What do EU cookie laws mean for you?

EU cookie laws and how they affect your business

 

Cookies can be helpful business tools, but they often toe the data protection line dangerously. As a result of this tendency towards uncertainty, the EU has introduced a new cookie policy to protect its users. The new policy makes opt-in procedures compulsory, because the user...

 

What is a QR code?

What is a QR code?

 

What do stamps, tickets, and posters have in common in the 21st century? More than you might think: Many companies now use QR codes on printed items for a variety of purposes. They can be used to quickly read data and execute commands. How does a QR code work? Which QR code...

 

The best Facebook alternatives

What are the best alternatives to Facebook?

 

We once used phone calls and text messages to carry out all our communication, but now our private conversations are largely digitalised and carried out almost entirely online. We write to each other via messenger apps and share photos, thoughts, and feelings on social networks....

 

The best TeamViewer alternatives

Alternatives to TeamViewer

 

You don’t always have to use the market leader – this also applies to remote access. TeamViewer is still the most widely-used solution for remote management and online meetings, but there are numerous alternatives on the market which can be considered. We present some serious...

 

Best Video editing programs

The 7 best video editing programs of 2020: beginner, advanced, and professional

 

Professionals use video editing software to create amazing films. However, video editing is not just for professionals. The best video editing programs of 2020 manage a balancing act between suitability for amateurs and professionals. With the right video editing software, you...

 

How to identify phishing e-mails and protect your data

Identifying phishing e-mails: the telltale signs at a glance

 

Scammers send out dubious e-mails attempting to obtain sensitive data from internet users every day. This is known as phishing and isn’t just annoying; fraudulent e-mails cost millions each year as internet users fall victim to them. We reveal how to identify phishing e-mails and...

 

Perfect out of office message: Examples and templates

How to create the perfect out of office message

 

The out of office message is a crucial part of email communication in the workplace. If you don’t have access to your email, your contacts will want to know when you’ll be back and whether or not you’ll be represented by someone else in your absence. An out of office reply may be...

 

WordPress security: The most important security plugins

WordPress is among the most frequently used content management systems for blogs, forums and other online publishing platforms. With one million users its popularity means that it is also a hive for criminal activity with hackers scanning websites for possible weak areas. The only way to prevent hackers from gaining back door access is by taking adequate safety precautions.

The intrusion detection and intrusion prevention systems at a glance

A stable network is characterised not only by the appropriate hardware structures, but also by a watertight security concept. In addition to back-up solutions and intelligent fail-safe systems, protection against external access attempts is a must. Intrusion detection systems (IDS) and intrusion protection systems (IPS) are an excellent addition to the classic firewall and are therefore a sensible...

Jekyll – the practical generator for static websites

If you want to create a blog or a website, you can choose from numerous help packages such as website construction kits or content management systems. However, these complete packages often prove to be far too extensive for many projects. The website generator, Jekyll, which is closely linked to the developer platform, GitHub, proves that simple web presences can also be created with few functions...

Markdown editors for Windows, Mac and Linux

How can you easily format texts for use online and offline? This becomes a piece of cake when you use the markup language Markdown and an editor. With these editors for Linux, Windows and Mac as well as the online editors, you can create Markdown documents and convert them into HTML pages. But what are the best Markdown editors?

BPF – What is the Berkeley Packet Filter?

The Berkeley Packet Filter was developed in 1992 to filter, receive, and send data packets securely. The filter forms interfaces with security layers which are tasked with recognising incoming corrupted data contents, for example. This allows them to be discarded or corrected right away. We explain how the BPF works.

Understanding and using SPF records

How can the recipient of an email tell whether a message is actually coming from the person who appears to be sending it? Many scammers attempt to forge the email sender address. But you can protect yourself. You can verify the outbound mail server using the SPF (Sender Policy Framework), a popular authentication method. How does SPF work and what can it do?

IMAP or POP3 – comparing e-mail protocols

When you set up your e-mail account you will sooner or later be faced with the decision of choosing between IMAP or POP3. Both transfer protocols help you receive your e-mails. But what are the differences between IMAP and POP3? And when is it best to use which protocol?

What are cookies?

Recently, a new EU directive has highlighted the importance of cookies, as these small text files sometimes store sensitive user data. But how do cookies actually work, and why do we need them? We will look at the small data packets that are exchanged and stored between web browsers and websites and how cookies affect every internet user today, whether for business or private purposes.

Creating a batch file: How to write your own .bat file

Windows operating systems can be controlled and configured in a wide variety of ways. To this day, experienced administrators use Command Prompt, the Windows command-line interpreter, for this purpose. If you want to have Windows automatically process a sequence of commands, you can create a batch file. This tutorial will show you how.

How to use the ping command in Windows

The ping command line program is available to you on all current operating systems. Using a step-by-by step tutorial, we’ll show you how you can activate ping in Windows via the command prompt and how to employ the tool for network diagnostics to verify the connection between two computers.


We’re all in this together. At IONOS we are
#hereforyou
Coronavirus is a challenge we need to face together.
We've created special offers on key products to help
your business keep going.
3 months free
Online Shop
Be where your customers are with your own online store.