There are different reasons for why you might want to rotate your computer screen. Some users rotate their screen to use it as an upright, vertical display. Others have done this by mistake. Luckily, Windows 7, 8, and 10 offer an easy fix for adjusting display settings. You might even be able to use shortcuts on your PC or laptop to rotate your screen.
Programming has been dominated by agile software development in recent decades, and with good reason. Agile software development owes much of this success to the extreme programming (XP) methodology. It doesn’t get any more agile than XP! This methodology emphasises the people involved and requires thinking in very small steps. How does extreme programming work?
Agile software development is supposed to make the programming process more dynamic and efficient. At first, pair programming might seem counterproductive because two programmers have the same task: They work together on the same piece of code and take turns checking each others’ work. This peer review process is designed to ensure fewer mistakes and better results. How does it work?
Rainbow tables: they may sound innocent, but they’re actually a strong attack method for cybercriminals. Using rainbow tables, you can find out specific passwords in just a few seconds. To protect yourself and your users from such attacks, you should understand how the tables function. We explain rainbow tables using an example.
Online activity could be so simple – just enter your access data once and automatically be logged in for all accounts and services on the web, instead of having to remember dozens of passwords. This is, in fact, a reality for many websites, and the process is called SSO – single sign-on – and is becoming ever more popular among private and professional users. But what are the benefits of SSO, and...
The “pathway to hell” – this is how Eran Hammer-Lahav once called the security protocol OAuth 2.0, on which he himself had worked for years. Others, however, use the service without issue. It enables users to use data and functions across multiple platforms in multiple services – for example, with the convenient single sign-on – using secure API authorisation. But how exactly does OAuth2 work and...
Data leaks and hacker attacks mean that internet security is becoming increasingly important for users. Standard passwords based on names and dates of birth can be cracked in seconds and give criminals access to all kinds of accounts. In combination with multi-factor authentication, TOTP can provide a solution: a password which is only valid for a short time. How does this work?
In the end, it is evident that personal data transfer to the U.S. will continue to be an uncertain field for companies. The transfer of data to the U.S. remains within the framework of the currently applicable regulations rather than a legal grey zone. The companies concerned are advised to closely monitor any developments in data protection law. At the beginning of 2017, the EU Justice Commission...
Kubernetes helps you manage containers – if you know how it works. But the first steps in particular can often be difficult. We explain the installation and most important features in our Kubernetes tutorial simply and concisely. Learn step by step how you can create a cluster and work with deployments.