Security

What is credential stuffing?
What is Credential Stuffing?
  • Security

There are billions of stolen logins circulating on the dark web today. Hackers use these combinations of logins and passwords to break into user accounts and steal sensitive data using a technique known as “credential stuffing”. To protect your data, you need to know how credential stuffing works and what countermeasures you can take to protect yourself.

What is Credential Stuffing?
What is a rootkit?
What is a Rootkit?
  • Security

If you ask the IT community which malware is the most harmful, the answer is typically not viruses, worms or Trojan horses. Experts unanimously agree that rootkits pose much greater problems even to experienced users. The rootkit’s special ability is to conceal other malware and thereby enable cybercriminals to misuse others’ computers for their own criminal activities undetected – such as for bot...

What is a Rootkit?
What is a firewall?
What is a firewall?
  • Security

A firewall provides effective protection against viruses and other malware that attempts to infect your computer. However, it needs to be properly configured to do so. In the following article, you will learn how to do this, how a firewall works, and what its limitations are.

What is a firewall?
What is a demilitarized zone?
What is a DMZ (Demilitarized zone) in Network Security?
  • Security

Companies hosting their own websites, an online shop, or e-mail inboxes should make sure to separate the corresponding server of these from the local network. This makes it possible to protect devices within the company network from hacker attacks that take place on public networks. Solid protection comes in the form of a demilitarized zone, which separates endangered systems from sensitive...

What is a DMZ (Demilitarized zone) in Network Security?
What is a botnet?
What are Botnets?
  • Security

Botnets are tricky to spot, but they’re all over the internet and they cause all kinds of damage every day. They lurk inconspicuously in the background and use millions of private computers for malicious purposes. This guide explains how botnets work, how to keep them away, and how you can avoid falling victim to an illegal network.

What are Botnets?
What is a backup?
What is a Backup?
  • Security

Technical issues, hacker attacks, and malware can lead to costly and serious data loss at any time. To minimize the risks, it is recommended that you perform regular comprehensive backups. It is important to have a suitable backup strategy that properly meets your specific requirements.

What is a Backup?
WebAuthn
WebAuthn (Web Authentication)
  • Security

Passwords have long ceased to offer sufficient protection when surfing the internet: They are easy to crack, easily tapped, and difficult to remember. Together with the FIDO Alliance, the World Wide Web Consortium has developed a new standard. WebAuthn is intended to make logging into social media or online shopping portals easier and safer. How does it work?

WebAuthn (Web Authentication)
VPN Windows 10
How to set up VPN in Windows 10
  • Security

Want to use a secure, encrypted connection or access your company or home network while on the road? A VPN connection on Windows 10 is the solution. VPN connections route your encrypted data through a secure tunnel and provide improved data security. Learn all you need to know for setting up a VPN in Windows 10.

How to set up VPN in Windows 10
Using SSH keys for your network connection
How to use SSH keys
  • Security

Operating and managing a remote server located in a data center is often carried out by using a secure network connection provided by the SSH protocol. The necessary registration on the server is preceded by an authentication process. Usually this occurs in the form of the username and password. Alternative methods such as the public key authentication used by SSH, do have their advantages. But...

How to use SSH keys
TOTP
What is TOTP? (Time-based one-time password)
  • Security

Data leaks and hacker attacks mean that internet security is becoming increasingly important for users. Standard passwords based on names and dates of birth can be cracked in seconds and give criminals access to all kinds of accounts. In combination with multi-factor authentication, TOTP can provide a solution: a password which is only valid for a short time. How does this work?

What is TOTP? (Time-based one-time password)