t just annoying; fraudulent e-mails cost millions each year as internet users fall victim to them. We reveal how to identify phishing e-mails and how to render your inbox harmless.

How to recognize phishing e-mails and protect your data
What are Botnets?

What are Botnets?

  • Security

Botnets are tricky to spot, but they’re all over the internet and they cause all kinds of damage every day. They lurk inconspicuously in the background and use millions of private computers for malicious purposes. This guide explains how botnets work, how to keep them away, and how you can avoid falling victim to an illegal network.

What are Botnets?
How to recognize spam e-mails and how to prevent them

How to recognize spam e-mails and how to prevent them

  • E-Mail security

Billions of spam e-mails are sent daily. These annoying messages cost time and get on your nerves, especially when malware finds its way onto your computer or private data falls into the wrong hands. Just a few small tricks and a bit of caution when dealing with e-mails can remedy the situation.

How to recognize spam e-mails and how to prevent them
S/MIME: How to encrypt and sign your emails?

S/MIME: How to encrypt and sign your emails?

  • E-Mail security

If you send an e-mail without additional security measures, it’s like sending a postcard: if everything goes as planned, the information should arrive unchanged and unread in the recipient’s inbox. However, if someone intercepts the card or the e-mail in transit, they can read the contents without any problem and make as many changes as possible. Just like you would use an opaque envelope to…

S/MIME: How to encrypt and sign your emails?
What is greylisting? Definition, advantages and disadvantages

What is greylisting? Definition, advantages and disadvantages

  • E-Mail security

Greylisting is an effective method for preventing mass spam emails from being sent out. Since this process happens in the background, most users are unaware that their inbox is being protected by greylisting. Here you will learn exactly how this method works on a technical level.

What is greylisting? Definition, advantages and disadvantages
What is pharming and how to protect pharming attacks

What is pharming and how to protect pharming attacks

  • E-Mail security

The internet is not only a vast marketplace for companies, but also a gold mine for criminals. They attempt to steal user data and redirect financial transactions by constantly developing new methods. One popular technique is called pharming. But how does pharming work and how can internet users protect themselves?

What is pharming and how to protect pharming attacks
We use cookies on our website to provide you with the best possible user experience. By continuing to use our website or services, you agree to their use. More Information.