SSL

ERR_SSL_PROTOCOL_ERROR: the best solutions
ERR_SSL_PROTOCOL_ERROR: how to fix the Chrome bug
  • Technical matters

Chrome is the world’s most widely-used internet browser. The application scores points not only when it comes to security and speed, but also with its features such as cross-device synchronization of user data. But errors can occur even when surfing with Google’s wonder weapon. These can lead to the browser crashing or prevent certain pages from being accessed. The error message...

ERR_SSL_PROTOCOL_ERROR: how to fix the Chrome bug
QUIC – the Internet Transport Protocol based on UDP
QUIC: What is behind the experimental Google Protocol?
  • Technical matters

Quick UDP Internet Connections (QUIC for short), is an experimental network protocol from Google. Further development of the protocol is being driven by IETF, which has set up a dedicated group working towards it. The QUIC protocol is intended to offer a speed-optimized alternative to the current transport standard TCP and builds on the connectionless protocol UDP to achieve this.

QUIC: What is behind the experimental Google Protocol?
What is a server? One term, two definitions
What is a server?
  • Know-how

When talking about web hosting, it is impossible to avoid the term ‘server’. So what is a server? And how does it work? In IT, there are actually two definitions of the term. The traditional server is the software for network services, but more recently the word has also been used to describe the corresponding hardware used to carry out server programs. Here is our overview of the most common...

What is a server?
Using SSH keys for your network connection
How to use SSH keys
  • Security

Operating and managing a remote server located in a data center is often carried out by using a secure network connection provided by the SSH protocol. The necessary registration on the server is preceded by an authentication process. Usually this occurs in the form of the username and password. Alternative methods such as the public key authentication used by SSH, do have their advantages. But...

How to use SSH keys
Securing servers with Fail2ban
How to Setup Fail2Ban
  • Security

For server operators, security is of the utmost importance. Only those who have developed and set up a foolproof defense strategy are ready for drastic situations. As well as regular protection mechanisms, like security software, backups, and encryption, there are also some useful tools and frameworks that may come in handy in the fight against intruders. We have laid out essential details on the...

How to Setup Fail2Ban
Protect sensitive data with a strong password
How to choose a strong password
  • Security

It only takes a few seconds for a hacker to gain access to your private data without you having any idea. More often than not, a password is the only means of protection when logging into online services; and if it is too obvious, it will not prove too much of a challenge for criminals to crack. There are numerous options to increase password security.

How to choose a strong password
Password managers: an overview of today’s best tools
Password-Manager | Overview and Comparsion
  • Security

Would you give your account number to a stranger? Most probably not. But millions of internet users may as well be giving away their personal data (and money!) when using passwords that hackers can crack in a matter of seconds. Password managers provide methods for creating and managing truly secure passwords.

Password-Manager | Overview and Comparsion
Apache SSL
How to configure Apache SSL step by step
  • Security

An Apache SSL configuration can be surprisingly complicated. This is because an SSL certificate is required in addition to the actual server. If the required files are available on the server, the Apache configuration is adjusted. In the last step, don’t forget to test the connection setup via HTTPS. We’ll explain how to configure Apache SSL.

How to configure Apache SSL step by step
Use trust seals for a successful web store
Gain your customers’ trust with a trust seal
  • Online sales

If you run a web store, you’ll want users not only to browse your pages but to buy your products too. Getting a visitor to convert is your main focus. Quality content and strong references for your data security can strengthen users’ trust in your products. Trust seals can therefore help to clear any doubts users may have about the legitimacy of your web store.

Gain your customers’ trust with a trust seal
Install a Lets Encrypt SSL Certificate
Install a Let's Encrypt SSL Certificate on a Cloud Server with Plesk
  • Website creation

Let's Encrypt is a free, automated SSL certificate Authority. Using Let's Encrypt is a fast, free way to obtain an SSL certificate for your website. With Plesk, you can create and deploy a Let's Encrypt SSL certificate with just a few clicks. For any Cloud Server with Plesk, administrative functions like adding an SSL certificate should always be done using the Plesk interface.

Install a Let's Encrypt SSL Certificate on a Cloud Server with Plesk