Data Protection

How to recognize and remove malware
What is Malware and how to prevent it
  • Security

Practically every PC user fears Trojan horses and computer viruses. Security is paramount if you are managing sensitive data or setting up a server. You need a comprehensive security concept to protect yourself against insidious malware. It’s helpful to know the different types of malicious software that exist, and how to combat and safely remove them.

What is Malware and how to prevent it
Cyberattacks
What is a Cyberattack and how to prevent it?
  • Security

Cyberattacks threaten individuals, companies, and public authorities alike. Criminals are always coming up with new techniques to cause as much damage as possible. The motives behind their actions vary from greed to political goals. So how can you protect yourself against cyberattacks? Our article tells you everything you need to know.

What is a Cyberattack and how to prevent it?
Delete Steam account
Delete your steam account: here’s how
  • Social media

If you no longer want to use Steam for downloads or to play computer games, you may want to delete your Steam account. In that case, it’s recommended to fully remove your data from the database. Unfortunately, this is currently only possible via Steam Support. If you want to delete your account, submit a deletion request. Here’s how this works.

Delete your steam account: here’s how
Using SSH keys for your network connection
How to use SSH keys for your network connection
  • Security

Operating and managing a remote server located in a data center is often carried out by using a secure network connection provided by the SSH protocol. The necessary registration on the server is preceded by an authentication process. Usually this occurs in the form of the username and password. Alternative methods such as the public key authentication used by SSH, do have their advantages. But...

How to use SSH keys for your network connection
What is metadata?
What is metadata?
  • Web development

Metadata is generated by many applications in the digital world. If this data is collected and analyzed en masse, it poses a serious risk to privacy. But metadata doesn’t have to be dangerous. The term is broad and encompasses a lot of useful techniques. In this article we’ll explore the meaning of metadata with some examples.

What is metadata?
Clearing the Cache
How to clear the browser cache
  • Configuration

Information is often cached so that visited website can be loaded quickly and videos and gifs can be viewed offline. However, if the cache contains a large, or very large amount of data, it can cause problems and adversely affect computer performance. Therefore, it makes sense to delete the cache from time to time.

How to clear the browser cache
What is Big Data?
Big Data: definition and examples
  • Web analytics

When we shop online, book vacations, and search for gift ideas, we hardly give a second thought to the fact that each search entry leaves behind a trail of our identity. Busy web bots are never far behind and sweep up this information. The result of all of this is Big Data: massive volumes of data that are analyzed and used for a variety of reasons. But is there reason to be wary of leaving behind...

Big Data: definition and examples
Deleting a Google result and protecting personal data
Deleting personal data with Google
  • Digital law

The internet never forgets – is it always true? In some cases, search engines are obliged to grant users permission to delete defamatory search results. If Google displays personal data that is outdated or of no interest to the public, users can request the search engine to delete links to that data from the results pages permanently. But what exactly is the ‘Right to be Forgotten’ act, and when...

Deleting personal data with Google
Allocating directory rights with chmod
What is chmod?
  • Know-how

With Linux, access rights for directories and files are often set through the terminal where file owners can be defined and groups can be assigned. With the ‘chmod’ command, user classes can be assigned certain file rights. Access rights in the Unix file system can be changed in two different ways: symbolic or numeric. Find out more about both notation types here.

What is chmod?
What do EU cookie laws mean for you?
EU cookie laws and how they affect your business
  • Digital law

Cookies can be helpful business tools, but they often toe the data protection line dangerously. As a result of this tendency towards uncertainty, the EU has introduced a new cookie law to protect its users. This new policy will affect any US company that does online business with EU customers. What do website operators need to pay attention to when it comes to this new cookie law?

EU cookie laws and how they affect your business