Security

WordPress cookie plugins

WordPress cookie plugins – the top 4 opt-in solutions

WordPress cookie plugins are an important component of any WordPress project because they ensure cookie compliance with a country’s legal requirements. Unless you’re using only technical cookies that are necessary for your web page to function, you should ask users permission to collect their information via cookies when they visit your WordPress page. Discover the four best plugins to create...

Ping flood

Ping flood

The ping flood is a type of denial-of-service attack that can affect commercial providers and home users alike. This attack relies on the ICMP protocol and the ping command. In order to unleash a particularly powerful flood, attackers often use a network of bots. Learn how the ping flood works and how you can protect yourself from one.

What is DoS (denial of service)?

Denial of service: what happens during a DoS attack?

Denial of service attacks – also called DoS attacks – are a relatively simple and effective method for cyber criminals to bring down a website, email traffic, or an entire network. Besides businesses, institutions such as the German parliament or Wikipedia have been victims of these types of attacks. This has raised the question: What exactly is denial of service, and what happens during an...

Finding a website host: how to search successfully

Host: how to find out which provider is most suitable for your project

If you want to release a new web project today, you need to find the right host. Hosts have become a popular alternative for large companies, since they enable convenient outsourcing of certain work areas or data, saving company resources. But how do you know which host and which hosting package best meets your needs? And why is the provider’s security concept such a crucial criterion nowadays?

Windows 7: End of Life

Windows 7 end of support: What you need to do?

Even years after it was first released, Windows 7 continues to be one of the favourite operating systems worldwide. But with Microsoft announcing the end of its support for Windows 7, many PC users will need to upgrade or look for an alternative. But just because Windows 7 has reached the end of its life, doesn’t mean the software is no longer working. Windows 7 EOL means that Microsoft will no...

Intrusion detection systems and prevention systems

The intrusion detection and intrusion prevention systems at a glance

A stable network is characterised not only by the appropriate hardware structures, but also by a watertight security concept. In addition to back-up solutions and intelligent fail-safe systems, protection against external access attempts is a must. Intrusion detection systems (IDS) and intrusion protection systems (IPS) are an excellent addition to the classic firewall and are therefore a sensible...

Turn on Windows Defender

Turn on Windows Defender for basic protection

Windows Defender is Microsoft’s free antivirus software that allows users to protect their PC from harmful programs and cyberattacks. Defender now comes preinstalled on most Windows machines. In the past, it has attracted criticism, but with the roll-out of Windows 10, it provides good baseline protection. Turning on Windows Defender enables you to use a range of modern antivirus features to...

What is an SPF record?

Understanding and using SPF records

How can the recipient of an email tell whether a message is actually coming from the person who appears to be sending it? Many scammers attempt to forge the email sender address. But you can protect yourself. You can verify the outbound mail server using the SPF (Sender Policy Framework), a popular authentication method. How does SPF work and what can it do?

What is greylisting?

What is greylisting?

Greylisting is an effective method for preventing mass spam emails from being sent out. Since this process happens in the background, most users are unaware that their inbox is being protected by greylisting. Here you will learn exactly how this method works on a technical level.

UDP flood

UDP flood

UDP flood attacks have been used in the past for denial-of-service attacks. Even servers for major organisations have collapsed under the massive amounts of data. We’ll explain how a UDP flood attack works and provide you with an overview of its technical background, proven security measures, and how it is different from other DoS attacks.


Wait! We’ve got something for you!
Get your .co.uk domain for just £1/1st year.

Enter the web address of your choice in the search bar to check its availability.
12 month for £1/1st year
then £10/year