Security

WebAuthn

WebAuthn (Web Authentication)

Passwords have long ceased to offer sufficient protection when surfing the internet: They are easy to crack, easily tapped, and difficult to remember. Together with the FIDO Alliance, the World Wide Web Consortium has developed a new standard. WebAuthn is intended to make logging into social media or online shopping portals easier and safer. How does it work?

Ping of death

Ping of death

The ping of death was a cause for alarm in the early days of the Internet: A malicious hacker could cause a remote system to crash with a simple ping command. Keep reading to find out how the attack works on a technical level and why you don’t have to worry about it today.

SYN flood

SYN flood attack: variants and countermeasures

The attack pattern of a SYN flood attack has been known since the early years of the World Wide Web. Over time, new attack variants and appropriate protective measures have arisen. DDoS attacks with massive data flows originating from botnets are currently the norm. Learn how SYN flood attacks work. We will explain the concepts of these attacks and countermeasures.

WordPress cookie plugins

WordPress cookie plugins – the top 4 opt-in solutions

WordPress cookie plugins are an important component of any WordPress project because they ensure cookie compliance with a country’s legal requirements. Unless you’re using only technical cookies that are necessary for your web page to function, you should ask users permission to collect their information via cookies when they visit your WordPress page. Discover the four best plugins to create...

Ping flood

Ping flood

The ping flood is a type of denial-of-service attack that can affect commercial providers and home users alike. This attack relies on the ICMP protocol and the ping command. In order to unleash a particularly powerful flood, attackers often use a network of bots. Learn how the ping flood works and how you can protect yourself from one.

What is DoS (denial of service)?

Denial of service: what happens during a DoS attack?

Denial of service attacks – also called DoS attacks – are a relatively simple and effective method for cyber criminals to bring down a website, email traffic, or an entire network. Besides businesses, institutions such as the German parliament or Wikipedia have been victims of these types of attacks. This has raised the question: What exactly is denial of service, and what happens during an...

Finding a website host: how to search successfully

Host: how to find out which provider is most suitable for your project

If you want to release a new web project today, you need to find the right host. Hosts have become a popular alternative for large companies, since they enable convenient outsourcing of certain work areas or data, saving company resources. But how do you know which host and which hosting package best meets your needs? And why is the provider’s security concept such a crucial criterion nowadays?

Windows 7: End of Life

Windows 7 end of support: What do you need to do?

Even years after it was first released, Windows 7 continues to be one of the favorite operating systems worldwide. But with Microsoft announcing the end of its support for Windows 7, many PC users will need to upgrade or look for an alternative. But just because Windows 7 has reached the end of its life doesn’t mean the software is no longer working. Windows 7 EOL means that Microsoft will no...

Intrusion detection systems and prevention systems

The intrusion detection and intrusion prevention systems at a glance

A stable network is characterized not only by the appropriate hardware structures, but also by a watertight security concept. In addition to back-up solutions and intelligent fail-safe systems, protection against external access attempts is a must. Intrusion detection systems (IDS) and intrusion protection systems (IPS) are an excellent addition to the classic firewall and are therefore a sensible...

Turn on Windows Defender

Turn on Windows Defender for basic protection

Windows Defender is Microsoft’s free antivirus software that allows users to protect their PC from harmful programs and cyberattacks. Defender now comes preinstalled on most Windows machines. In the past, it has attracted criticism, but with the roll-out of Windows 10, it provides good baseline protection. Turning on Windows Defender enables you to use a range of modern antivirus features to...


Wait! We’ve got something for you!
Have a look at our great prices for different domain extensions.


Enter the web address of your choice in the search bar to check its availability.
.club
$1/1st year
then $15/year
.com
$1/1st year
then $15/year
.info
$1.60/1st year
then $20/year
.org
$1/1st year
then $25/year