Security

How to identify phishing e-mails and protect your data

Identifying phishing e-mails: the telltale signs at a glance

Scammers send out dubious e-mails attempting to obtain sensitive data from internet users every day. This is known as phishing and isn’t just annoying; fraudulent e-mails cost millions each year as internet users fall victim to them. We reveal how to identify phishing e-mails and how to render your inbox harmless.

PHP 7.2

PHP 7.2 – end-of-life (EOL) on November 30, 2020

PHP 7.2 will not be supported much longer. Now is the time to take advantage of the time left before the end-of-life date and replace outdated versions with more recent PHP code. This will make sure security gaps are closed, bugs are fixed, and the performance of web offers won’t fall short. The longer you wait, the more effort will be needed to update websites with dynamic web content.

Create WordPress backup

How to back up your WordPress site

WordPress backups allow you to safeguard websites created with the WordPress content management system in the event of unintended data loss. You have the ability to regularly back up WordPress sites with the help of your provider or cloud service provider. On the other hand, a manual backup requires a little extra work but gives you full control.

Brute force attack: definition and protective measures

Brute force attacks: when passwords are served on a silver platter

Being constantly faced with headlines about stolen passwords, it’s understandable that many users are concerned. Your best bet is to make your passwords as complicated as possible and have them consist of many different types of characters. But even this won’t help if it’s the actual log-in area that isn’t secure enough. Even today, attackers are still successful with the notorious and simple...

Hash table

The hash table: fast database access to hash values

A hash table is created using the hash function. This is a method for reducing digital information in such a way that extensive data sets can be retrieved quickly in internet-based databases. This method also makes it possible to implement sophisticated security features using encryption when transferring data.

What is an operating system

What is an operating system?

Although we use them on a daily basis, few of us know how an operating system actually works and what this important piece of software is used for. PC, laptop, smartphone, or tablet – even some fridges are now equipped with an operating system such as Windows, macOS, iOS, Android, or one of many Linux distributions.

E-mail account hacked: what now?

E-mail account hacked: what now?

E-Mail accounts are one of our most important communication tools: we use them to register for online portals, for private and business exchanges, and as an organizer and digital address book. It is therefore all the more important to make sure your account is well-protected. But what if your e-mail account does get hacked? Our guide explains what methods internet criminals use to gain access to...

Shoulder surfing

Shoulder surfing – an underestimated threat?

Malicious hackers gain unauthorized access to sensitive data by identifying weaknesses in security mechanisms and exploiting them. However, technical skills are not always required to be able to steal data. This is the case for shoulder surfing which exploits the greatest weakness of every computer system and security measure – the human being.

Chrome Updates

What is Chrome 68?

Early next month, Chrome 68 will be launched and the new browser will distrust all webpages that do not have HTTPS encryption as “not secure”. This is a big step in the recent trend towards emphasizing user safety on the internet, a not entirely selfless strategy from Google. In this guide, we will explain what changes will be made, why they are happening, and how you can prepare your website...

TAN procedures

iTAN, mTAN, chipTAN? An overview of all TAN procedures

Security in online banking has always been a cornerstone of the industry – TAN procedures like chipTAN are what make it possible. However, there are also many other variants of this two-factor authentication system that can be used to protect your banking transactions. As they say, a chain is only as strong as its weakest link – and in this case, it’s the user. Find out which TAN procedures are...


Wait! We’ve got something for you!
Have a look at our great prices for different domain extensions.


Enter the web address of your choice in the search bar to check its availability.
.club
$1/1st year
then $15/year
.com
$1/1st year
then $15/year
.info
$1.60/1st year
then $20/year
.org
$1/1st year
then $25/year