Security

Image: How to encypt your emails with SSL/TLS

How to encypt your emails with SSL/TLS

Are the emails that you send and receive encrypted? If not, it’s about time you started. Only by encrypting the transmission and content of emails can you ensure that your data is secure while being sent. Otherwise, unauthorised persons can read your email traffic easily and…

Read more
Image: How to reset MySQL/MariaDB root passwordREDPIXEL.PLshutterstock

How to reset MySQL/MariaDB root password

Forgetting the root password in MySQL or MariaDB doesn’t need to become a serious issue. By following the right steps, you can reset a MySQL/MariaDB root password quickly and easily at any time. This dedicated guide walks you step by step through both methods and points out what…

Read more
Image: What is reverse domain hijacking? Definition and protective measures

What is reverse domain hijacking? Definition and protective measures

The rights to domain names are often hotly contested. While companies defend themselves against cybersquatting, there’s also the opposite case, known as reverse domain hijacking. This is when trademark owners attempt to misappropriate domains, often using legal tricks and…

Read more
Image: What is StartTLS? How it works, uses, and security risks

What is StartTLS? How it works, uses, and security risks

StartTLS initiates the encryption of an email using the TLS protocol and is convenient because, if the method is accepted, the encryption occurs automatically. There’s no need to contact a dedicated port; StartTLS can be easily integrated into normal operations. However, this…

Read more
Image: How to set up the Outlook spam filter and customise itRawpixel.comShutterstock

How to set up the Outlook spam filter and customise it

The Outlook spam filter moves unwanted and potentially malicious spam emails to the Junk folder. Even promotional emails that don’t meet typical spam criteria can be kept out of your inbox with the right settings. If legitimate messages are mistakenly flagged, the Outlook Junk…

Read more
Image: How to change your Outlook password step by step

How to change your Outlook password step by step

Outlook makes it easy to manage email accounts from various providers within a single interface. All it needs are the correct mail server settings and your login credentials. If you change your password, you simply need to update it in the client’s settings. But how exactly do…

Read more
Image: What is a reverse proxy? Core components in security architecturewatcharashutterstock

What is a reverse proxy? Core components in security architecture

Servers offering online services and requiring a continuous internet connection are prime targets for cybercriminals. These can be better protected by using a network component positioned in front—the reverse proxy. It collects incoming requests, adding an extra layer of…

Read more
Image: What is an SQL injection?STILLFXshutterstock

What is an SQL injection?

It seems like almost every day a new software vulnerability is uncovered or an existing one is patched. One attack method that has long exploited such weaknesses is the SQL injection. But what exactly are these malicious database exploits, how do they work, and—most…

Read more
Image: Which is the best backup software? A comparisonSimon Brattshutterstock

Which is the best backup software? A comparison

Data loss can have serious consequences. Backup programs offer the ability to regularly back up important data and restore it in case of an emergency. Reliable backup software ensures that data is protected and can be accessed at any time. Which is the best backup software for…

Read more
Image: How can you increase password security?Rawpixel.comshutterstock

How can you increase password security?

Password security is often an underestimated measure in the fight against cybercrime. By choosing strong passwords, using password managers, regularly checking for leaks, and responding appropriately to breaches, you can protect your digital identity. Here, we’ll show you what to…

Read more