Network

DNSSEC – authenticated name resolution

DNSSEC: internet standards for authenticated name resolution

Without the Domain Name System, users of the World Wide Web would have serious problems when trying to load websites and other online presences. It’s only thanks to this system that internet addresses appear in their trusted text format: they’re actually nothing more than combinations of numbers. The communication between browser and name server responsible for this isn’t actually as secure as you...

The best WhatsApp alternatives

The best WhatsApp alternatives

Invitations to dinner parties; updates about work; an excursion with the uni football team: if you’re not using WhatsApp, you run the risk of missing out on important information. With more than a billion worldwide users to date, the app is more popular than almost any other on the market. But this networking comes with its disadvantages too: the main one being that WhatsApp shares user data with...

The different network types

Network types at a glance

When several computers are connected to one another it is known as a network. Networks enable data exchange between different devices, making shared resources available. Different network types are implemented depending on which transmission techniques and standards are used. These differ in terms of the number of connected systems and potential reach.

How companies use social selling

Social selling: business relations on the social net

Purchasing decisions are rarely made out of the blue. Customers usually go through a decision-making phase, during which it’s up to the company to convince the customer of their need for the product. This is most effective when you present yourself and your products as trustworthy and honest as possible – particularly on social networks, where your target group conducts research, asks for...

SQL injection: Fundamentals and safeguards

SQL Injection: Protect your database system

There are daily reports on how security gaps in applications are exploited – because hardly a day goes by without a new gap being discovered or a known gap being closed. One attack method, which has always been based on exploiting such weak points, is called SQL injection. But what is actually hidden behind the malicious database exploitation and how can you protect your database system from it?

Skype alternatives

The best alternatives to Skype: 13 free applications for video calls

For millions of people around the world, video chats and conferences are an essential part of daily life – for both work and leisure. When it comes to video telephony software and applications, Skype is one of the pack leaders. In fact, many people are unaware that there’s a considerable number of good alternatives to Skype on the market. Some of these programs even boast extra features that can’t...

Social engineering – the security gap at ‘layer 8’

Social engineering: human vulnerability exploited

The most effective system break-ins often happen without a scene. Instead of disrupting central network devices with DDoS attacks or sneaking through onto operating systems with Trojan horse techniques, hackers increasingly try to exploit the human security gap. There are various such methods that fall within the broader category of social engineering: a technique that sees hackers gather publicly...

What does ‘502 bad gateway’ mean?: Explanation and solution

Error 502 Bad Gateway: Where’s the problem?

HTTP status codes emerge when something isn’t running properly on the internet. In this respect, the 502 Bad Gateway error is no exception. But this familiar error message can be particularly tricky: It’s not actually clear where the source of the problem lies. In the chain of gateways along which internet requests run, the error could occur at a number of different points. This article explains...

Telnet – the system-wide remote protocol

What is telnet?

Remote access to remote computer systems has always been a part of well-organized networks. Administrators can manage individual users as well as work on the move since a remote connection enables access to company data. One of the first protocols developed specifically for this purpose was Telnet.

Headless CMS: What are the benefits?

Get more from your own content with headless CMS

If you want to juggle more than one channel with your content management system, you’ll quickly reach the limits. A classic CMS offers many simplifications, but at the same time is limited with its design options. For this reason, content creators sometimes rely on another solution: a headless CMS. This separates the frontend from the backend so that different websites and mobile apps can be...

1