We read online texts differently to how we read printed newspapers: Online, we quickly skim through the most important paragraphs, filter through the relevant information, and click on the next link. The requirements for a text are clear: information must be easily and quickly found. The most effective way to achieve this is by using the inverted pyramid principle. Our article explains what this...The inverted pyramid: how to optimize your writing style for online reader behavior
The internet is a playground for cybercriminals and fraudsters – for many, this is an annoying and frightening reality. The threats from unwanted software range from harmless advertising to trojans, which can paralyze complete computer networks. The forms of malicious software or malware are diverse, the countermeasures often very simple. In our article, you can read about how ransomware, spyware,...Ransomware, adware, etc. – how can you protect yourself?
Manually organizing a large local network can be a nerve-wracking and very complicated matter. Without your own DHCP and DNS servers to support you in the distribution of addresses and name resolution, all IPs would have to be entered manually and also updated independently if changes are made in the network. Zeroconf implementations like Bonjour, which connect network components without almost no...Bonjour: What’s behind the zeroconf implementation
Despite social networks such as Facebook becoming more and more popular, internet forums for free communities are still in as much demand as ever. Thanks to their exclusivity, traditional communication platforms maintain their place online and enhance numerous web projects. What are the possibilities for creating your own forum?Creating a forum: the best options
Dividing a corporate network into smaller subnets has some advantages in terms of speed, security, and logical organization. However, many people find it difficult to set up. Binary computational operations and long series of numbers are frightening, but the principle itself is not so complicated. We explain what subnetting is, how to calculate a subnetmask, and what you need subnets for, so that...Use subnetting to get the most out of your network
What’s important here is: data, data, data. Big data is no longer a buzzword and web analysis has become one of the most important disciplines in the context of marketing. After all, you can’t optimize your website and increase your conversion rate if you don’t understand the user by closely tracking their activities. A basic requirement of web analysis is to collect user information using...Tag management: basics & systems
In the world of social media marketing, the key to commercial success is a balancing act. A like here, a share there. Getting those Twitter follows is an art: combining regular updates with engaging content that is of interest to your target group. Social media tools can help to break this daunting task into manageable chunks.Social media tools
User interface is one of the most important keywords in modern web design and software development. Graphical user interfaces are currently relevant for both disciplines. Besides these, there are also numerous other interfaces — ranging from voice user interfaces to brain-computer interfaces. These interfaces enable interactions to take place between man and machine. Here, we provide an overview...Graphical user interface: what makes a good user interface?
VLC is the most popular program when it comes to playing music and videos. The tool opens almost every file and is installed on most computers. But what are the alternatives to VLC, and are they worth it? Our guide will help you find the right program for your needs if you’re looking for more than a simple media player.VLC alternatives: which media player is right for you?
Businesses use IDSs (intrusion detection systems) and firewalls in order to keep attackers away from sensitive IT systems. These safeguards can be enhanced through so-called honeypots, which bait hackers to isolated network areas where more information on their attack patterns can be collected. Find out more here on how honeypots work and with which programs honeypots can be implemented for both...What is a honeypot?