Data Protection

General Data Protection Regulation: New rules for businesses
The EU General Data Protection Regulation (GDPR): summary, innovations and checklist
  • Digital law

Since May 25, 2018, a European law on data protection has been in place. However, despite it being relevant to day-to-day business, many companies and website operators are still unattuned to the General Data Protection Regulation (GDPR). On top of this, high fines are imposed on those violating the regulations. Here we summarize everything worth knowing on the EU GDPR for entrepreneurs and online...

The EU General Data Protection Regulation (GDPR): summary, innovations and checklist
Online identity theft protection
Online identity theft protection
  • Website creation

Many only know internet identity theft and similar crimes from movies or television. But stories of online fraudsters are not just mere phantasies of screenwriters; for many the experience is all too real. Online identity theft has become more and more of a problem over the past few years, and everyone is a potential victim. We have compiled some preventative steps than can help you stay out of...

Online identity theft protection
What are session cookies?
What are session cookies?
  • Technical matters

What are session cookies and what’s their purpose when surfing the internet? Compared to regular persistent cookies, session cookies are temporarily stored on a device. That means once you close down your browser, they are automatically deleted. Since these cookies are essential in order to browse websites, they are permitted under the GDPR.

What are session cookies?
Protect WordPress admin-login with htaccess
How to protect WordPress login with .htaccess
  • Blogs

Learn how to effectively protect the administration area of your WordPress blog from hackers and brute force attacks with .htaccess directory protection.

How to protect WordPress login with .htaccess
Server Name Indication
Server Name Indication (SNI): What’s behind the standard?
  • Know-how

What is server name identification, really? Encryption technologies play a big role when it comes to surfing on the net. Credit card data and other personal information must not fall into the hands of criminals. For now, TLS is one of the protocols used for this purpose. But it has a disadvantage: it only functions when each IP address only hosts one domain. If multiple virtual services are...

Server Name Indication (SNI): What’s behind the standard?
Introduction to netstat
Introduction to netstat: what is netstat and how does it work?
  • Tools

Various computer networks are connected with one another via the Internet. In order to build up such connections, both the sending as well as the receiving systems have to provide transfer interfaces, or ports. The command line program netstat allows you to find out which ports are opened by your own system and which active connections exist — all of this helps reduce the risk of undesired access...

Introduction to netstat: what is netstat and how does it work?
RAID level comparison
RAID level: the most important RAID concepts compared
  • Security

When combining hard disks in a RAID, you can choose between different standard setups called RAID levels. The predefined combinations determine the arrangement of individual hard disks and methods to store data in a RAID network. But what are the approaches of the most important RAID levels? And which one should you use?

RAID level: the most important RAID concepts compared
WeTransfer alternatives
WeTransfer alternatives
  • Tools

Those who have previously worked with WeTransfer, will be all too familiar with its basic principle: users can share large files without logging in or installing software. All you need to enter is the recipient’s email address. This was revolutionary when the platform first launched. However, nowadays numerous WeTransfer alternatives are available.

WeTransfer alternatives
The best PayPal alternatives
The best alternatives to PayPal at a glance
  • Online sales

Americans love shopping online because it’s so convenient. Until recently, online payment systems were heavily dominated by one industry heavyweight: PayPal. But not everyone is enthused by this payment method, having been criticized for both security as well as data protection issues. Fortunately, there are plenty of PayPal alternatives out there. We’ll introduce a few here.

The best alternatives to PayPal at a glance
RSA cryptosystems
How do RSA cryptosystems work?
  • Security

RSA encryptions are asymmetric encryptions and are put to use in many areas of digital data transfers because they can be easily used but not easily decrypted with an algorithm. Here, we explore how RSA keys work, what they are used for, and in which fields RSA cryptosystems can also be useful. Read on to find out more.

How do RSA cryptosystems work?