Data Protection

Finding a website host: how to search successfully
Host: how to find out which provider is most suitable for your project
  • Technical matters

If you want to release a new web project today, you need to find the right host. Hosts have become a popular alternative for large companies, since they enable convenient outsourcing of certain work areas or data, saving company resources. But how do you know which host and which hosting package best meets your needs? And why is the provider’s security concept such a crucial criterion nowadays?

Host: how to find out which provider is most suitable for your project
Data mining: analysis methods for big data
Data mining: analysis methods for big data
  • Web analytics

The total amount of data generated worldwide increases by 40% every year. Many companies seek to make use of the constantly increasing mountain of data in order to increase their e-commerce business. But making use of such Big Data alone doesn’t add any value — enter data mining. Below you can find a discussion of the various analysis approaches involved in data mining, to give you an idea of how...

Data mining: analysis methods for big data
Tips for better website security
Website security: how to protect your web presence
  • Website creation

Would you leave your window open at night if you knew there were intruders lurking about? Obviously the answer to this question is ‘no’. Many companies and individuals leave their virtual window open to cyber criminals by not adequately protecting their websites. Website security is an extremely important topic. Only by regularly carrying out security checks and following the proper precautions...

Website security: how to protect your web presence
Terminal Servers – the Secret Behind Remote Hosts
Terminal servers: definition, basics, and advantages
  • Know-how

In the days of mainframe computers and the first smaller networks, terminals were a crucial building block for sharing hardware and software resources. It is no coincidence that terminal servers – the central administrative entity of such networks – are in demand decades later, now that applications are to be made available to multiple users.

Terminal servers: definition, basics, and advantages
The best Google Analytics alternatives
The best Google Analytics alternatives
  • Web analytics

Website tracking is very important in online marketing to be able to see how users are interacting on your site. The first choice is normally the tracking tool offered by the search engine, Google. But for data protection reasons, more and more users are looking for alternatives to Google Analytics. There’s a great selection of web analytics tools – we will examine applications with similar...

The best Google Analytics alternatives
E-Mail encryption with PGP
E-mail encryption: how PGP secures the content of your e-mails
  • E-Mail security

Online privacy is a sensitive issue that affects experts and amateurs alike. Whether you’re posting on social networks, carrying out banking transactions, or buying from an online store, your data is not always sufficiently protected. The same applies to e-mails. Don’t let cyber criminals get their hands on your content by encrypting your e-mails.

E-mail encryption: how PGP secures the content of your e-mails
S/MIME: the standard method for e-mail encryption
S/MIME: how to encrypt and sign your e-mails
  • E-Mail security

If you send an e-mail without additional security measures, it’s like sending a postcard: if everything goes as planned, the information should arrive unchanged and unread in the recipient’s inbox. However, if someone intercepts the card or the e-mail in transit, they can read the contents without any problem and make as many changes as possible. Just like you would use an opaque envelope to...

S/MIME: how to encrypt and sign your e-mails
E-mail account hacked: what now?
E-mail account hacked: what now?
  • E-Mail security

E-Mail accounts are one of our most important communication tools: we use them to register for online portals, for private and business exchanges, and as an organizer and digital address book. It is therefore all the more important to make sure your account is well-protected. But what if your e-mail account does get hacked? Our guide explains what methods internet criminals use to gain access to...

E-mail account hacked: what now?
What is a network attached storage (NAS)?
Network attached storage (NAS): the basics of network storage
  • Know-how

Growing sums of data require cost-effective, high-performance storage solutions. One option for fulfilling this requirement is a network attached storage. In business contexts, this model has already established itself as a viable alternative to file servers, hard drives, and the cloud. Private users have also caught on and use NAS systems at home. But what is a NAS? Read on, and we’ll show you...

Network attached storage (NAS): the basics of network storage
clear cookies
Deleting cookies: how to clear stored data
  • Website creation

Some cookies can be very helpful – they let you sleep on those impulse purchases and keep them from disappearing out of your shopping cart, or log into social media sites with just one click. But not all cookies make surfing the web easier, and some may even forward unwanted information to third parties. It is a good idea to learn how to clear cookies, and this guide will show you how to clear...

Deleting cookies: how to clear stored data