Delete Snapchat account

How to delete your Snapchat account

 

Snapchat’s recipe for success is that images and videos that have been sent are automatically deleted immediately after they have been viewed. However, many people will eventually want to delete their Snapchat account completely. There are several possible reasons for this – the...

 

YouTube alternatives: an overview of the best portals

The 10 best YouTube alternatives at a glance

 

YouTube has revolutionised the Internet: since it was founded, it has been inundated with video content and more than two billion users have been recorded. No other alternative has come close to this impressive number. But what are the other video portals are available and what...

 

Free e-mail providers

The best free email providers: a comparison

 

The quality and quantity of features offered by free email providers is forever improving. Ever increasing amounts of storage space, greater levels of security, and more modern user interfaces are all being made available free of charge. But the list of possible providers is long...

 

iCloud with a custom domain

How to use iCloud with a custom email domain

 

The new premium subscription iCloud+ gives users the opportunity to use Apple’s popular cloud service with additional features. Among other things, the paid membership allows you to link the iCloud with your personal domain to send emails in the usual Apple environment using a...

 

Deleting a Telegram account

Deleting a Telegram account

 

Deleting a Telegram account is almost as easy as making one. We explain why people are making the move away from Telegram, how to completely delete your account, and what happens after you’re done. You should be aware that you can’t recover a deleted telegram account. Keep...

 

Best Android cloud apps

The 9 best Android cloud apps – securing your smartphone data

 

As Android smartphone users will know, a complete backup of the operating system can only be created with the internal backup function that leaves a lot to be desired. The solution? Using a cloud storage solution like Google Drive. However, if you don’t feel comfortable handing...

 

Reasons to get your own email domain

Personal e-mail domains: professional communication on the web

 

A personal e-mail domain is a must in the commercial sphere. Conveying a professional image in your contact details will ensure that customers and businesses take you seriously. Find out about the advantages of having an individual mail domain and learn how to secure a personal...

 

WhatsApp Web video calls with WhatsApp Desktop

A WhatsApp web video call is not yet one of the features of the popular messenger service’s web version. However, those who use the desktop version have been able to make WhatsApp desktop video calls since 2021. All it takes is a WhatsApp account, a connected smartphone, and a QR code. We explain how to make a WhatsApp video call on PC.

WordPress themes: elements and structure

The blog software, WordPress, has many strengths, one of them being that design and layout can be separated from the program core. This allows users to customise the appearance of website content using themes without having to interfere with the actual software. Here, we explain the function of WordPress themes, their components, and their structure.

The most important SEO tools at a glance

If you want your business to be successful online there is no getting around Google. The magic term is search engine optimisation (SEO), and up until a few years ago this marketing knowledge was kept a secret. Now there are many practical tools that can help get you gain a better overview of the keywords, rankings, and performance of your website and can even be used by beginners.  

SYN flood attack: variants and countermeasures

The attack pattern of a SYN flood attack has been known since the early years of the World Wide Web. Over time, new attack variants and appropriate protective measures have arisen. DDoS attacks with massive data flows originating from botnets are currently the norm. Learn how SYN flood attacks work. We will explain the concepts of these attacks and countermeasures.

What is an HTTP flood attack?

DDoS attacks are occurring more and more frequently. Among the most insidious are HTTP flood attacks. Disguised as regular users on the website, thousands of complex requests are sent to the server until a system failure occurs. Here you will learn what exactly an HTTP flood attack is, how you can identify them, and how you can protect yourself from them.

UDP flood

UDP flood attacks have been used in the past for denial-of-service attacks. Even servers for major organisations have collapsed under the massive amounts of data. We’ll explain how a UDP flood attack works and provide you with an overview of its technical background, proven security measures, and how it is different from other DoS attacks.

WebDAV: This is how the HTTP extension works

Files can be made available on and transmitted via the Internet with the WebDAV protocol. It is one of many protocols with this feature and an extension of the well-known Hypertext Transfer Protocol (HTTP). We answer the most important questions regarding WebDAV and explain, among other things, how it enables users to create and move documents on servers.

How to write a basic shell script

Learn how to write a basic Bash shell script. Although shell scripts can be long, complicated scripts which perform complex tasks, you can also learn how to write a simple shell script in 10 minutes. If you can run commands at the command line, learning how to write a basic Bash script is easy.

TFTP (Trivial File Transfer Protocol) – File Transfer Protocol made simple

The Trivial File Transfer Protocol (TFTP) is one of the oldest and simplest network protocols. It allows two systems to exchange files on the local area network without having to establish a connection beforehand. To do this, TFTP uses the connectionless transport protocol UDP, which serves as an alternative to the more common yet more complex TCP. What other features set the TFTP protocol apart,...

Server Name Indication (SNI): What’s behind the standard?

What is server name identification, really? Encryption technologies play a big role when it comes to surfing on the net. Credit card data and other personal information must not fall into the hands of criminals. For now, TLS is one of the protocols used for this purpose. But it has a disadvantage: it only functions when each IP address only hosts one domain. If multiple virtual services are...


Wait! We’ve got something for you!
Get your .co.uk domain for just £1/1st year.

Enter the web address of your choice in the search bar to check its availability.
12 months for £1
then £10/year