Security

RAID 5
What is RAID 5?
  • Security

A Redundant Array of Independent Disks (RAID) can be used to improve data security or the performance of storage solutions. The specific advantages of a network depend on the selected RAID level. Find out how RAID 5 – a system of three or more hard drives – can improve security and throughput rate.

What is RAID 5?
RAID 10
What is RAID 10?
  • Security

RAIDs are a good solution for improving the performance of hard drives. The individual standardized levels provide different approaches to boost reliability or the throughput rate of system networks. RAID 10 relies on complete data redundancy. Data is stored in a distributed manner and can be read quickly. Find out what’s behind the RAID level!

What is RAID 10?
RAID 1
RAID 1
  • Security

Hardly a storage concept embodies the RAID principle (Redundant Arrays of Independent Disks) as well as RAID 1 in which two or more hard disks are linked to save copies of data for access in case of system failure. Find out more about RAID 1 and why mirroring makes this network so special.

RAID 1
RAID 0
What is RAID 0?
  • Security

A Redundant Array of Independent Disks, or RAID for short, is a combination of several hard disks to form a single logical drive. Systems like these typically follows a redundant storage concept for higher security. The standard RAID 0 is an exception because it only seeks to optimize the data throughput by coupling several hard drives.

What is RAID 0?
Public key encryption
What is Asymmetric encryption?
  • Security

If you want to secure your digital data with the best possible protection, there is no getting around the issue of encryption. For example, asymmetric cryptography plays an essential role in secure data transfer. Here, you will learn how it works, how it is different from traditional symmetric encryption, and where it is used.

What is Asymmetric encryption?
Photo backup
How to backup photos
  • Security

There are many ways to back up photos. Which solutions are best for backing up your own pictures? Ever-improving image qualities lead to larger image files, and that’s why cloud-based photo backups are coming more and more into focus. How safe is it to store your photos there and what advantages does the cloud have over conventional data carriers when it comes to image storage?

How to backup photos
OAuth
OAuth (Open Authorization)
  • Security

The “pathway to hell” – this is how Eran Hammer-Lahav once called the security protocol OAuth 2.0, on which he himself had worked for years. Others, however, use the service without issue. It enables users to use data and functions across multiple platforms in multiple services – for example, with the convenient single sign-on – using secure API authorization. But how exactly does OAuth2 work and...

OAuth (Open Authorization)
Move Google Authenticator to a new phone
How to transfer Google Authenticator to a new phone
  • Security

Secured your Google account with the Google Authenticator app and now want to switch phones? No problem. You can simply move the app or account link. Read on to find out how to transfer Google Authenticator to your new phone and what you need to consider when moving to a new number or keeping your existing one.

How to transfer Google Authenticator to a new phone
Manage passwords in Chrome
How to manage Passwords in Google Chrome
  • Security

A forgotten password quickly becomes a problem if it is not written down anywhere. Google does offer ways to recover forgotten passwords. However, it is better not to let it happen in the first place. The solution: Use the integrated password manager to manage passwords in Chrome or use an alternative password manager app.

How to manage Passwords in Google Chrome
Man-in-the-middle attack: an overview of attack patterns
Man-in-the-middle attack
  • Security

A man-in-the-middle attack is a deceitful espionage attack which aims to listen, record, or manipulate sensitive data being sent between unsuspecting internet users. To do this, hackers rely on methods that enable them to position themselves, unnoticed, between two or more computers communicating with one another. We introduce you to some well-known attack patterns and countermeasures that can be...

Man-in-the-middle attack