Security

What is DoS (denial of service)?
Denial of Service (DoS) attacks
  • Know-how

Denial of service attacks – also called DoS attacks – are a relatively simple and effective method for cyber criminals to bring down a website, email traffic, or an entire network. Besides businesses, institutions such as the German parliament or Wikipedia have been victims of these types of attacks. This has raised the question: What exactly is denial of service, and what happens during an...

Denial of Service (DoS) attacks
SFTP (SSH File Transfer Protocol)
SFTP (SSH File Transfer Protocol)
  • Know-how

Using SSH File Transfer Protocol (SFTP), you can transfer data bidirectionally within an authorized group of people in a particularly secure way. The transfer between the client and server takes place via an encrypted IP-based data tunnel. The basic File Transfer Protocol (FTP) has major security vulnerabilities, which were eliminated in the refined SSH File Transfer Protocol.

SFTP (SSH File Transfer Protocol)
Server Name Indication
What is the Server Name Indication (SNI)?
  • Know-how

What is server name identification, really? Encryption technologies play a big role when it comes to surfing on the net. Credit card data and other personal information must not fall into the hands of criminals. For now, TLS is one of the protocols used for this purpose. But it has a disadvantage: it only functions when each IP address only hosts one domain. If multiple virtual services are...

What is the Server Name Indication (SNI)?
Port scanning: introduction and basics
Port Scanning
  • Know-how

It’s easy to lose track of all the different programs that are responsible for inbound and outbound data traffic. Networks hosting a large number of computer systems that are constantly communicating with online services often require technical backup. High-performance tools check the activities of various applications or computers and can close existing security gaps. Using port scanners is one...

Port Scanning
Penetration testing – the complete network check
How to do a Penetration Test
  • Know-how

The more complex a network is, the more vulnerable it is to attacks. In times when customers and partners have access to internal network structures via the internet, and can control various applications via web interfaces, IT employees are encountering more and more problems. Large companies, in particular, prefer to use penetration testing to check how well their security concept works. This...

How to do a Penetration Test
DoS and DDoS: attack patterns at a glance
DDoS attacks
  • Know-how

´It is very important for a server service to always be available since this is directly related to an online company’s success. Many servers are susceptible to DoS and DDoS attacks, which cause overloads and trigger costly crashes . But which patterns do these attacks follow and which counter measures can be put into place in order to protect critical systems from being targeted?

DDoS attacks
Data center tiers
Data center tiers
  • Know-how

What’s the difference between a tier 3 data center and a tier 4 data center? There are a number of different systems for classifying data centers and establishing national and international standards. Keep reading to find out about data center tiers, the most used standards, and international classification systems.

Data center tiers
Creating an IT disaster recovery plan
The IT disaster recovery plan
  • Know-how

For businesses, a reliable IT infrastructure is just as integral to day-to-day operations as competent management, productive employees, and reasonable working conditions. A server outage is able to paralyze an entire company. Adequate preparation can help prevent some of the most common errors from occurring; unforeseen risks, however, will always remain a factor. In order to be on top of your...

The IT disaster recovery plan
Protection against ransomware, spyware, and scareware
Ransomware, adware, etc. – how can you protect yourself?
  • Security

The internet is a playground for cybercriminals and fraudsters – for many, this is an annoying and frightening reality. The threats from unwanted software range from harmless advertising to trojans, which can paralyze complete computer networks. The forms of malicious software or malware are diverse, the countermeasures often very simple. In our article, you can read about how ransomware, spyware,...

Ransomware, adware, etc. – how can you protect yourself?
Anonymous
What is the hacker collective Anonymous?
  • Security

Supposedly fun mass attacks on people who were easy targets used to be organized on image boards like 4chan. These are the beginnings of Anonymous, but they don’t have much in common with the collective’s actions today. Political commitment is the group’s main aim nowadays. Anonymous are known for wearing the Guy Fawkes mask. But beware, it’s not always Anonymous behind every mass attack.

What is the hacker collective Anonymous?