What is server name identification, really? Encryption technologies play a big role when it comes to surfing on the net. Credit card data and other personal information must not fall into the hands of criminals. For now, TLS is one of the protocols used for this purpose. But it has a disadvantage: it only functions when each IP address only hosts one domain. If multiple virtual services are...
The “pathway to hell” – this is how Eran Hammer-Lahav once called the security protocol OAuth 2.0, on which he himself had worked for years. Others, however, use the service without issue. It enables users to use data and functions across multiple platforms in multiple services – for example, with the convenient single sign-on – using secure API authorization. But how exactly does OAuth2 work and...
Various computer networks are connected with one another via the Internet. In order to build up such connections, both the sending as well as the receiving systems have to provide transfer interfaces, or ports. The command line program netstat allows you to find out which ports are opened by your own system and which active connections exist — all of this helps reduce the risk of undesired access...
When combining hard disks in a RAID, you can choose between different standard setups called RAID levels. The predefined combinations determine the arrangement of individual hard disks and methods to store data in a RAID network. But what are the approaches of the most important RAID levels? And which one should you use?
If you no longer want to use Steam for downloads or to play computer games, you may want to delete your Steam account. In that case, it’s recommended to fully remove your data from the database. Unfortunately, this is currently only possible via Steam Support. If you want to delete your account, submit a deletion request. Here’s how this works.
Cyberattacks threaten individuals, companies, and public authorities alike. Criminals are always coming up with new techniques to cause as much damage as possible. The motives behind their actions vary from greed to political goals. So how can you protect yourself against cyberattacks? Our article tells you everything you need to know.
Those who have previously worked with WeTransfer, will be all too familiar with its basic principle: users can share large files without logging in or installing software. All you need to enter is the recipient’s email address. This was revolutionary when the platform first launched. However, nowadays numerous WeTransfer alternatives are available.
Americans love shopping online because it’s so convenient. Until recently, online payment systems were heavily dominated by one industry heavyweight: PayPal. But not everyone is enthused by this payment method, having been criticized for both security as well as data protection issues. Fortunately, there are plenty of PayPal alternatives out there. We’ll introduce a few here.
Learn how to effectively protect the administration area of your WordPress blog from hackers and brute force attacks with .htaccess directory protection.
Learn how to change your WordPress username and password. With this guide we will show you how to easily change your WordPress username and/or password.