Security

Creating Mac Backups
How to Back Up a Mac
  • Configuration

You can use the native software Time Machine to create a complete backup of your Mac computer in just a few steps. We’ll guide you through starting and running the backup process and show you other ways to back up data on Macs – from manual backups to cloud-based services.

How to Back Up a Mac
Securing a server: correctly configuring Linux, etc.
How to secure a server
  • Configuration

If you operate or rent your own server, it is your responsibility to protect it against failures and external access. You can immediately begin to set the foundation for this when configuring the server, if you have the necessary administrative rights. The correct settings can work wonders, especially with encrypted remote connections via SSH protocol, and greatly increase security.

How to secure a server
Single point of failure
What is a single point of failure (SPOF)?
  • Security

Single point of failure, or SPOF for short, is a dreaded system malfunction. A SPOF can lead to the failure of an entire system. In complex systems it can take considerable effort to detect the responsible SPOF. Our dedicated article explains the different types of SPOF and how to prevent them. Read on to find out more.

What is a single point of failure (SPOF)?
Outlook spam filter
Outlook spam filter: setting and customizing the junk filter
  • E-Mail security

The Outlook spam filter automatically moves unwanted and potentially fraudulent emails to the junk folder. Even junk mail that doesn’t meet the typical spam criteria can be kept out of your Outlook inbox with the right settings. In case of errors, the Outlook junk filter can be easily adjusted manually.

Outlook spam filter: setting and customizing the junk filter
WordPress: rename wp-login
How to change your admin URL in WordPress
  • Blogs

WordPress enjoys great popularity not only among users, but also among criminals. The high degree of distribution and known security vulnerabilities basically invite illegal attacks on data and information. A popular target: the WordPress admin login. Learn in our article what the general problem with the login page is and how to change your WP admin URL in WordPress.

How to change your admin URL in WordPress
WordPress cookie plugins
The best cookie consent plugins for WordPress
  • Blogs

WordPress cookie plugins are an important component of any WordPress project because they ensure cookie compliance with a country’s legal requirements. Unless you’re using only technical cookies that are necessary for your website to function, you should ask a user’s permission to collect their information via cookies when they visit your WordPress site. Discover the five best plugins to create...

The best cookie consent plugins for WordPress
Redundancy
What is redundancy in computer science?
  • Security

In IT, intentional redundancy protects storage systems and data centers from data loss and system failures. The duplication and repeated design of data sets, supply paths and technical components strengthen the resilience of databases and IT systems. Find out here how redundancy works, when it makes sense, and when it unintentionally becomes a hurdle.

What is redundancy in computer science?
How to use SSH tunnels
How to use SSH tunnels and SSH port forwarding
  • Security

SSH tunnels are used for secure data transfers and for accessing websites that you otherwise wouldn’t have access to via your network. Reverse SSH tunnels make port forwarding possible with private IP addresses. Keep reading our dedicated article to find out what SSH tunnels are, what they’re used for and how to set one up.

How to use SSH tunnels and SSH port forwarding
Security vulnerability: Log4Shell
What is Log4Shell? Causes and effects of the Java vulnerability
  • Security

A shock was felt around the world at the end of 2021 when the Log4Shell vulnerability became known to the public. Attackers were able to completely take over remote systems without much effort. All major companies and many of the most widely used services were affected by it. In our article, we’ll explain why Log4Shell was so disastrous, how the exploits work, and what protective measures are...

What is Log4Shell? Causes and effects of the Java vulnerability
General Data Protection Regulation: New rules for businesses
The EU General Data Protection Regulation (GDPR): summary, innovations and checklist
  • Digital law

Since May 25, 2018, a European law on data protection has been in place. However, despite it being relevant to day-to-day business, many companies and website operators are still unattuned to the General Data Protection Regulation (GDPR). On top of this, high fines are imposed on those violating the regulations. Here we summarize everything worth knowing on the EU GDPR for entrepreneurs and online...

The EU General Data Protection Regulation (GDPR): summary, innovations and checklist