SSL

ERR_SSL_PROTOCOL_ERROR: the best solutions
ERR_SSL_PROTOCOL_ERROR: how to fix the Chrome bug
  • Technical matters

Chrome is the world’s most widely-used internet browser. The application scores points not only when it comes to security and speed, but also with its features such as cross-device synchronization of user data. But errors can occur even when surfing with Google’s wonder weapon. These can lead to the browser crashing or prevent certain pages from being accessed. The error message...

ERR_SSL_PROTOCOL_ERROR: how to fix the Chrome bug
QUIC – the Internet Transport Protocol based on UDP
QUIC: What is behind the experimental Google Protocol?
  • Technical matters

Quick UDP Internet Connections (QUIC for short), is an experimental network protocol from Google. Further development of the protocol is being driven by IETF, which has set up a dedicated group working towards it. The QUIC protocol is intended to offer a speed-optimized alternative to the current transport standard TCP and builds on the connectionless protocol UDP to achieve this.

QUIC: What is behind the experimental Google Protocol?
What is a server? One term, two definitions
What is a server?
  • Know-how

When talking about web hosting, it is impossible to avoid the term ‘server’. So what is a server? And how does it work? In IT, there are actually two definitions of the term. The traditional server is the software for network services, but more recently the word has also been used to describe the corresponding hardware used to carry out server programs. Here is our overview of the most common...

What is a server?
Email encryption with SSL
What is email encryption and how does is work
  • E-Mail security

Are the emails that you send and receive encrypted? If not, it’s about time you started. Only by encrypting the transmission and content of emails can you ensure that your data is secure while being sent. Otherwise, unauthorized persons can read your email traffic easily and possibly gain access to sensitive data such as passwords and bank information. We’ll show you the best protection...

What is email encryption and how does is work
How to identify phishing e-mails and protect your data
How to recognize phishing e-mails and protect your data
  • E-Mail security

Scammers send out dubious e-mails attempting to obtain sensitive data from internet users every day. This is known as phishing and isn’t just annoying; fraudulent e-mails cost millions each year as internet users fall victim to them. We reveal how to identify phishing e-mails and how to render your inbox harmless.

How to recognize phishing e-mails and protect your data
Protect sensitive data with a strong password
How to choose a strong password
  • Security

It only takes a few seconds for a hacker to gain access to your private data without you having any idea. More often than not, a password is the only means of protection when logging into online services; and if it is too obvious, it will not prove too much of a challenge for criminals to crack. There are numerous options to increase password security.

How to choose a strong password
Using SSH keys for your network connection
How to use SSH keys
  • Security

Operating and managing a remote server located in a data center is often carried out by using a secure network connection provided by the SSH protocol. The necessary registration on the server is preceded by an authentication process. Usually this occurs in the form of the username and password. Alternative methods such as the public key authentication used by SSH, do have their advantages. But...

How to use SSH keys
Password managers: an overview of today’s best tools
Password-Manager | Overview and Comparsion
  • Security

Would you give your bank account pin number to a stranger? Certainly not. However, this is essentially just what you are doing if you don’t secure your online banking log-in with a password that can’t be figured out by hackers in a matter of seconds. In order to be able to create and manage all of your passwords in a completely secure way, it is worth making use of a password manager.

Password-Manager | Overview and Comparsion
Securing servers with Fail2ban
How to Setup Fail2Ban
  • Security

For server operators, security is of the utmost importance. Only those who have developed and set up a foolproof defense strategy are ready for drastic situations. As well as regular protection mechanisms, like security software, backups, and encryption, there are also some useful tools and frameworks that may come in handy in the fight against intruders. We have laid out essential details on the...

How to Setup Fail2Ban
E-Mail encryption with PGP
What is PGP encryption and how to implement it
  • E-Mail security

Online privacy is a sensitive issue that affects experts and amateurs alike. Whether you’re posting on social networks, carrying out banking transactions, or buying from an online store, your data is not always sufficiently protected. The same applies to e-mails. Don’t let cyber criminals get their hands on your content by encrypting your e-mails.

What is PGP encryption and how to implement it