Security

Ubuntu SSH
How to install and enable Ubuntu SSH
  • Configuration

There’s no way around the SSH security procedure if you want to enable secure remote connections to an Ubuntu system. OpenSSH from Ubuntu has an SSH server in the software package which fulfills all the important requirements. However, Ubuntu SSH is disabled by default, so it must be set up and activated first. We’ll tell you how to complete the installation.

How to install and enable Ubuntu SSH
Redundancy
What is redundancy in computer science?
  • Security

In IT, intentional redundancy protects storage systems and data centers from data loss and system failures. The duplication and repeated design of data sets, supply paths and technical components strengthen the resilience of databases and IT systems. Find out here how redundancy works, when it makes sense, and when it unintentionally becomes a hurdle.

What is redundancy in computer science?
How to use SSH tunnels
How to use SSH tunnels and SSH port forwarding
  • Security

SSH tunnels are used for secure data transfers and for accessing websites that you otherwise wouldn’t have access to via your network. Reverse SSH tunnels make port forwarding possible with private IP addresses. Keep reading our dedicated article to find out what SSH tunnels are, what they’re used for and how to set one up.

How to use SSH tunnels and SSH port forwarding
Security vulnerability: Log4Shell
What is Log4Shell? Causes and effects of the Java vulnerability
  • Security

A shock was felt around the world at the end of 2021 when the Log4Shell vulnerability became known to the public. Attackers were able to completely take over remote systems without much effort. All major companies and many of the most widely used services were affected by it. In our article, we’ll explain why Log4Shell was so disastrous, how the exploits work, and what protective measures are...

What is Log4Shell? Causes and effects of the Java vulnerability
How to Protect Access to your Cloud
Using cloud services securely
  • Security

In the digital age, we are increasingly resorting to cloud services: At work, people collaborate on projects together in the cloud, and in their free time, they share photos from their last vacation. At the same time, cloud storage is by no means free from security risks. The multi-cloud environments of larger companies, in particular, are becoming a challenge for cloud security. Here, we will...

Using cloud services securely
Data center tiers
Data center tiers explained
  • Know-how

What’s the difference between a tier 3 data center and a tier 4 data center? There are a number of different systems for classifying data centers and establishing national and international standards. Keep reading to find out about data center tiers, the most used standards, and international classification systems.

Data center tiers explained
Creating Mac Backups
How to create a Mac backup
  • Configuration

You can use the native software Time Machine to create a complete backup of your Mac computer in just a few steps. We’ll guide you through starting and running the backup process and show you other ways to back up data on Macs – from manual backups to cloud-based services.

How to create a Mac backup
General Data Protection Regulation: New rules for businesses
The EU General Data Protection Regulation (GDPR): summary, innovations and checklist
  • Digital law

Since May 25, 2018, a European law on data protection has been in place. However, despite it being relevant to day-to-day business, many companies and website operators are still unattuned to the General Data Protection Regulation (GDPR). On top of this, high fines are imposed on those violating the regulations. Here we summarize everything worth knowing on the EU GDPR for entrepreneurs and online...

The EU General Data Protection Regulation (GDPR): summary, innovations and checklist
Photo backup
What are the options for a photo backup?
  • Security

There are many ways to back up photos. Which solutions are best for backing up your own pictures? Ever-improving image qualities lead to larger image files, and that’s why cloud-based photo backups are coming more and more into focus. How safe is it to store your photos there and what advantages does the cloud have over conventional data carriers when it comes to image storage?

What are the options for a photo backup?
PostgreSQL backup
PostgreSQL backup with pg_dump and pg_restore
  • Security

Creating database backups is one of the standard tasks of web and system admins. Each database management system comes with its own tools for creating backups. PostgreSQL has the command line programs pg_dump and pg_restore. The command line interface psql is also used. We’ll present you with the most common backup scenarios with examples of the required code.

PostgreSQL backup with pg_dump and pg_restore