SSL

What is PGP encryption and how to implement it

What is PGP encryption and how to implement it

  • E-Mail security

Online privacy is a sensitive issue that affects experts and amateurs alike. Whether you’re posting on social networks, carrying out banking transactions, or buying from an online store, your data is not always sufficiently protected. The same applies to e-mails. Don’t let cyber criminals get their hands on your content by encrypting your e-mails.

What is PGP encryption and how to implement it
ERR_SSL_PROTOCOL_ERROR: how to fix the Chrome bug

ERR_SSL_PROTOCOL_ERROR: how to fix the Chrome bug

  • Technical matters

Chrome is the world’s most widely-used internet browser. The application scores points not only when it comes to security and speed, but also with its features such as cross-device synchronization of user data. But errors can occur even when surfing with Google’s wonder weapon. These can lead to the browser crashing or prevent certain pages from being accessed. The error message…

ERR_SSL_PROTOCOL_ERROR: how to fix the Chrome bug
QUIC: What is behind the experimental Google Protocol?

QUIC: What is behind the experimental Google Protocol?

  • Technical matters

Quick UDP Internet Connections (QUIC for short), is an experimental network protocol from Google. Further development of the protocol is being driven by IETF, which has set up a dedicated group working towards it. The QUIC protocol is intended to offer a speed-optimized alternative to the current transport standard TCP and builds on the connectionless protocol UDP to achieve this.

QUIC: What is behind the experimental Google Protocol?
What is a server?

What is a server?

  • Know-how

When talking about web hosting, it is impossible to avoid the term ‘server’. So what is a server? And how does it work? In IT, there are actually two definitions of the term. The traditional server is the software for network services, but more recently the word has also been used to describe the corresponding hardware used to carry out server programs. Here is our overview of the most common…

What is a server?
How to use SSH keys

How to use SSH keys

  • Security

Operating and managing a remote server located in a data center is often carried out by using a secure network connection provided by the SSH protocol. The necessary registration on the server is preceded by an authentication process. Usually this occurs in the form of the username and password. Alternative methods such as the public key authentication used by SSH, do have their advantages. But…

How to use SSH keys
How to Setup Fail2Ban

How to Setup Fail2Ban

  • Security

For server operators, security is of the utmost importance. Only those who have developed and set up a foolproof defense strategy are ready for drastic situations. As well as regular protection mechanisms, like security software, backups, and encryption, there are also some useful tools and frameworks that may come in handy in the fight against intruders. We have laid out essential details on the…

How to Setup Fail2Ban
How to choose a strong password

How to choose a strong password

  • Security

It only takes a few seconds for a hacker to gain access to your private data without you having any idea. More often than not, a password is the only means of protection when logging into online services; and if it is too obvious, it will not prove too much of a challenge for criminals to crack. There are numerous options to increase password security.

How to choose a strong password
Password-Manager | Overview and Comparsion

Password-Manager | Overview and Comparsion

  • Security

Would you give your account number to a stranger? Most probably not. But millions of internet users may as well be giving away their personal data (and money!) when using passwords that hackers can crack in a matter of seconds. Password managers provide methods for creating and managing truly secure passwords.

Password-Manager | Overview and Comparsion
How to configure Apache SSL step by step

How to configure Apache SSL step by step

  • Security

An Apache SSL configuration can be surprisingly complicated. This is because an SSL certificate is required in addition to the actual server. If the required files are available on the server, the Apache configuration is adjusted. In the last step, don’t forget to test the connection setup via HTTPS. We’ll explain how to configure Apache SSL.

How to configure Apache SSL step by step
Gain your customers’ trust with a trust seal

Gain your customers’ trust with a trust seal

  • Online sales

If you run a web store, you’ll want users not only to browse your pages but to buy your products too. Getting a visitor to convert is your main focus. Quality content and strong references for your data security can strengthen users’ trust in your products. Trust seals can therefore help to clear any doubts users may have about the legitimacy of your web store.

Gain your customers’ trust with a trust seal
We use cookies on our website to provide you with the best possible user experience. By continuing to use our website or services, you agree to their use. More Information.