The EU plans to significantly tighten data security online: With the ePrivacy Regulation, the collection of personal data will only be allowed following explicit allowance. At this point, it’s not certain what exactly will be included in the ePrivacy Regulation: Here, we’ve consolidated what we already know. In this way, you can develop strategies now for complying with the regulation’s...ePrivacy Regulation and its shadow! What to expect
Data protection and security in the area of e-commerce can be particularly tricky. Users are constantly leaving behind traces online - regardless of whether they are making online orders or simply surfing the web. Consumer data can be of great interest to businesses. It gives them the opportunity to advertise and make offers to potential customers. But which data are you actually allowed to...Data protection in e-commerce
A proxy server is a network component that provides an interface between a private network and the internet. A proxy makes it possible to have an influence on the data traffic, to cache packet data, and to conceal the identity of the communication partners by using different IP addresses.What is a proxy server?
Combining hard drives to form a RAID is an attractive solution to optimize the performance and security of individual drives. One such approach that’s been hailed for its high safety factor is the RAID 6 technology. As an extension to the popular RAID 5 level, this network protects from data loss when two hard drives fail – all without having to duplicate your data manually.RAID 6: Storage technology to minimize data loss
When the RAID concept was first introduced in the late 1980s, it was primarily intended as an alternative to high cost hard drives on mainframes. While the issue of cost has shifted somewhat into the background, RAID storage systems are still in demand because of their high reliability in a server environment. What’s behind the technology and what are the various RAID levels?What is RAID (Redundant Array of Independent Disks)?
With Google Authenticator, you can combine classic username and password login to your WordPress site with an additional security code. Find out how to increase the security of your website in this handy article.Protect your WordPress user account with Google Authenticator
Learn how to change your WordPress username and password. With this guide we will show you how to easily change your WordPress username and/or password.How to Change Your WordPress Username and Password
ModSecurity is a free web application firewall (WAF) which is a simple, powerful way to protect a server against web-based malware and hacking attempts. Learn how to install ModSecurity and the officially-recommended OWASP Core Rule Set (CRS) which will protect a server against malware and hacking in the form of SQL injection, session hijacking, cross-site scripting, Trojans, and many other forms...Use the ModSecurity Apache Module on a Cloud Server with Ubuntu 16.04
Learn how to password protect a directory using Apache's basic HTTP authentication. This method will allow you to set up a restricted area of your website which will require a username and password for access.Password Protect a Directory with Apache