Security

Securing a server: correctly configuring Linux, etc.

The right configuration to secure your server

If you operate or rent your own server, it is your responsibility to protect it against failures and external access. You can immediately begin to set the foundation for this when configuring the server, if you have the necessary administrative rights. The correct settings can work wonders, especially with encrypted remote connections via SSH protocol, and greatly increase security.

Creating an IT disaster recovery plan

For when the going gets tough: the IT disaster recovery plan

For businesses, a reliable IT infrastructure is just as integral to day-to-day operations as competent management, productive employees, and reasonable working conditions. A server outage is able to paralyze an entire company. Adequate preparation can help prevent some of the most common errors from occurring; unforeseen risks, however, will always remain a factor. In order to be on top of your...

Google account recovery

How can I recover my Google account?

So, you deleted your Google account but have since decided that you still want to use it? Don’t worry! We’ll show you how to recover your Google account. Providing you deleted your account recently the account recovery process is fairly simple. In fact, there are several options for restoring your data.

Comparison of the best antivirus programs

Antivirus software: Which software is best?

Antivirus software has sadly become indispensable as new types of threats against your system emerge regularly. Viruses, worms, Trojan horses, and many other types of malware threaten to infect your system and could cause significant damage. To counteract these threats, software makers try to fight off malware attacks with intelligent antivirus programs. Find out which rank top in our antivirus...

Turn off Windows Defender

How to turn off Windows Defender

Windows Defender is free and reliable virus protection provided by Microsoft. It comes pre-installed and activated on all new PCs running Windows 10. But if you’d prefer to use products from other security providers, you should first disable Windows Defender. That’s because multiple antivirus programs running at the same time can block each other in some instances.

SQL injection: Fundamentals and safeguards

SQL Injection: Protect your database system

There are daily reports on how security gaps in applications are exploited – because hardly a day goes by without a new gap being discovered or a known gap being closed. One attack method, which has always been based on exploiting such weak points, is called SQL injection. But what is actually hidden behind the malicious database exploitation and how can you protect your database system from it?

Client to Authenticator Protocol (CTAP)

CTAP: A protocol for more security & convenience on the web

Try and imagine a world where you don’t have to memorize passwords: Thanks to FIDO2, this could soon become a reality. Authentication in online stores or for online banking can be done through a fingerprint or hardware token. The latter can communicate with laptops of PCs through a USB, NFC or Bluetooth. To enable conversations between two devices, FIDO2 uses the Client to Authenticator Protocol...

Zero-day exploit

Zero-day exploit: Explanation and protection measures

The risk for businesses to fall victim to a zero-day exploit has increased in recent years. More and more often, cybercriminals can take advantage of as-yet undiscovered weak points in business software in order to steal or manipulate data. It is difficult to protect against these attacks, but businesses can take some measures to improve their security.

What is a reverse proxy?

Reverse proxy server – core components in security architecture

Cyber criminality is a big issue for most companies’ IT departments. Online attacks threaten the security of private networks and cause millions of dollars of damage per year. Popular targets are servers that provide online services and therefore require a permanent internet connection. An extra layer of security can be applied by using an upstream network component – the reverse proxy. This...

Best cloud storage providers

The best cloud storage providers – an overview of the best online storage

Storing files online on a cloud platform has become part of everyday life for many people. Regardless if it’s your own holiday photos, or important documents for work - storing files with online storage providers takes the load off your hard drive, and also ensures that they are available anytime and from anywhere. But what are the best cloud storage providers on the market? And what differences...


Wait! We’ve got something for you!
Have a look at our great prices for different domain extensions.


Enter the web address of your choice in the search bar to check its availability.
.club
$1/1st year
then $15/year
.com
$1/1st year
then $15/year
.info
$1.60/1st year
then $20/year
.org
$1/1st year
then $25/year