Security

PHP 7.2

PHP 7.2 – end-of-life (EOL) on November 30, 2020

PHP 7.2 will not be supported much longer. Now is the time to take advantage of the time left before the end-of-life date and replace outdated versions with more recent PHP code. This will make sure security gaps are closed, bugs are fixed, and the performance of web offers won’t fall short. The longer you wait, the more effort will be needed to update websites with dynamic web content.

Brute force attack: definition and protective measures

Brute force attacks: when passwords are served on a silver platter

Being constantly faced with headlines about stolen passwords, it’s understandable that many users are concerned. Your best bet is to make your passwords as complicated as possible and have them consist of many different types of characters. But even this won’t help if it’s the actual log-in area that isn’t secure enough. Even today, attackers are still successful with the notorious and simple...

Hash table

The hash table: fast database access to hash values

A hash table is created using the hash function. This is a method for reducing digital information in such a way that extensive data sets can be retrieved quickly in internet-based databases. This method also makes it possible to implement sophisticated security features using encryption when transferring data.

What is an operating system

What is an operating system

Although we use them on a daily basis, few of us know how an operating system actually works and what this important piece of software is used for. PC, laptop, smartphone, or tablet – even some fridges are now equipped with an operating system such as Windows, macOS, iOS, Android, or one of many Linux distributions.

E-mail account hacked: what now?

E-mail account hacked: what now?

E-Mail accounts are one of our most important communication tools: we use them to register for online portals, for private and business exchanges, and as an organiser and digital address book. It is therefore all the more important to make sure your account is well-protected. But what if your e-mail account does get hacked? Our guide explains what methods internet criminals use to gain access to...

Shoulder surfing

Shoulder surfing – an underestimated threat?

Malicious hackers gain unauthorised access to sensitive data by identifying weaknesses in security mechanisms and exploiting them. However, technical skills are not always required to be able to steal data. This is the case for shoulder surfing which exploits the greatest weakness of every computer system and security measure – the human being.

What is credential stuffing?

Credential stuffing: how security leaks become a data sieve

There are billions of stolen logins circulating on the dark web today. Hackers use these combinations of logins and passwords to break into user accounts and steal sensitive data using a technique known as ‘credential stuffing’. To protect your data, you need to know how credential stuffing works and what countermeasures you can take to protect yourself.

Chrome Updates

What is Chrome 68?

Early next month, Chrome 68 will be launched and the new browser will distrust all webpages that do not have HTTPS encryption as “not secure”. This is a big step in the recent trend towards emphasising user safety on the internet, a not entirely selfless strategy from Google. In this guide, we will explain what changes will be made, why they are happening, and how you can prepare your website...

TAN procedures

iTAN, mTAN, chipTAN? An overview of all TAN procedures

Security in online banking has always been a cornerstone of the industry – TAN procedures like chipTAN are what make it possible. However, there are also many other variants of this two-factor authentication system that can be used to protect your banking transactions. As they say, a chain is only as strong as its weakest link – and in this case, it’s the user. Find out which TAN procedures are...

What is web hosting?

What is web hosting?

Anyone who wants to launch a website on the internet will sooner or later come across the topic of hosting. But many users are unsure how web hosting works and what forms of hosting are available. However, everyone who runs a website should at least have a rough idea of what website hosting entails.


Wait! We’ve got something for you!
Get your .co.uk domain for just £1/1st year.

Enter the web address of your choice in the search bar to check its availability.
12 months for £1
then £10/year