Data Protection

What is a network attached storage (NAS)?
Network attached storage (NAS)
  • Know-how

Growing sums of data require cost-effective, high-performance storage solutions. One option for fulfilling this requirement is a network attached storage. In business contexts, this model has already established itself as a viable alternative to file servers, hard drives, and the cloud. Private users have also caught on and use NAS systems at home. But what is a NAS? Read on, and we’ll show you...

Network attached storage (NAS)
Server Name Indication
What is the Server Name Indication (SNI)?
  • Know-how

What is server name identification, really? Encryption technologies play a big role when it comes to surfing on the net. Credit card data and other personal information must not fall into the hands of criminals. For now, TLS is one of the protocols used for this purpose. But it has a disadvantage: it only functions when each IP address only hosts one domain. If multiple virtual services are...

What is the Server Name Indication (SNI)?
How to recognize and remove malware
What is Malware and how to prevent it
  • Security

Practically every PC user fears Trojan horses and computer viruses. Security is paramount if you are managing sensitive data or setting up a server. You need a comprehensive security concept to protect yourself against insidious malware. It’s helpful to know the different types of malicious software that exist, and how to combat and safely remove them.

What is Malware and how to prevent it
Terminal Servers – the Secret Behind Remote Hosts
Terminal servers: definition, basics, and advantages
  • Know-how

In the days of mainframe computers and the first smaller networks, terminals were a crucial building block for sharing hardware and software resources. It is no coincidence that terminal servers – the central administrative entity of such networks – are in demand decades later, now that applications are to be made available to multiple users.

Terminal servers: definition, basics, and advantages
Tips for legal certainty for your online store
How to make your online store legally watertight
  • Online sales

In recent years, many online stores found themselves receiving warnings due to not properly adhering to website legalities. Given the growing number of online businesses, it’s not surprising that companies are now springing up, which specialize in identifying legal violations and then fining the operator. Therefore, it’s all the more important to understand the legal basics of your web store to...

How to make your online store legally watertight
Introduction to netstat
Introduction to netstat: what is netstat and how does it work?
  • Tools

Various computer networks are connected with one another via the Internet. In order to build up such connections, both the sending as well as the receiving systems have to provide transfer interfaces, or ports. The command line program netstat allows you to find out which ports are opened by your own system and which active connections exist — all of this helps reduce the risk of undesired access...

Introduction to netstat: what is netstat and how does it work?
E-mail marketing trends
9 email marketing trends for 2023
  • E-mail marketing

To ensure that your newsletter campaigns continue to be effective in the future, you shouldn’t miss out on these email marketing trends in 2023. There are even more automation possibilities, new design options and stricter data protection. In our article on this year’s newsletter email trends, we explain what you should look for in your future strategies and how you can enhance your email...

9 email marketing trends for 2023
Deleting a Google result and protecting personal data
Deleting personal data with Google
  • Digital law

The internet never forgets – is it always true? In some cases, search engines are obliged to grant users permission to delete defamatory search results. If Google displays personal data that is outdated or of no interest to the public, users can request the search engine to delete links to that data from the results pages permanently. But what exactly is the ‘Right to be Forgotten’ act, and when...

Deleting personal data with Google
Alternatives to Google
Google alternatives at a glance
  • Search engine marketing

Numerous companies and nonprofit organizations offer web search services beyond the Google algorithm. The competition is usually stuck with an outsider status when it comes to their alternatives to Google but they also present interesting approaches and innovative business models that don’t necessarily rely on the advertising industry. The trend toward anonymous web searches is also starting to...

Google alternatives at a glance
What is a botnet?
What are Botnets?
  • Security

Botnets are tricky to spot, but they’re all over the internet and they cause all kinds of damage every day. They lurk inconspicuously in the background and use millions of private computers for malicious purposes. This guide explains how botnets work, how to keep them away, and how you can avoid falling victim to an illegal network.

What are Botnets?