What is DevSecOps?

What is DevSecOps and what are its uses?

DevSecOps is the optimal approach for achieving faster software development, without having to make any cutbacks to security. Security packages are directly integrated into the development process. We’ll explain its pros and cons and clarify the various possibilities for using the system.

Turning off the Windows firewall

How to turn off the Windows firewall

Among other things, Windows includes a built-in firewall that protects your device from attacks by hackers and unwanted network traffic. To ensure you can use the Internet safely, you shouldn’t turn off the firewall permanently. However, you may sometimes find you need to temporarily disable it, for example, to install software. Read on to find out how to do this.

TLS (Transport Layer Security)

TLS: How the Internet is encrypted

Internet security measures have become indispensable these days. Encryption is essential to ensure that unauthorised third parties do not gain access to data or are able to manipulate it. That’s what TLS or Transport Layer Security is for. Here’s what you need to know about this integral element of the modern Internet.

TLS vs. SSL

TLS vs. SSL: what is the difference?

SSL and TLS are two encryption protocols that are frequently used in email programs and browsers. Have you ever wondered which one you should choose when you are prompted to pick one when configuring an email client, for example? Here, you will learn what the differences between SSL and TLS are and why only one of them is still viable today.

Open and restore a TMP file

Open or restore a TMP file: How it works

Temporary files with the extension are used by many different programs, including the operating system. If you come across cache files that are seemingly no longer used, you can open the respective TMP file to check its content. The following guide explains why there’s no standardised tool for this and how to open TMPs.

What is FIDO2?

FIDO2: The new standard for secure web log-in

Passwords are not an ideal way to surf the World Wide Web safely. They are either so complex that they are hard to remember, or so simple that they can be guessed in next to no time. FIDO2 takes a different approach and relies on modern technology. The open standard has the potential to make surfing the net safer and more convenient at the same time.

Intrusion detection systems and prevention systems

The intrusion detection and intrusion prevention systems at a glance

A stable network is characterised not only by the appropriate hardware structures, but also by a watertight security concept. In addition to back-up solutions and intelligent fail-safe systems, protection against external access attempts is a must. Intrusion detection systems (IDS) and intrusion protection systems (IPS) are an excellent addition to the classic firewall and are therefore a sensible...

Berkeley Packet Filter Explained

BPF – What is the Berkeley Packet Filter?

The Berkeley Packet Filter was developed in 1992 to filter, receive, and send data packets securely. The filter forms interfaces with security layers which are tasked with recognising incoming corrupted data contents, for example. This allows them to be discarded or corrected right away. We explain how the BPF works.

WebAuthn

WebAuthn (Web Authentication)

Passwords have long ceased to offer sufficient protection when surfing the internet: They are easy to crack, easily tapped, and difficult to remember. Together with the FIDO Alliance, the World Wide Web Consortium has developed a new standard. WebAuthn is intended to make logging into social media or online shopping portals easier and safer. How does it work?


We’re all in this together. At IONOS we are
#hereforyou
Coronavirus is a challenge we need to face together.
We've created special offers on key products to help
your business keep going.
3 months free
Online Shop
Be where your customers are with your own online store.