Network

ARP Spoofing: Attacks from the internal network

ARP Spoofing – flaws in network security

When it comes to network security, administrators focus primarily on attacks from the internet. But often times, the danger lurks in the internal network. If the LAN turns out to be a blind spot in the security IT, then internal attackers have an easy time. A popular method of attack is ARP spoofing. With this, hackers switch undetected between two communication partners in order to intercept,...

Spear phishing

Spear phishing: targeted attacks on your data

Internet users are constantly the target of cyberattacks. Most attacks are easy to fend off, but a new form of scam has proven to be especially dangerous. Spear phishing messages don’t contain absurd claims or bad spelling. These deceitful messages target specific individuals and look frighteningly real. How do these attacks work?

Social engineering – the security gap at ‘layer 8’

Social engineering: human vulnerability exploited

The most effective system break-ins often happen without a scene. Instead of disrupting central network devices with DDoS attacks or sneaking through onto operating systems with Trojan horse techniques, hackers increasingly try to exploit the human security gap. There are various such methods that fall within the broader category of social engineering: a technique that sees hackers gather publicly...

What is MAC spoofing?

What is MAC spoofing?

MAC spoofing is a method by which unique hardware addresses are masked using a Locally Administered Address (LAA) in the software. MAC spoofing can offer protection for your privacy when using public LAN or WLAN networks, but can also be used for illegal network activities. We explain to you here how MAC spoofing works and which settings in Windows must be accessed in order to change your MAC...

HTTP Flood Attacks

What is an HTTP flood attack?

DDoS attacks are occurring more and more frequently. Among the most insidious are HTTP flood attacks. Disguised as regular users on the website, thousands of complex requests are sent to the server until a system failure occurs. Here you will learn what exactly an HTTP flood attack is, how you can identify them, and how you can protect yourself from them.

Securing a server: correctly configuring Linux, etc.

The right configuration to secure your server

If you operate or rent your own server, it is your responsibility to protect it against failures and external access. You can immediately begin to set the foundation for this when configuring the server, if you have the necessary administrative rights. The correct settings can work wonders, especially with encrypted remote connections via SSH protocol, and greatly increase security.

Creating an IT disaster recovery plan

For when the going gets tough: the IT disaster recovery plan

For businesses, a reliable IT infrastructure is just as integral to day-to-day operations as competent management, productive employees, and reasonable working conditions. A server outage is able to paralyse an entire company. Adequate preparation can help prevent some of the most common errors from occurring; unforeseen risks, however, will always remain a factor. In order to be on top of your...

Headless CMS: What are the benefits?

Get more from your own content with headless CMS

If you want to juggle more than one channel with your content management system, you’ll quickly reach the limits. A classic CMS offers many simplifications, but at the same time is limited with its design options. For this reason, content creators sometimes rely on another solution: a headless CMS. This separates the frontend from the backend so that different websites and mobile apps can be...

How companies use social selling

Social selling: business relations on the social net

Purchasing decisions are rarely made out of the blue. Customers usually go through a decision-making phase, during which it’s up to the company to convince the customer of their need for the product. This is most effective when you present yourself and your products as trustworthy and honest as possible – particularly on social networks, where your target group conducts research, asks for...

The OSI model: a reference for standards and protocols

What’s the OSI model?

Those working with network technology are bound to encounter the ISO-OSI model sooner or later. This system subdivides communication between computer systems into seven different layers. Each of these layers is assigned a certain task. With the help of this layer model, subareas of abstract processes are able to be descriptively explained.


Wait! We’ve got something for you!
Get your .co.uk domain for just £1/1st year.

Enter the web address of your choice in the search bar to check its availability.
12 months for £1
then £10/year