Security

TAN procedures

iTAN, mTAN, chipTAN? An overview of all TAN procedures

Security in online banking has always been a cornerstone of the industry – TAN procedures like chipTAN are what make it possible. However, there are also many other variants of this two-factor authentication system that can be used to protect your banking transactions. As they say, a chain is only as strong as its weakest link – and in this case, it’s the user. Find out which TAN procedures are...

punycode

Punycode

Since the introduction of internationalized domain names in 2003, Punycode has been ubiquitous on the internet. Internet addresses like look peculiar, but fulfil an important function: They encode non-ASCII characters into ASCII-compatible character strings and therefore ensure a smooth flow in the network. How does this work, and why is Punycode criticized so often? We’ll tell you.

Using SSH keys for your network connection

How to use SSH keys for your network connection

Operating and managing a remote server located in a data center is often carried out by using a secure network connection provided by the SSH protocol. The necessary registration on the server is preceded by an authentication process. Usually this occurs in the form of the username and password. Alternative methods such as the public key authentication used by SSH, do have their advantages. But...

Web analytics and data privacy

Web analytics: data privacy when creating a profile

Tracking tools can provide website operators with a useful indication on how to adapt an online project to suit a target group. These tools focus on user profiles, which reveal how users find the website, and which content provokes interactions. This information is based on user data, which can be subject to stringent data protection guidelines in some countries within the European Union. Find out...

SMTP-Auth

What is SMTP authentication? Secure e-mail against spam

Is your mail server configured with SMTP AUTH? If not, you should do so as soon as possible. Professional spammers are happy to see every open relay that they can use for the distribution of their junk mail. Such spam is not only hassle for the receiver, but also unnecessarily increases your server traffic and damages your online reputation. This security gap can be closed with the simple ESMTP...

Protection against ransomware, spyware, and scareware

Ransomware, adware, etc. – how can you protect yourself?

The internet is a playground for cybercriminals and fraudsters – for many, this is an annoying and frightening reality. The threats from unwanted software range from harmless advertising to trojans, which can paralyze complete computer networks. The forms of malicious software or malware are diverse, the countermeasures often very simple. In our article, you can read about how ransomware, spyware,...

Keylogger

Keyloggers: how do they work and how do you protect yourself from them?

Keyloggers are programs or devices that get access to your credentials by recording your keystrokes. Keyloggers hide in operating system software and leak data. Some keylogger hardware is even more sophisticated, since it can document your keyboard behavior or tap directly into the data stream. Learn how keyloggers work and which variants are available in our guide. We also give you tips on how to...

DoS and DDoS: attack patterns at a glance

DoS: attack patterns and countermeasures

´It is very important for a server service to always be available since this is directly related to an online company’s success. Many servers are susceptible to DoS and DDoS attacks, which cause overloads and trigger costly crashes . But which patterns do these attacks follow and which counter measures can be put into place in order to protect critical systems from being targeted?

Linking restrictions due to ECJ judgement

'Playboy' judgement restricts the freedom to link

There are boundaries when it comes to linking. These boundaries have now been officially confirmed by the European Court of Justice (ECJ) in its judgement on the September 8th, 2016. Website operators that place hyperlinks with commercial intent are obliged to check the legality of the online content that is being linked to. According to the ECJ, private internet users aren’t expected to check,...

Personal data

Everything you need to know about personal data

What do your e-mail address, eye color, preferred political party, and license plate have in common? They can all be regarded as personal data which companies and cybercriminals can use to draw direct or indirect conclusions about your physical, physiological, genetic, psychological, economic, cultural, or social identity. It goes without saying that this sensitive information must be protected...


Wait! We’ve got something for you!
Have a look at our great prices for different domain extensions.


Enter the web address of your choice in the search bar to check its availability.
.club
$1/1st year
then $15/year
.com
$1/1st year
then $15/year
.info
$1.60/1st year
then $20/year
.org
$1/1st year
then $25/year