Security

What is browser hijacking?Billion PhotosShutterstock

What is browser hijacking?

Browser hijacking can enable companies or hackers to seize your sensitive data or even take control of your entire system. In this guide, we’ll delve into what browser hijacking is, what it means for you, the various forms it can assume, and effective strategies to safeguard…

Read more
What is an intrusion detection system (IDS)?

What is an intrusion detection system (IDS)?

An intrusion detection system (IDS) begins its operation at the host, the network, or both, actively examining records in real-time to identify any discernible anomalies. When irregularities are detected, the system promptly sends an alert to the relevant parties, playing a…

Read more
What is an intrusion prevention system?

What is an intrusion prevention system?

In addition to a firewall, an intrusion prevention system (IPS) can monitor either an individual end device or an entire network and alert about potential threats. Unlike intrusion detection systems (IDS) with a similar design, IPS takes a more proactive approach by actively…

Read more
How to convert internationalised domain names with Punycode

How to convert internationalised domain names with Punycode

Since the introduction of internationalised domain names in 2003, Punycode can be seen everywhere on the internet. While internet addresses like 'xn--mller-brombel-rmb4fg.de' look peculiar they fulfill an important function. They encode non-ASCII characters into ASCII-compatible…

Read more
How to optimise data synchronization with rsync

How to optimise data synchronization with rsync

rsync is a versatile synchronisation tool that simplifies file transfer over network connections and makes synchronising local directories more robust. With rsync, files can be transferred efficiently between different systems, with only the parts that have actually been changed…

Read more
What is tailgating and how to protect your company

What is tailgating and how to protect your company

While many companies focus on protecting themselves against digital attacks, it’s important not to underestimate the importance of physical security. Tailgating is one such threat. While not based on the latest technology, it still poses a significant danger. We’ll take a look at…

Read more
What are the best online backup services? A comparison

What are the best online backup services? A comparison

Many people use several devices and have data stored on them. What should you do if your data carrier fails or the data gets lost? Backing up data is extremely important and an online backup makes perfect sense. By doing this, you don’t risk losing your important files due to a…

Read more
What is the Cloud Computing Compliance Criteria Catalogue?

What is the Cloud Computing Compliance Criteria Catalogue?

Huge amounts of highly sensitive and personal data are stored in the cloud every day. That’s why it’s all the more important that cloud services providers are subject to strict security standards to ensure that this data remains protected. The BSI (Federal Office for Information…

Read more
What is port scanning?SP-PhotoShutterstock

What is port scanning?

It’s easy to lose track of all the different programs that are responsible for inbound and outbound data traffic. Networks hosting a large number of computer systems that are constantly communicating with online services often require technical backup. High-performance tools…

Read more
Page top