SYN flood

SYN flood attack: variants and countermeasures

The attack pattern of a SYN flood attack has been known since the early years of the World Wide Web. Over time, new attack variants and appropriate protective measures have arisen. DDoS attacks with massive data flows originating from botnets are currently the norm. Learn how SYN flood attacks work. We will explain the concepts of these attacks and countermeasures.

HTTP Flood Attacks

What is an HTTP flood attack?

DDoS attacks are occurring more and more frequently. Among the most insidious are HTTP flood attacks. Disguised as regular users on the website, thousands of complex requests are sent to the server until a system failure occurs. Here you will learn what exactly an HTTP flood attack is, how you can identify them, and how you can protect yourself from them.

UDP flood

UDP flood

UDP flood attacks have been used in the past for denial-of-service attacks. Even servers for major organisations have collapsed under the massive amounts of data. We’ll explain how a UDP flood attack works and provide you with an overview of its technical background, proven security measures, and how it is different from other DoS attacks.

Wipe hard drive

Wipe hard drive: Securely wipe an HDD or SSD

Even formatting a hard drive under Windows or Mac does not completely wipe all data. Although wiping it is not impossible, it requires additional tools to be able to wipe a Mac hard drive or Windows hard drive with the utmost thoroughness. These can be used to safely wipe and overwrite data on both an HDD and an SSD. You can find out how this works here.

Public key encryption

Asymmetric encryption

If you want to secure your digital data with the best possible protection, there is no getting around the issue of encryption. For example, asymmetric cryptography plays an essential role in secure data transfer. Here, you will learn how it works, how it is different from traditional symmetric encryption, and where it is used.

Encryption software

Encryption software: A comparison of encryption tools

A good encryption software keeps your data secure. It enables you to easily protect a folder, hide hard drives, or sync encrypted data to a cloud, for example. Find out more information about recommended encryption tools and what they do, and get an overview of their advantages and disadvantages in our dedicated article.


Cryptojacking: How to detect and protect against infection

Malware comes in many different forms, but the goal is always the same: making a profit. That of course is the case for illegal mining of cryptocurrencies, a practice known as cryptojacking. In cryptojacking, infected devices are misused to secretly mine cryptocurrencies – often as part of botnets. We explain how you can recognise cryptojacking and how you can protect your devices.


What is scareware and how can you protect yourself against it?

Scammers use scareware to trick users out of their money or to get them to install more malware. Fortunately, there are effective ways to protect yourself against scareware, as well as signs that can help you identify threats before you fall victim. Our article has everything you need to know about scareware so let’s get started.


Anonymous: what is the hacker collective?

Supposedly fun mass attacks on people who were easy targets used to be organised on image boards like 4chan. These are the beginnings of Anonymous, but they don’t have much in common with the collective’s actions today. Political commitment is the group’s main aim nowadays. Anonymous are known for wearing the Guy Fawkes mask. But beware, it’s not always Anonymous behind every mass attack.


Cyberattacks: the dangers lurking online

Cyberattacks threaten individuals, companies, and public authorities alike. Criminals are always coming up with new techniques to cause as much damage as possible. The motives behind their actions vary from greed to political goals. So how can you protect yourself against cyberattacks? Our article tells you everything you need to know.

Wait! We’ve got something for you!
Get your domain for just £1/1st year.

Enter the web address of your choice in the search bar to check its availability.
12 months for £1
then £10/year