TLS (Transport Layer Security)

TLS: How the Internet is encrypted

Internet security measures have become indispensable these days. Encryption is essential to ensure that unauthorized third parties do not gain access to data or are able to manipulate it. That’s what TLS or Transport Layer Security is for. Here’s what you need to know about this integral element of the modern Internet.

TLS vs. SSL

TLS vs. SSL: what is the difference?

SSL and TLS are two encryption protocols that are frequently used in email programs and browsers. Have you ever wondered which one you should choose when you are prompted to pick one when configuring an email client, for example? Here, you will learn what the differences between SSL and TLS are and why only one of them is still viable today.

Open and restore a TMP file

Open or restore a TMP file: How it works

Temporary files with the extension are used by many different programs, including the operating system. If you come across cache files that are seemingly no longer used, you can open the respective TMP file to check its content. The following guide explains why there’s no standardized tool for this and how to open TMPs.

What is FIDO2?

FIDO2: The new standard for secure web log-in

Passwords are not an ideal way to surf the World Wide Web safely. They are either so complex that they are hard to remember, or so simple that they can be guessed in next to no time. FIDO2 takes a different approach and relies on modern technology. The open standard has the potential to make surfing the net safer and more convenient at the same time.

Intrusion detection systems and prevention systems

The intrusion detection and intrusion prevention systems at a glance

A stable network is characterized not only by the appropriate hardware structures, but also by a watertight security concept. In addition to back-up solutions and intelligent fail-safe systems, protection against external access attempts is a must. Intrusion detection systems (IDS) and intrusion protection systems (IPS) are an excellent addition to the classic firewall and are therefore a sensible...

Berkeley Packet Filter Explained

BPF – What is the Berkeley Packet Filter?

The Berkeley Packet Filter was developed in 1992 to filter, receive, and send data packets securely. The filter forms interfaces with security layers which are tasked with recognizing incoming corrupted data contents, for example. This allows them to be discarded or corrected right away. We explain how the BPF works.

WebAuthn

WebAuthn (Web Authentication)

Passwords have long ceased to offer sufficient protection when surfing the internet: They are easy to crack, easily tapped, and difficult to remember. Together with the FIDO Alliance, the World Wide Web Consortium has developed a new standard. WebAuthn is intended to make logging into social media or online shopping portals easier and safer. How does it work?

DHCP Snooping

DHCP Snooping: More Security for Your Network

DHCP snooping makes a network more secure. There are no two ways about it: DHCP makes network configuration so much easier. This is especially the case in large networks, where devices are constantly changing and the manual assignment of IP addresses is a never-ending task. Yet by using DHCP to simplify the process, you do relinquish controls, and criminals can take advantage of this. By using...

IP Spoofing: Fundamentals and counter-measures

IP Spoofing: Simple manipulation of data packets by attackers

Sending data over networks is one of the most important and highest utilized functions of the modern computer era. But the structure of the necessary TCP/IP connections makes it all too easy for criminals to intercept data packets along their way and either view or alter their contents. One of the most common methods of attack is IP spoofing, which allows DoS and DDoS attacks, among other things...

ARP Spoofing: Attacks from the internal network

ARP Spoofing – flaws in network security

When it comes to network security, administrators focus primarily on attacks from the internet. But often times, the danger lurks in the internal network. If the LAN turns out to be a blind spot in the security IT, then internal attackers have an easy time. A popular method of attack is ARP spoofing. With this, hackers switch undetected between two communication partners in order to intercept,...


We’re all in this together. IONOS is
#HereForYou
For your business. When times are tough. When it matters most.
Keep your business going or start one with your own online store.
3 months free
Online Store
Get started in the world of eCommerce free for 3 months.