Rainbow tables: they may sound innocent, but they’re actually a strong attack method for cybercriminals. Using rainbow tables, you can find out specific passwords in just a few seconds. To protect yourself and your users from such attacks, you should understand how the tables function. We explain rainbow tables using an example.
Online activity could be so simple – just enter your access data once and automatically be logged in for all accounts and services on the web, instead of having to remember dozens of passwords. This is, in fact, a reality for many websites, and the process is called SSO – single sign-on – and is becoming ever more popular among private and professional users. But what are the benefits of SSO, and...
The “pathway to hell” – this is how Eran Hammer-Lahav once called the security protocol OAuth 2.0, on which he himself had worked for years. Others, however, use the service without issue. It enables users to use data and functions across multiple platforms in multiple services – for example, with the convenient single sign-on – using secure API authorisation. But how exactly does OAuth2 work and...
Data leaks and hacker attacks mean that internet security is becoming increasingly important for users. Standard passwords based on names and dates of birth can be cracked in seconds and give criminals access to all kinds of accounts. In combination with multi-factor authentication, TOTP can provide a solution: a password which is only valid for a short time. How does this work?
In the end, it is evident that personal data transfer to the U.S. will continue to be an uncertain field for companies. The transfer of data to the U.S. remains within the framework of the currently applicable regulations rather than a legal grey zone. The companies concerned are advised to closely monitor any developments in data protection law. At the beginning of 2017, the EU Justice Commission...
Kubernetes helps you manage containers – if you know how it works. But the first steps in particular can often be difficult. We explain the installation and most important features in our Kubernetes tutorial simply and concisely. Learn step by step how you can create a cluster and work with deployments.
Container technology has revolutionised software development. However, working with multiple containers at the same time can quickly become confusing. Kubernetes provides a solution to this. This orchestration tool allows developers to monitor all containers, effectively scale them and automate lots of work processes. How does Kubernetes do this?
If you’re happy with Docker and are already using the container visualiser, you might have thought about trying Kubernetes. But are these two systems actually rivals? Is it a case of Kubernetes vs. Docker? On the contrary, both work really well together. But the container pioneer now also offers its own tool for orchestration with Docker Swarm. So, which is better?
ZIP is the standard container format for archive files. Even when sending lossless-compressed files, ZIP is usually the format of choice. Generally, anyone can open ZIP files. Suitable tools are offered by all common operating systems. However, special ZIP programs such as WinZip, WinRAR, and 7-Zip provide a greater range of functions.