Security

Facebook account hacked: How to get your account back

Facebook account hacked: How to get your account back

  • Social media

Increasing cybercrime is making itself felt on social networks. Social media sites such as Facebook are integrated into everyday private and professional life and offer an ideal target for attack due to the large amount of personal data. Here’s what to do if your Facebook account has been hacked and your password was changed.

Facebook account hacked: How to get your account back
Denial of Service (DoS) attacks

Denial of Service (DoS) attacks

  • Know-how

Denial of service attacks – also called DoS attacks – are a relatively simple and effective method for cyber criminals to bring down a website, email traffic, or an entire network. Besides businesses, institutions such as the German parliament or Wikipedia have been victims of these types of attacks. This has raised the question: What exactly is denial of service, and what happens during an…

Denial of Service (DoS) attacks
SFTP (SSH File Transfer Protocol)

SFTP (SSH File Transfer Protocol)

  • Know-how

Using SSH File Transfer Protocol (SFTP), you can transfer data bidirectionally within an authorized group of people in a particularly secure way. The transfer between the client and server takes place via an encrypted IP-based data tunnel. The basic File Transfer Protocol (FTP) has major security vulnerabilities, which were eliminated in the refined SSH File Transfer Protocol.

SFTP (SSH File Transfer Protocol)
What is the Server Name Indication (SNI)?

What is the Server Name Indication (SNI)?

  • Know-how

What is server name identification, really? Encryption technologies play a big role when it comes to surfing on the net. Credit card data and other personal information must not fall into the hands of criminals. For now, TLS is one of the protocols used for this purpose. But it has a disadvantage: it only functions when each IP address only hosts one domain. If multiple virtual services are…

What is the Server Name Indication (SNI)?
Port Scanning

Port Scanning

  • Know-how

It’s easy to lose track of all the different programs that are responsible for inbound and outbound data traffic.

Networks hosting a large number of computer systems that are constantly communicating with online services often require technical backup. High-performance tools check the activities of various applications or computers and can close existing security gaps. Using port scanners is one…

Port Scanning
How to do a Penetration Test

How to do a Penetration Test

  • Know-how

The more complex a network is, the more vulnerable it is to attacks. In times when customers and partners have access to internal network structures via the internet, and can control various applications via web interfaces, IT employees are encountering more and more problems. Large companies, in particular, prefer to use penetration testing to check how well their security concept works. This…

How to do a Penetration Test
DDoS attacks

DDoS attacks

  • Know-how

´It is very important for a server service to always be available since this is directly related to an online company’s success. Many servers are susceptible to DoS and DDoS attacks, which cause overloads and trigger costly crashes . But which patterns do these attacks follow and which counter measures can be put into place in order to protect critical systems from being targeted?

DDoS attacks
Data center tiers

Data center tiers

  • Know-how

What’s the difference between a tier 3 data center and a tier 4 data center? There are a number of different systems for classifying data centers and establishing national and international standards. Keep reading to find out about data center tiers, the most used standards, and international classification systems.

Data center tiers
The IT disaster recovery plan

The IT disaster recovery plan

  • Know-how

For businesses, a reliable IT infrastructure is just as integral to day-to-day operations as competent management, productive employees, and reasonable working conditions. A server outage is able to paralyze an entire company. Adequate preparation can help prevent some of the most common errors from occurring; unforeseen risks, however, will always remain a factor. In order to be on top of your…

The IT disaster recovery plan
Ransomware, adware, etc. – how can you protect yourself?

Ransomware, adware, etc. – how can you protect yourself?

  • Security

The internet is a playground for cybercriminals and fraudsters – for many, this is an annoying and frightening reality. The threats from unwanted software range from harmless advertising to trojans, which can paralyze complete computer networks. The forms of malicious software or malware are diverse, the countermeasures often very simple. In our article, you can read about how ransomware, spyware,…

Ransomware, adware, etc. – how can you protect yourself?
We use cookies on our website to provide you with the best possible user experience. By continuing to use our website or services, you agree to their use. More Information.