Security

Chrome 56: changes to make the web safer

Google is planning to label unsafe websites in Chrome

For two years now, Google has been actively promoting SSL encryption for websites. The search engine giant started acknowledging data transfer protection as a ranking factor in 2014, but now wants to go one step further. Users of Google’s browser, Chrome, will soon be actively warned about websites with unsafe data exchanges. This articles explains what the planned changes are and which...

Chrome Updates

What is Chrome 68?

Early next month, Chrome 68 will be launched and the new browser will distrust all webpages that do not have HTTPS encryption as “not secure”. This is a big step in the recent trend towards emphasising user safety on the internet, a not entirely selfless strategy from Google. In this guide, we will explain what changes will be made, why they are happening, and how you can prepare your website...

Best cloud storage providers

The best cloud storage providers – an overview of the best online storage

Storing files online on a cloud platform has become part of everyday life for many people. Regardless if it’s your own holiday photos, or important documents for work - storing files with online storage providers takes the load off your hard drive, and also ensures that they are available anytime and from anywhere. But what are the best cloud storage providers on the market? And what differences...

How do I convert my site to SSL and HTTPS?

Internet security: secure websites with SSL and HTTPS

The topic of data security is becoming increasingly important for both private users as well as in the business world. As a website owner, you should take all the necessary precautions to ensure that a visit to your site is as secure as possible. Converting from HTTP to HTTPS or SSL is an important step in securing your website and gaining your customers’ trust.

HSTS: Reliably secure your HTTPS connections

HSTS: How the HTTPS expansion works

HTTPS, the network protocol for TLS-encrypted data transfer online can be circumvented in some cases. The danger is that encrypted websites can be accessed via unencrypted HTTP. But the HTTPS extension HSTS (HTTP Strict Transport Security) forces website access via TLS encryption, closing the security gaps that hackers like to use to intercept the HTTPS connection during transport using...

How HTTP/2 optimizes the World Wide Web

HTTP/2 – how the new version optimises data transfer online

HTTP/2 has been released and is the official successor of the internet protocol HTTP/1.1. It is already compatible with most of the current web browsers and servers. Up to this point, many of the bigger website operators have switched to using the new transfer protocol. But what lies behind the Hyper Transfer Protocol and what are the advantages of the new version?

Has my e-mail been hacked? These tools reveal the truth

Has my e-mail been hacked? How to find out!

Large-scale hacker attacks constantly make their way into the news, which then causes panic among users. Hackers exploit e-mail addresses and passwords by using them for criminal purposes. Victims often don’t even realise that their data has been stolen. We introduce four tools to help you check whether your e-mail has been hacked.

Malvertising: what’s behind the cruel scam

Malvertising: how to protect your computer

Malvertising is a growing problem for webmasters, online marketers and, last but not least, the millions of people who are affected every year. Behind this term is a sneaky method in which advertising banners are used to spread malicious software. No website is safe from this deceit – even well-known websites with millions of visitors have been compromised by these viruses. There are, however,...

The best online backup services

Comparing the best online backup services

Many people use several devices and have data stored on them. What should you do if your data carrier fails or the data gets lost? Backing up data is extremely important and an online backup makes perfect sense. By doing this, you don’t risk losing your important files due to a system crash or criminal activitiy. What is the best option? Here is a comparison of online backup service providers.

SAML

SAML: the XML framework for SSO at a glance

Simplifying log-in processes makes websites more user friendly, and also helps to increase the security of user data. One of the most popular solutions for implementing authentication processes is SAML (security assertion mark-up language). Through a variety of components such as special protocols and message formats, this XML-based framework helps to implement internal and cross-company log-on...


Wait! We’ve got something for you!
Get your .co.uk domain now, the first year is free.

Enter the web address of your choice in the search bar to check its availability.
12 month for £0/year
then £10/year