Security

SSL stripping – how to protect your web project

SSL stripping: Basics and protection options

Data transmission via SSL/TLS is one of the most effective means to give a web project more security. Even before packets are sent, powerful algorithms ensure the encryption of the information. If third parties capture the data on the transmission path, the true content remains hidden from them. However, it becomes problematic if attackers are active with their tools before the encryption process...

StartTLS

StartTLS

StartTLS initiates encryption of an e-mail based on the TLS protocol. For this purpose, the server is pinged without encryption first of all, and StartTLS support is requested. The encryption method can be used when the answer is positive. StartTLS is handy, as e-mails are encrypted automatically once the method has been accepted. You don't need to contact a dedicated port, StartTLS can simply be...

Securing a server: correctly configuring Linux, etc.

The right configuration to secure your server

If you operate or rent your own server, it is your responsibility to protect it against failures and external access. You can immediately begin to set the foundation for this when configuring the server, if you have the necessary administrative rights. The correct settings can work wonders, especially with encrypted remote connections via SSH protocol, and greatly increase security.

Creating an IT disaster recovery plan

For when the going gets tough: the IT disaster recovery plan

For businesses, a reliable IT infrastructure is just as integral to day-to-day operations as competent management, productive employees, and reasonable working conditions. A server outage is able to paralyse an entire company. Adequate preparation can help prevent some of the most common errors from occurring; unforeseen risks, however, will always remain a factor. In order to be on top of your...

Google account recovery

How can I recover my Google account?

So, you deleted your Google account but have since decided that you still want to use it? Don’t worry! We’ll show you how to recover your Google account. Providing you deleted your account recently the account recovery process is fairly simple. In fact, there are several options for restoring your data.

Turn off Windows Defender

How to turn off Windows Defender

Windows Defender is free and reliable virus protection provided by Microsoft. It comes pre-installed and activated on all new PCs running Windows 10. But if you’d prefer to use products from other security providers, you should first disable Windows Defender. That’s because multiple antivirus programs running at the same time can block each other in some instances.

SQL injection: Fundamentals and safeguards

SQL Injection: Protect your database system

There are daily reports on how security gaps in applications are exploited – because hardly a day goes by without a new gap being discovered or a known gap being closed. One attack method, which has always been based on exploiting such weak points, is called SQL injection. But what is actually hidden behind the malicious database exploitation and how can you protect your database system from it?

Zero-day exploit

Zero-day exploit: Explanation and protection measures

The risk for businesses to fall victim to a zero-day exploit has increased in recent years. More and more often, cybercriminals can take advantage of as-yet undiscovered weak points in business software in order to steal or manipulate data. It is difficult to protect against these attacks, but businesses can take some measures to improve their security.

What is a reverse proxy?

Reverse proxy server – core components in security architecture

Cyber criminality is a big issue for most companies’ IT departments. Online attacks threaten the security of private networks and cause millions of dollars of damage per year. Popular targets are servers that provide online services and therefore require a permanent internet connection. An extra layer of security can be applied by using an upstream network component – the reverse proxy. This...

Cloud Act

CLOUD Act vs. Data Privacy and Control

In its fight against terrorism and crime, the USA continues to add measures of protection, including the Patriot Act, Safe Harbor, Privacy Shield; and for over 16 months the US CLOUD Act. All these measures keep the debate on data protection and digital sovereignty alive, particularly for trade nations such as the UK.


Wait! We’ve got something for you!
Get your .co.uk domain for just £1/1st year.

Enter the web address of your choice in the search bar to check its availability.
12 months for £1
then £10/year