Encryption

What is a VPN (virtual private network)?
  • Know-how

VPN implementations offer an affordable alternative for locally connecting networks, as well as making network resources available for external devices. In contrast to corporate networks, no private communication network is required. Instead, like the internet, VPNs rely on networks, and protect sensitive data through a process known as tunneling.

Remove PDF password
  • Online sales

Encryption, password protection, access authorization – there’s no shortage of security features when it comes to PDF files. But what if you’ve protected a file and want to restore your original settings? We’ll show you how to remove a PDF password created with PDF24 Creator and undo the defined user restrictions.

Password protect pdf
  • Online sales

Due to its platform independence and the option to combine text and images with navigation aids in one document, the PDF format has been one of the most popular file formats for years. But when it comes to the security of the files, the same applies as to all other digital files: Only by password protecting PDFs is the information contained in the file secured. But how do you encrypt a PDF?

QUIC – the Internet Transport Protocol based on UDP
  • Technical matters

Quick UDP Internet Connections (QUIC for short), is an experimental network protocol from Google. Further development of the protocol is being driven by IETF, which has set up a dedicated group working towards it. The QUIC protocol is intended to offer a speed-optimized alternative to the current transport standard TCP and builds on the connectionless protocol UDP to achieve this.

Finding a website host: how to search successfully
  • Technical matters

If you want to release a new web project today, you need to find the right host. Hosts have become a popular alternative for large companies, since they enable convenient outsourcing of certain work areas or data, saving company resources. But how do you know which host and which hosting package best meets your needs? And why is the provider’s security concept such a crucial criterion nowadays?

Intrusion detection systems and prevention systems
  • Security

A stable network is characterized not only by the appropriate hardware structures, but also by a watertight security concept. In addition to back-up solutions and intelligent fail-safe systems, protection against external access attempts is a must. Intrusion detection systems (IDS) and intrusion protection systems (IPS) are an excellent addition to the classic firewall and are therefore a sensible...

IP Spoofing: Fundamentals and counter-measures
  • Security

Sending data over networks is one of the most important and highest utilized functions of the modern computer era. But the structure of the necessary TCP/IP connections makes it all too easy for criminals to intercept data packets along their way and either view or alter their contents. One of the most common methods of attack is IP spoofing, which allows DoS and DDoS attacks, among other things...

What is MAC spoofing?
  • Know-how

MAC spoofing is a method by which unique hardware addresses are masked using a Locally Administered Address (LAA) in the software. MAC spoofing can offer protection for your privacy when using public LAN or WLAN networks, but can also be used for illegal network activities. We explain to you here how MAC spoofing works and which settings in Windows must be accessed in order to change your MAC...

Spear phishing
  • E-Mail security

Internet users are constantly the target of cyberattacks. Most attacks are easy to fend off, but a new form of scam has proven to be especially dangerous. Spear phishing messages don’t contain absurd claims or bad spelling. These deceitful messages target specific individuals and look frighteningly real. How do these attacks work?