In IT, intentional redundancy protects storage systems and data centers from data loss and system failures. The duplication and repeated design of data sets, supply paths and technical components strengthen the resilience of databases and IT systems. Find out here how redundancy works, when it makes sense, and when it unintentionally becomes a hurdle.What is redundancy in computer science?
SSH tunnels are used for secure data transfers and for accessing websites that you otherwise wouldn’t have access to via your network. Reverse SSH tunnels make port forwarding possible with private IP addresses. Keep reading our dedicated article to find out what SSH tunnels are, what they’re used for and how to set one up.How to use SSH tunnels and SSH port forwarding
A shock was felt around the world at the end of 2021 when the Log4Shell vulnerability became known to the public. Attackers were able to completely take over remote systems without much effort. All major companies and many of the most widely used services were affected by it. In our article, we’ll explain why Log4Shell was so disastrous, how the exploits work, and what protective measures are...What is Log4Shell? Causes and effects of the Java vulnerability
In the digital age, we are increasingly resorting to cloud services: At work, people collaborate on projects together in the cloud, and in their free time, they share photos from their last vacation. At the same time, cloud storage is by no means free from security risks. The multi-cloud environments of larger companies, in particular, are becoming a challenge for cloud security. Here, we will...Using cloud services securely
Whether important documents or holiday photos: regular data backups on your PC or smartphone should be part of your digital routine. A regular back up of data is crucial for all companies, especially since more and more processes are being digitalized. Find out what’s important when backing up data, how to perform a data back up, and what the pros and cons of various storage media are.Backing up data: methods and storage media
There are many ways to back up photos. Which solutions are best for backing up your own pictures? Ever-improving image qualities lead to larger image files, and that’s why cloud-based photo backups are coming more and more into focus. How safe is it to store your photos there and what advantages does the cloud have over conventional data carriers when it comes to image storage?What are the options for a photo backup?
Creating database backups is one of the standard tasks of web and system admins. Each database management system comes with its own tools for creating backups. PostgreSQL has the command line programs pg_dump and pg_restore. The command line interface psql is also used. We’ll present you with the most common backup scenarios with examples of the required code.PostgreSQL backup with pg_dump and pg_restore
You might already know this warning message if you work with WordPress or similar CMS; “Create a backup of the database before updating”. The mysqldump tool is often used to create the backup. But what does MySQL dump mean? We’ll explain what is meant by this term and show you how to create a database backup with the mysqldump tool.MySQL backup with MySQL dump
It only takes a few seconds for a hacker to gain access to your private data without you having any idea. More often than not, a password is the only means of protection when logging into online services; and if it is too obvious, it will not prove too much of a challenge for criminals to crack. There are numerous options to increase password security.Optimal password protection: how to choose a strong password
An Apache SSL configuration can be surprisingly complicated. This is because an SSL certificate is required in addition to the actual server. If the required files are available on the server, the Apache configuration is adjusted. In the last step, don’t forget to test the connection setup via HTTPS. We’ll explain how to configure Apache SSL.How to configure Apache SSL step by step