WordPress is among the most frequently used content management systems for blogs, forums and other online publishing platforms. With one million users its popularity means that it is also a hive for criminal activity with hackers scanning websites for possible weak areas. The only way to prevent hackers from gaining back door access is by taking adequate safety precautions.
A stable network is characterised not only by the appropriate hardware structures, but also by a watertight security concept. In addition to back-up solutions and intelligent fail-safe systems, protection against external access attempts is a must. Intrusion detection systems (IDS) and intrusion protection systems (IPS) are an excellent addition to the classic firewall and are therefore a sensible...
If you want to create a blog or a website, you can choose from numerous help packages such as website construction kits or content management systems. However, these complete packages often prove to be far too extensive for many projects. The website generator, Jekyll, which is closely linked to the developer platform, GitHub, proves that simple web presences can also be created with few functions...
How can you easily format texts for use online and offline? This becomes a piece of cake when you use the markup language Markdown and an editor. With these editors for Linux, Windows and Mac as well as the online editors, you can create Markdown documents and convert them into HTML pages. But what are the best Markdown editors?
The Berkeley Packet Filter was developed in 1992 to filter, receive, and send data packets securely. The filter forms interfaces with security layers which are tasked with recognising incoming corrupted data contents, for example. This allows them to be discarded or corrected right away. We explain how the BPF works.
How can the recipient of an email tell whether a message is actually coming from the person who appears to be sending it? Many scammers attempt to forge the email sender address. But you can protect yourself. You can verify the outbound mail server using the SPF (Sender Policy Framework), a popular authentication method. How does SPF work and what can it do?
When you set up your e-mail account you will sooner or later be faced with the decision of choosing between IMAP or POP3. Both transfer protocols help you receive your e-mails. But what are the differences between IMAP and POP3? And when is it best to use which protocol?
Recently, a new EU directive has highlighted the importance of cookies, as these small text files sometimes store sensitive user data. But how do cookies actually work, and why do we need them? We will look at the small data packets that are exchanged and stored between web browsers and websites and how cookies affect every internet user today, whether for business or private purposes.
Windows operating systems can be controlled and configured in a wide variety of ways. To this day, experienced administrators use Command Prompt, the Windows command-line interpreter, for this purpose. If you want to have Windows automatically process a sequence of commands, you can create a batch file. This tutorial will show you how.
The ping command line program is available to you on all current operating systems. Using a step-by-by step tutorial, we’ll show you how you can activate ping in Windows via the command prompt and how to employ the tool for network diagnostics to verify the connection between two computers.