Security

What is a botnet?

Botnets: definition and protection tips

Botnets are tricky to spot, but they’re all over the internet and they cause all kinds of damage every day. They lurk inconspicuously in the background and use millions of private computers for malicious purposes. This guide explains how botnets work, how to keep them away, and how you can avoid falling victim to an illegal network.

What is SIEM?

What is SIEM (Security Information and Event Management)?

Security gaps in IT infrastructure can risk a company’s reputation or even threaten its survival. Where criminals manage to shut down company networks or gain access to sensitive data, financial and image-related damage becomes a certainty. SIEM (Security Information and Event Management) allows businesses to detect danger in real-time, allowing for appropriate and timely reactions.

What is IAM (Identity and Access Management)?

IAM – What is Identity and Access Management?

In any system based on user accounts, Identity and Access Management has a role to play. So does every application use IAM? How important are Identity and Access Management systems when it comes to corporate compliance? And what features do these systems offer?

Windows 7 password reset

Windows 7 password reset – step by step

Passwords provide vital protection for private documents, pictures, and online banking information. In order to ensure sufficient protection, it is important to create very strong passwords and to change them on a regular basis. One of your most important passwords is the one you use for your operating system. This guide will explain how to change your Windows 7 password in five simple steps.

WireGuard VPN: Basics

WireGuard VPN: the basics

Virtual private networks are becoming more and more popular among end users. However, the widespread VPN protocols are not optimised for modern use. With WireGuard, a lean alternative is now generally available. Boasting energy efficiency and low requirements on hardware, WireGuard could establish itself as the standard VPN solution of the future.

What is DevSecOps?

What is DevSecOps and what are its uses?

DevSecOps is the optimal approach for achieving faster software development, without having to make any cutbacks to security. Security packages are directly integrated into the development process. We’ll explain its pros and cons and clarify the various possibilities for using the system.

HPKP: The security feature for SSL/TLS certification

HPKP: What is behind the public-key pinning extension for HTTP

SSL/TLS certificates play an increasingly important role in the transmission of sensitive data. They guarantee that data packets reach the desired addressee without any detours. Problems only arise when internet users are deliberately redirected by invalid certificates from dubious certification bodies – a scenario that can be prevented using so-called HTTP public key pinning (HPKP).

Hash function

What is a hash function? Definition, usage, and examples

Hash functions are used in many areas of computer science. They generate hash values that represent digital information in a consistent manner according to defined parameters. They provide additional security (using encryption) during data transmission and allow data to be accessed more quickly. We explain what hash functions are, how they are used and provide some examples.

Scamming: How to protect yourself against online fraud

Scamming: What is behind the fraud?

The internet is not new territory for scammers: Scamming encompasses all tricks that criminals use online in chats, via mail, or over social networks, to get unsuspecting people to give them their money. The criminals play their victims through deceitful methods on almost every platform across the internet: They build up a relationship, and eventually, lead their victims to make advance money...


Wait! We’ve got something for you!
Get your .co.uk domain for just £1/1st year.

Enter the web address of your choice in the search bar to check its availability.
12 months for £1
then £10/year