Security

The best PayPal alternatives

The 7 best alternatives to PayPal at a glance

The UK loves shopping online because it’s so convenient. Fast, easy, and secure payment methods have contributed to the rise of this sector. Until recently, online payment systems were heavily dominated by one industry heavyweight: PayPal. But not everyone is enthused by this payment method, having been criticised for both security as well as data protection issues. Fortunately, there are plenty...

Email encryption with SSL

Encrypted emails: How to encrypt your email traffic

Are the emails that you send and receive encrypted? If not, it’s about time you started. Only by encrypting the transmission and content of emails can you ensure that your data is secure while being sent. Otherwise, unauthorised persons can read your email traffic easily and possibly gain access to sensitive data such as passwords and bank information. We’ll show you the best protection...

How HTTP/2 optimizes the World Wide Web

HTTP/2 – how the new version optimises data transfer online

HTTP/2 has been released and is the official successor of the internet protocol HTTP/1.1. It is already compatible with most of the current web browsers and servers. Up to this point, many of the bigger website operators have switched to using the new transfer protocol. But what lies behind the Hyper Transfer Protocol and what are the advantages of the new version?

Malvertising: what’s behind the cruel scam

Malvertising: how to protect your computer

Malvertising is a growing problem for webmasters, online marketers and, last but not least, the millions of people who are affected every year. Behind this term is a sneaky method in which advertising banners are used to spread malicious software. No website is safe from this deceit – even well-known websites with millions of visitors have been compromised by these viruses. There are, however,...

Honeypots: IT security through decoy programs

What is a honeypot?

Businesses use IDSs (intrusion detection systems) and firewalls in order to keep attackers away from sensitive IT systems. These safeguards can be enhanced through so-called honeypots, which bait hackers to isolated network areas where more information on their attack patterns can be collected. Find out more here on how honeypots work and with which programs honeypots can be implemented for both...

How to Protect Access to your Cloud

Using cloud services securely

In the digital age, we are increasingly resorting to cloud services: At work, people collaborate on projects together in the cloud, and in their free time, they share photos from their last vacation. At the same time, cloud storage is by no means free from security risks. The multi-cloud environments of larger companies, in particular, are becoming a challenge for cloud security. Here, we will...

Man-in-the-middle attack: an overview of attack patterns

Man-in-the-middle attack: attack patterns and countermeasures

A man-in-the-middle attack is a deceitful espionage attack which aims to listen, record, or manipulate sensitive data being sent between unsuspecting internet users. To do this, hackers rely on methods that enable them to position themselves, unnoticed, between two or more computers communicating with one another. We introduce you to some well-known attack patterns and countermeasures that can be...

punycode

Punycode

Since the introduction of internationalised domain names in 2003, Punycode has been ubiquitous on the internet. Internet addresses like look peculiar, but fulfil an important function: They encode non-ASCII characters into ASCII-compatible character strings and therefore ensure a smooth flow in the network. How does this work, and why is Punycode criticised so often? We’ll tell you.

Using SSH keys for your network connection

How to use SSH keys for your network connection

Operating and managing a remote server located in a data centre is often carried out by using a secure network connection provided by the SSH protocol. The necessary registration on the server is preceded by an authentication process. Usually this occurs in the form of the username and password. Alternative methods such as the public key authentication used by SSH, do have their advantages. But...

Web analytics and data privacy

Web analytics: data privacy when creating a profile

Tracking tools can provide website operators with a useful indication on how to adapt an online project to suit a target group. These tools focus on user profiles, which reveal how users find the website, and which content provokes interactions. This information is based on user data, which can be subject to stringent data protection guidelines in some countries within the European Union. Find out...


Wait! We’ve got something for you!
Get your .co.uk domain for just £1/1st year.

Enter the web address of your choice in the search bar to check its availability.
12 months for £1
then £10/year