What do EU cookie laws mean for you?

EU cookie laws and how they affect your business

 

Cookies can be helpful business tools, but they often toe the data protection line dangerously. As a result of this tendency towards uncertainty, the EU has introduced a new cookie policy to protect its users. The new policy makes opt-in procedures compulsory, because the user...

 

What is a QR code?

What is a QR code?

 

What do stamps, tickets, and posters have in common in the 21st century? More than you might think: Many companies now use QR codes on printed items for a variety of purposes. They can be used to quickly read data and execute commands. How does a QR code work? Which QR code...

 

Video conferencing

Video conferencing: How to make virtual meetings a success

 

Flexible working models are hard to imagine without video conferencing. Employees from different locations can meet easily for personal exchanges on a digital platform. But which software is recommended for optimal video conferencing? How can you make video conferencing more...

 

The best Facebook alternatives

What are the best alternatives to Facebook?

 

We once used phone calls and text messages to carry out all our communication, now our private conversations are largely digitalized and carried out almost entirely online. We write to each other via messenger apps and share photos, thoughts, and feelings on social networks. But...

 

The best TeamViewer alternatives

Alternatives to TeamViewer

 

You don’t always have to use the market leader – this also applies to remote access. TeamViewer is still the most widely-used solution for remote management and online meetings, but there are numerous alternatives on the market which can be considered. We present some serious...

 

Best Video editing programs

The 7 best video editing programs of 2020: beginner, advanced, and professional

 

Professionals use video editing software to create amazing films. However, video editing is not just for professionals. The best video editing programs of 2020 manage a balancing act between suitability for amateurs and professionals. With the right video editing software, you...

 

How to identify phishing e-mails and protect your data

Identifying phishing e-mails: the telltale signs at a glance

 

Scammers send out dubious e-mails attempting to obtain sensitive data from internet users every day. This is known as phishing and isn’t just annoying; fraudulent e-mails cost millions each year as internet users fall victim to them. We reveal how to identify phishing e-mails and...

 

Nagios plugins: the basic modules of the popular IT monitoring software

Although the software itself doesn’t contain any functions for monitoring hosts, services, or events, Nagios is one of the most in-demand IT monitoring solutions. This task is left up to Nagios’ plugins, which can be installed in addition to the core files. Check out our digital guide and find out more about these indispensable modules and how to use these for your own Nagios installation.

WordPress security: The most important security plugins

WordPress is among the most frequently used content management systems for blogs, forums and other online publishing platforms. With one million users its popularity means that it is also a hive for criminal activity with hackers scanning websites for possible weak areas. The only way to prevent hackers from gaining back door access is by taking adequate safety precautions.

The intrusion detection and intrusion prevention systems at a glance

A stable network is characterized not only by the appropriate hardware structures, but also by a watertight security concept. In addition to back-up solutions and intelligent fail-safe systems, protection against external access attempts is a must. Intrusion detection systems (IDS) and intrusion protection systems (IPS) are an excellent addition to the classic firewall and are therefore a sensible...

Jekyll – the practical generator for static websites

If you want to create a blog or a website, you can choose from numerous help packages such as website construction kits or content management systems. However, these complete packages often prove to be far too extensive for many projects. The website generator, Jekyll, which is closely linked to the developer platform, GitHub, proves that simple web presences can also be created with few functions...

Markdown editors for Windows, Mac and Linux

How can you easily format texts for use online and offline? This becomes a piece of cake when you use the markup language Markdown and an editor. With these editors for Linux, Windows and Mac as well as the online editors, you can create Markdown documents and convert them into HTML pages. But what are the best Markdown editors?

BPF – What is the Berkeley Packet Filter?

The Berkeley Packet Filter was developed in 1992 to filter, receive, and send data packets securely. The filter forms interfaces with security layers which are tasked with recognizing incoming corrupted data contents, for example. This allows them to be discarded or corrected right away. We explain how the BPF works.

Understanding and using SPF records

How can the recipient of an email tell whether a message is actually coming from the person who appears to be sending it? Many scammers attempt to forge the email sender address. But you can protect yourself. You can verify the outbound mail server using the SPF (Sender Policy Framework), a popular authentication method. How does SPF work and what can it do?

IMAP or POP3 – comparing e-mail protocols

When you set up your e-mail account you will sooner or later be faced with the decision of choosing between IMAP or POP3. Both transfer protocols help you receive your e-mails. But what are the differences between IMAP and POP3? And when is it best to use which protocol?

What are cookies?

Recently, a new EU directive has highlighted the importance of cookies, as these small text files sometimes store sensitive user data. But how do cookies actually work, and why do we need them? We will look at the small data packets that are exchanged and stored between web browsers and websites and how cookies affect every internet user today, whether for business or private purposes.

Creating a batch file: How to write your own .bat file

Windows operating systems can be controlled and configured in a wide variety of ways. To this day, experienced administrators use Command Prompt, the Windows command-line interpreter, for this purpose. If you want to have Windows automatically process a sequence of commands, you can create a batch file. This tutorial will show you how.


We’re all in this together. IONOS is
#HereForYou
For your business. When times are tough. When it matters most.
Keep your business going or start one with your own online store.
3 months free
Online Store
Get started in the world of eCommerce free for 3 months.