Creating a GIF

Making a GIF: tools for animated graphics and short clips

 

Memes as video clips, snippets from popular shows, animated logos, or banner ads: the practical GIF format has universal appeal, and can be used in many online contexts. GIFs can be found all over the internet, but making a GIF is also a popular option, with the added bonus that...

 

Windows 7: End of Life

Windows 7 end of support: What you need to do?

 

Even years after it was first released, Windows 7 continues to be one of the favourite operating systems worldwide. But with Microsoft announcing the end of its support for Windows 7, many PC users will need to upgrade or look for an alternative. But just because Windows 7 has...

 

Webdesign trends

8 web design trends that are important for 2020

 

In 2020, web designers will, for the most part, continue focusing on what they did in 2019: user-friendliness. Web design trends continue to be shaped by the mobile revolution, which has forced web designers to have a rethink: screens have become smaller and now the internet has...

 

Best Video editing programs

The 7 best video editing programs of 2020: beginner, advanced, and professional

 

Professionals use video editing software to create amazing films. However, video editing is not just for professionals. The best video editing programs of 2020 manage a balancing act between suitability for amateurs and professionals. With the right video editing software, you...

 

The best Alexa Skills

Amazon Echo upgrade: the best Alexa Skills

 

So you think Alexa can do a lot? Well, it’s now possible to add even more capabilities to the smart Amazon Echo speaker. If you network it with external providers, you can extend the pre-configured functions with different applications. With Amazon Alexa Skills, Alexa becomes a...

 

Perfect out of office message: Examples and templates

How to create the perfect out of office message

 

The out of office message is a crucial part of email communication in the workplace. If you don’t have access to your email, your contacts will want to know when you’ll be back and whether or not you’ll be represented by someone else in your absence. An out of office reply may be...

 

Dropbox alternatives for file hosting

Cloud storage providers: the best Dropbox alternatives

 

Dropbox is one of the most famous and most successful cloud storage services available. Its success is largely due to its many functions and ease of use. But when it comes to data protection and maximum free online storage space, this popular app isn’t the pick of the bunch....

 

EU cookie laws and how they affect your business

Cookies can be helpful business tools, but they often toe the data protection line dangerously. As a result of this tendency towards uncertainty, the EU has introduced a new cookie policy to protect its users. The new policy makes opt-in procedures compulsory, because the user must provide their consent every time. What do website operators need to pay attention to in order to be compliant?

What are rainbow tables?

Rainbow tables: they may sound innocent, but they’re actually a strong attack method for cybercriminals. Using rainbow tables, you can find out specific passwords in just a few seconds. To protect yourself and your users from such attacks, you should understand how the tables function. We explain rainbow tables using an example.

Single sign-on (SSO)

Online activity could be so simple – just enter your access data once and automatically be logged in for all accounts and services on the web, instead of having to remember dozens of passwords. This is, in fact, a reality for many websites, and the process is called SSO – single sign-on – and is becoming ever more popular among private and professional users. But what are the benefits of SSO, and...

OAuth & OAuth 2: data usage across platforms

The “pathway to hell” – this is how Eran Hammer-Lahav once called the security protocol OAuth 2.0, on which he himself had worked for years. Others, however, use the service without issue. It enables users to use data and functions across multiple platforms in multiple services – for example, with the convenient single sign-on – using secure API authorisation. But how exactly does OAuth2 work and...

Time-based one-time password: TOTP explained

Data leaks and hacker attacks mean that internet security is becoming increasingly important for users. Standard passwords based on names and dates of birth can be cracked in seconds and give criminals access to all kinds of accounts. In combination with multi-factor authentication, TOTP can provide a solution: a password which is only valid for a short time. How does this work?

EU-US Privacy Shield: What the replacement for Safe Harbour means for us

In the end, it is evident that personal data transfer to the U.S. will continue to be an uncertain field for companies. The transfer of data to the U.S. remains within the framework of the currently applicable regulations rather than a legal grey zone. The companies concerned are advised to closely monitor any developments in data protection law. At the beginning of 2017, the EU Justice Commission...

Kubernetes Tutorial: First Steps

Kubernetes helps you manage containers – if you know how it works. But the first steps in particular can often be difficult. We explain the installation and most important features in our Kubernetes tutorial simply and concisely. Learn step by step how you can create a cluster and work with deployments.

Kubernetes: what can this tool do?

Container technology has revolutionised software development. However, working with multiple containers at the same time can quickly become confusing. Kubernetes provides a solution to this. This orchestration tool allows developers to monitor all containers, effectively scale them and automate lots of work processes. How does Kubernetes do this?

Kubernetes & Docker: Friend or foe?

If you’re happy with Docker and are already using the container visualiser, you might have thought about trying Kubernetes. But are these two systems actually rivals? Is it a case of Kubernetes vs. Docker? On the contrary, both work really well together. But the container pioneer now also offers its own tool for orchestration with Docker Swarm. So, which is better?

Opening ZIP Files

ZIP is the standard container format for archive files. Even when sending lossless-compressed files, ZIP is usually the format of choice. Generally, anyone can open ZIP files. Suitable tools are offered by all common operating systems. However, special ZIP programs such as WinZip, WinRAR, and 7-Zip provide a greater range of functions.


Wait! We’ve got something for you!
Get your .co.uk domain for just £1/1st year.

Enter the web address of your choice in the search bar to check its availability.
12 month for £1/1st year
then £10/year