SSL

Email encryption with SSL

Encrypted emails: How to encrypt your email traffic

Are the emails that you send and receive encrypted? If not, it’s about time you started. Only by encrypting the transmission and content of emails can you ensure that your data is secure while being sent. Otherwise, unauthorised persons can read your email traffic easily and possibly gain access to sensitive data such as passwords and bank information. We’ll show you the best protection...

QUIC – the Internet Transport Protocol based on UDP

QUIC: What is behind the experimental Google Protocol?

Quick UDP Internet Connections (QUIC for short), is an experimental network protocol from Google. Further development of the protocol is being driven by IETF, which has set up a dedicated group working towards it. The QUIC protocol is intended to offer a speed-optimized alternative to the current transport standard TCP and builds on the connectionless protocol UDP to achieve this.

Replacing an SSL Certificate affected by Browser Distrust

Replacing SSL (Secure Socket Layer) Certificates affected by browser distrust

Due to browser community distrust in Symantec, Google Chrome and Mozilla Firefox have decided to distrust websites with SSL certificates issued by Symantec before December 1st, 2017. This article outlines the steps and important key dates that website operators need to be aware of in order to sucessfully renew or replace their SSL certificates before their website is branded with a warning...

Use trust seals for a successful web store

Gain your customers’ trust with a trust seal

If you run an online shop, you’ll want users to not only browse your pages but to buy your products too. Getting a visitor to convert is your main focus. Quality content and strong references for your data security can strengthen users’ trust in your products. Trust seals can therefore help to clear any doubts users may have about the legitimacy of your store.

Securing servers with Fail2ban

Securing your server with Fail2ban

For server operators, security is of the utmost importance. Only those who have developed and set up a foolproof defence strategy are ready for drastic situations. As well as regular protection mechanisms, like security software, backups, and encryption, there are also some useful tools and frameworks that may come in handy in the fight against intruders. We have laid out the essential details on...

Using SSH keys for your network connection

How to use SSH keys for your network connection

Operating and managing a remote server located in a data centre is often carried out by using a secure network connection provided by the SSH protocol. The necessary registration on the server is preceded by an authentication process. Usually this occurs in the form of the username and password. Alternative methods such as the public key authentication used by SSH, do have their advantages. But...

E-mail etiquette: rules for the perfect e-mail

E-mail etiquette: tips for good internet communication

Every day, over 200 billion e-mails are sent around the world – although many of them aren’t received with much enthusiasm. In order for your business e-mails to stand out in all this chaos, you should pay attention to e-mail etiquette. If you stick to the most important rules, your e-mails will appear polite, but at the same time, serious. Messages like these will be happily answered.

Password managers: an overview of today’s best tools

Password manager – a glance at the best tools

Would you give your account number to a stranger? Most probably not. But millions of internet users may as well be giving away their personal data (and money!) when using passwords that hackers can crack in a matter of seconds. Password managers provide methods for creating and managing truly secure passwords.

What is a server? One term, two definitions

What is a server?

When talking about web hosting, it is impossible to avoid the term ‘server’. So what is a server? And how does it work? In IT, there are actually two definitions of the term. The traditional server is the software for network services, but more recently the word has also been used to describe the corresponding hardware used to carry out server programs. Here is our overview of the most common...


We’re all in this together. At IONOS we are
#hereforyou
Coronavirus is a challenge we need to face together.
We've created special offers on key products to help
your business keep going.
3 months free
Online Shop
Be where your customers are with your own online store.