Security

Ping flood

Ping flood

The ping flood is a type of denial-of-service attack that can affect commercial providers and home users alike. This attack relies on the ICMP protocol and the ping command. In order to unleash a particularly powerful flood, attackers often use a network of bots. Learn how the ping flood works and how you can protect yourself from one.

Gain users’ confidence with a privacy policy

Getting a privacy policy for your website

An important part of a website that many operators underestimate is the privacy policy. This notifies site visitors of the information they are disclosing about themselves and what their data will be used for. But what kind of information should this declaration contain, what has changed since the EU General Data Protection Regulation law came in to action?

Create WordPress backup

How to back up your WordPress site

WordPress backups allow you to safeguard websites created with the WordPress content management system in the event of unintended data loss. You have the ability to regularly back up WordPress sites with the help of your provider or cloud service provider. On the other hand, a manual backup requires a little extra work but gives you full control.

Windows 10: creating a backup

Windows 10 backup: how the data backup works

In Windows 10, making a backup is the most secure way to protect your data in the event of a system crash or hardware issue. The Windows 10 backup allows you to save all your programs, private data, and system settings as an exact system image. If your computer or laptop gets damaged, the Windows 10 backup can easily be transferred to another device.

What is a backup?

What is a backup and how does it effectively protect your data?

Technical issues, hacker attacks, and malware can lead to costly and serious data loss at any time. To minimise the risks, it is recommended that you perform regular comprehensive backups. It is important to have a suitable backup strategy that properly meets your specific requirements.

Windows 8: creating backups

How to back up Windows 8 computers: tutorial

A broken PC can be hugely frustrating for many reasons. In some situations, you may even need to replace the hardware, risking the loss of your vacation photos, documents, or important data. Creating a backup of your files can help prevent this situation. Windows 8 ships with its own tools for this purpose. We’ll provide a detailed overview of how Windows 8 backups work.

Protecting your e-mail address: how to do it

Protecting your email address: how to prevent spam

Spam robots, so-called harvesters, consistently search the internet for e-mail addresses that can be used for unlawful advertising, phishing e-mails, and spreading viruses, worms, and Trojans. You’re recommended to have your contact details on your website, but how do you stop them from being misused? This article gives you advice on how to protect your e-mail address.

How to identify phishing e-mails and protect your data

Identifying phishing e-mails: the telltale signs at a glance

Scammers send out dubious e-mails attempting to obtain sensitive data from internet users every day. This is known as phishing and isn’t just annoying; fraudulent e-mails cost millions each year as internet users fall victim to them. We reveal how to identify phishing e-mails and how to render your inbox harmless.

Ethical hacking

Ethical hacking – addressing security breaches and preventing cybercrime

Ethical hacking has been booming worldwide for several years. A growing number of companies voluntarily choose to be hacked and commission skilled IT professionals to target them by attacking their own infrastructure. Real stress tests under real conditions are intended to reveal weaknesses in their systems and prevent illegal hack attacks that could have dire consequences. The procedure is also...


Wait! We’ve got something for you!
Get your .co.uk domain for just £1/1st year.

Enter the web address of your choice in the search bar to check its availability.
12 months for £1
then £10/year