Security

Catfishing
How to recognize catfishing
  • Social media

A person who conceals their true identity by using fake profiles online is known as a “catfish”. While catfishing can be a harmless attempt to remain anonymous on dating platforms or social media, it can also be malicious. Catfishing often involves deceiving people through fake online identities, and it can lead to sensitive data being stolen.

How to recognize catfishing
WireGuard VPN: Basics
WireGuard VPN
  • Tools

Virtual private networks are becoming more and more popular among end users. However, the widespread VPN protocols are not optimized for modern use. With WireGuard, a lean alternative is now generally available. Boasting energy efficiency and low requirements on hardware, WireGuard could establish itself as the standard VPN solution of the future.

WireGuard VPN
The best online backup services
The best online backup services
  • Tools

Many people use several devices and have data stored on them. What should you do if your data carrier fails, or the data gets lost? Backing up data is extremely important, and an online backup makes perfect sense. By doing this, you don’t risk losing your important files. What is the best option? Here is a comparison of online backup service providers.

The best online backup services
Single sign-on
Single sign-on (SSO)
  • Tools

Online activity could be so simple – just enter your access data once and automatically be logged in for all accounts and services on the web, instead of having to remember dozens of passwords. This is, in fact, a reality for many websites, and the process is called SSO – single sign-on – and is becoming ever more popular among private and professional users. But what are the benefits of SSO, and...

Single sign-on (SSO)
Best cloud storage providers
The best cloud storage providers
  • Tools

Storing files online on a cloud platform has become part of everyday life for many people. Storing files with online storage providers takes the load off your hard drive and ensures that they are available anytime and from anywhere. But what are the best cloud storage providers on the market? And what differences are there between them? Which one would be best for me?

The best cloud storage providers
NGINX Password Authentication
Set up Password Authentication with NGINX
  • Configuration

Learn how to set up a basic HTTP authentication system. This will allow you to password protect particular directories on your website, so that they can only be accessed after logging in with a username and password.

Set up Password Authentication with NGINX
How to Protect Access to your Cloud
How to use cloud services securely
  • Security

In the digital age, we are increasingly resorting to cloud services: At work, people collaborate on projects together in the cloud, and in their free time, they share photos from their last vacation. At the same time, cloud storage is by no means free from security risks. The multi-cloud environments of larger companies, in particular, are becoming a challenge for cloud security. Here, we will...

How to use cloud services securely
QUIC – the Internet Transport Protocol based on UDP
QUIC: What is behind the experimental Google Protocol?
  • Technical matters

Quick UDP Internet Connections (QUIC for short), is an experimental network protocol from Google. Further development of the protocol is being driven by IETF, which has set up a dedicated group working towards it. The QUIC protocol is intended to offer a speed-optimized alternative to the current transport standard TCP and builds on the connectionless protocol UDP to achieve this.

QUIC: What is behind the experimental Google Protocol?
Hashing
What is hashing and how does it work?
  • Web development

How can you ensure quick and secure access to large amounts of data? This is an increasingly important question since both in our private lives and in business ever more data is being generated. To improve performance when exchanging data as well as the security of databases, we use cryptographic hashing. Read on to find out more.

What is hashing and how does it work?
What is phishing?
What is phishing? Get a rundown on the methods here
  • Security

Phishing is one of the oldest scams, existing since the dawn of cybercrime. It’s even more deceitful than trying to smuggle malware onto computers. Instead, you’ll receive emails from people you know or from banks or payment services trying to persuade you to give out personal payment or login data. Find out what is the meaning of phishing and what modern phishing methods are currently used from...

What is phishing? Get a rundown on the methods here