SSL

QUIC – the Internet Transport Protocol based on UDP

QUIC: What is behind the experimental Google Protocol?

Quick UDP Internet Connections (QUIC for short), is an experimental network protocol from Google. Further development of the protocol is being driven by IETF, which has set up a dedicated group working towards it. The QUIC protocol is intended to offer a speed-optimized alternative to the current transport standard TCP and builds on the connectionless protocol UDP to achieve this.

Replacing an SSL Certificate affected by Browser Distrust

Replacing SSL (Secure Socket Layer) Certificates affected by browser distrust

Due to browser community distrust in Symantec, Google Chrome and Mozilla Firefox have decided to distrust websites with SSL certificates issued by Symantec before December 1st, 2017. This article outlines the steps and important key dates that website operators need to be aware of in order to sucessfully renew or replace their SSL certificates before their website is branded with a warning...

SSl certificate

SSL certificates

Security on the internet is always paramount: regardless of whether you run a website yourself or just surf the web, you should always understand the basics of internet security. Here we explain exactly what SSL certificates are and what you need them for. Encryption and authentication are the main purposes of certificates. They are intended to protect internet users’ personal data from criminal...

Use trust seals for a successful web store

Gain your customers’ trust with a trust seal

If you run a web store, you’ll want users not only to browse your pages but to buy your products too. Getting a visitor to convert is your main focus. Quality content and strong references for your data security can strengthen users’ trust in your products. Trust seals can therefore help to clear any doubts users may have about the legitimacy of your web store.

Securing servers with Fail2ban

Securing your server with Fail2ban

For server operators, security is of the utmost importance. Only those who have developed and set up a foolproof defense strategy are ready for drastic situations. As well as regular protection mechanisms, like security software, backups, and encryption, there are also some useful tools and frameworks that may come in handy in the fight against intruders. We have laid out essential details on the...

Using SSH keys for your network connection

How to use SSH keys for your network connection

Operating and managing a remote server located in a data center is often carried out by using a secure network connection provided by the SSH protocol. The necessary registration on the server is preceded by an authentication process. Usually this occurs in the form of the username and password. Alternative methods such as the public key authentication used by SSH, do have their advantages. But...

E-mail etiquette: rules for the perfect e-mail

E-mail etiquette: tips for good internet communication

Every day, over 200 billion e-mails are sent around the world – although many of them aren’t received with much enthusiasm. In order for your business e-mails to stand out in all this chaos, you should pay attention to e-mail etiquette. If you stick to the most important rules, your e-mails will appear polite, but at the same time, serious. Messages like these will be happily answered.

E-Mail encryption with PGP

E-mail encryption: how PGP secures the content of your e-mails

Online privacy is a sensitive issue that affects experts and amateurs alike. Whether you’re posting on social networks, carrying out banking transactions, or buying from an online store, your data is not always sufficiently protected. The same applies to e-mails. Don’t let cyber criminals get their hands on your content by encrypting your e-mails.

Email encryption with SSL

Sending encrypted emails over SSL or TLS

Are your emails encrypted when you send and receive them? If not, there’s no time like the present! Encrypting your email is the only way to ensure it arrives safely at its destination. Otherwise sensitive data such as passwords, bank details or addresses, could be available for anyone to read. The simplest solution is the SSL transfer protocol.

ERR_SSL_PROTOCOL_ERROR: the best solutions

ERR_SSL_PROTOCOL_ERROR: how to fix the Chrome bug

Chrome is the world’s most widely-used internet browser. The application scores points not only when it comes to security and speed, but also with its features such as cross-device synchronization of user data. But errors can occur even when surfing with Google’s wonder weapon. These can lead to the browser crashing or prevent certain pages from being accessed. The error message...

1