SSL

Protect sensitive data with a strong password
How to choose a strong password
  • Security

It only takes a few seconds for a hacker to gain access to your private data without you having any idea. More often than not, a password is the only means of protection when logging into online services; and if it is too obvious, it will not prove too much of a challenge for criminals to crack. There are numerous options to increase password security.

How to choose a strong password
Using SSH keys for your network connection
How to use SSH keys
  • Security

Operating and managing a remote server located in a data center is often carried out by using a secure network connection provided by the SSH protocol. The necessary registration on the server is preceded by an authentication process. Usually this occurs in the form of the username and password. Alternative methods such as the public key authentication used by SSH, do have their advantages. But...

How to use SSH keys
Password managers: an overview of today’s best tools
Password-Manager | Overview and Comparsion
  • Security

Would you give your bank account pin number to a stranger? Certainly not. However, this is essentially just what you are doing if you don’t secure your online banking log-in with a password that can’t be figured out by hackers in a matter of seconds. In order to be able to create and manage all of your passwords in a completely secure way, it is worth making use of a password manager.

Password-Manager | Overview and Comparsion
Securing servers with Fail2ban
How to Setup Fail2Ban
  • Security

For server operators, security is of the utmost importance. Only those who have developed and set up a foolproof defense strategy are ready for drastic situations. As well as regular protection mechanisms, like security software, backups, and encryption, there are also some useful tools and frameworks that may come in handy in the fight against intruders. We have laid out essential details on the...

How to Setup Fail2Ban
What is a server? One term, two definitions
What is a server?
  • Know-how

When talking about web hosting, it is impossible to avoid the term ‘server’. So what is a server? And how does it work? In IT, there are actually two definitions of the term. The traditional server is the software for network services, but more recently the word has also been used to describe the corresponding hardware used to carry out server programs. Here is our overview of the most common...

What is a server?
E-Mail encryption with PGP
What is PGP encryption and how to implement it
  • E-Mail security

Online privacy is a sensitive issue that affects experts and amateurs alike. Whether you’re posting on social networks, carrying out banking transactions, or buying from an online store, your data is not always sufficiently protected. The same applies to e-mails. Don’t let cyber criminals get their hands on your content by encrypting your e-mails.

What is PGP encryption and how to implement it
Email encryption with SSL
What is email encryption and how does is work
  • E-Mail security

Are the emails that you send and receive encrypted? If not, it’s about time you started. Only by encrypting the transmission and content of emails can you ensure that your data is secure while being sent. Otherwise, unauthorized persons can read your email traffic easily and possibly gain access to sensitive data such as passwords and bank information. We’ll show you the best protection...

What is email encryption and how does is work
How to identify phishing e-mails and protect your data
How to recognize phishing e-mails and protect your data
  • E-Mail security

Scammers send out dubious e-mails attempting to obtain sensitive data from internet users every day. This is known as phishing and isn’t just annoying; fraudulent e-mails cost millions each year as internet users fall victim to them. We reveal how to identify phishing e-mails and how to render your inbox harmless.

How to recognize phishing e-mails and protect your data
E-mail etiquette: rules for the perfect e-mail
E-mail etiquette rules every professional should follow
  • E-mail marketing

Every day, over 200 billion e-mails are sent around the world – although many of them aren’t received with much enthusiasm. In order for your business e-mails to stand out in all this chaos, you should pay attention to e-mail etiquette. If you stick to the most important rules, your e-mails will appear polite, but at the same time, serious. Messages like these will be happily answered.

E-mail etiquette rules every professional should follow
Apache SSL
How to configure Apache SSL step by step
  • Security

An Apache SSL configuration can be surprisingly complicated. This is because an SSL certificate is required in addition to the actual server. If the required files are available on the server, the Apache configuration is adjusted. In the last step, don’t forget to test the connection setup via HTTPS. We’ll explain how to configure Apache SSL.

How to configure Apache SSL step by step