What is the EU-US Privacy-Shield?

Privacy Shield – controversial data transfer agreement between the EU and the US

 

For some years, the Privacy Shield has regulated the transfer of personal data from the EU to the US. But in July 2020, the Court of Justice for the European Union (CJEU) invalidated the Privacy Shield. For many companies, the end of the privacy agreement came as a complete...

 

What is Instagram Reels?

Instagram Reels: video clips a la TikTok

 

Instagram Reels is Instagram’s new video feature. Much like Chinese app TikTok, Reels lets users create and share short video clips with added background music. But what exactly is Instagram Reels and what are the differences to TikTok? We’ll show you what the new feature can do....

 

PHP 8

PHP 8: What you need to know about the latest update

 

PHP is one of the most important languages on the Internet. Many content management systems like WordPress, TYPO3 or Joomla are based on PHP. The release of PHP 8 is imminent, but we’ve already had some information about its new features. Also some old features will be reworked,...

 

Create Alexa Skills

Program Alexa Skills easily by yourself

 

Alexa Skills extends the functionality of your Amazon Echo, Echo Dot, or any other smart speaker from the Echo series with additional abilities. You can activate extensions for the virtual voice assistant in the Alexa Skills Store for free. With the Alexa Skills Kit, Amazon also...

 

Zoom alternative

Zoom alternatives: a comparison of the main competitors

 

Alternatives to the popular video conferencing software Zoom are having their moment in the spotlight as a growing number of people are organising video calls daily. Free alternatives to Zoom include a wide range of features, especially since the market for video conferencing...

 

What is a QR code?

What is a QR code?

 

What do stamps, tickets, and posters have in common in the 21st century? More than you might think: Many companies now use QR codes on printed items for a variety of purposes. They can be used to quickly read data and execute commands. How does a QR code work? Which QR code...

 

SFTP: The secure way to transfer data

Using SSH File Transfer Protocol (SFTP), you can transfer data bidirectionally within an authorised group of people in a particularly secure way. The transfer between the client and server takes place via an encrypted IP-based data tunnel. The basic File Transfer Protocol (FTP) has major security vulnerabilities, which were eliminated in the refined SSH File Transfer Protocol.

Vishing: How to identify voice phishing and fend off attackers

Vishing (voice phishing) is a contemporary scamming method through which scammers attempt to get hold of your personal data. In doing so, cyber criminals in most cases impersonate a company employee over the telephone in order to obtain sensitive data. With the help of specific examples from real life, we explain how you can identify voice phishing and protect yourself against attacks.

csrss.exe: What’s behind the Client Server Runtime Process

What is csrss.exe? If you inspect the processes currently running on your Windows system, you’ll inevitably come across the csrss.exe process. Your system can’t run without it because it’s responsible for important tasks such as launching processes. If you suspect that the file might be a virus, it’s a good idea to inspect whether it’s the genuine csrss.exe file. But can you spot the difference?

Adjusting the screen brightness in Windows

While you’re working on your computer, the background lighting in your environment will vary. To protect your eyes and prevent headaches, you should adapt the screen brightness to these changing conditions. The brightness settings on laptops are different from those on a PC with a separate monitor, but don’t worry – we’re here to take you through the various options step by step.

The best screenshot tools at a glance

What exactly is a screenshot? How do you create one? And how do the different screenshot shortcuts work when trying to create screenshots on Mac and Windows? Besides the built-in features on operating systems, what are the other, third-party options when it comes to screenshot tools? We’ll take you through our introductory guide to making screenshots and the best keyboard shortcuts and screenshot...

SMB (Server Message Block): definitions, tasks, and applications

Sending data between computer systems usually takes users a matter of seconds. But for the devices involved to ‘talk’ to each other, it requires clear communication standards to be in place. These standards are defined by protocols like Server Message Block (SMB). Find out in the following article what the Microsoft protocol does and how it has changed over the years.

ECC RAM – the error-correcting code memory

Memory is one of the most important components of a computer system and is particularly important for processing large amounts of data. In addition to increasing the storage capacity, it is also necessary to guarantee the security of the data. Bit errors, for example, are one of the key foes that ECC RAM is battling against to protect the main memory. To date these error-correcting memory modules...

GAIA-X: the European digital project

Google, Amazon, Facebook, Alibaba, Tencent: Data infrastructure is dominated by a few large corporations, none of which come from Europe. GAIA-X aims to change that. German politicians, businesspeople, and researchers hope the project will strengthen the development of European digital projects, and increase the importance of transparency, data protection, and cloud independence.

Denial of service: what happens during a DoS attack?

Denial of service attacks – also called DoS attacks – are a relatively simple and effective method for cyber criminals to bring down a website, email traffic, or an entire network. Besides businesses, institutions such as the German parliament or Wikipedia have been victims of these types of attacks. This has raised the question: What exactly is denial of service, and what happens during an...

UML component diagrams: efficient modelling systems with software modules

A component diagram is a UML-based development tool that portrays software modules as well as more complex system architectures, and also specifies interactions of ports and interfaces. UML component diagrams help to improve cost effectiveness since they focus on modules that are used multiple times and that are reused during the planning and design stage.


Wait! We’ve got something for you!
Get your .co.uk domain for just £1/1st year.

Enter the web address of your choice in the search bar to check its availability.
12 month for £1/1st year
then £10/year