Writing an order confirmation: what is it and how do I draw one up?

When an order is placed with you or your business, you ought to write up an order confirmation. This confirms to the person who has made the order that their purchase is being processed and also summarises all the relevant information, e.g., price, product details, delivery date, etc. But what exactly is an order confirmation and what should you be aware of when preparing such a document? [...]  

CRM tools: software for customer care

Customer care is one of the corner stones of a successful company – whether you are running an online shop or offering bank accounts. Even smaller companies can benefit from the use of CRM tools, which help to organise customer- or buyer data. These software systems automate and optimise the process of customer relationship management. [...]  

ZURB Foundation: The CSS framework for responsive frontends

If you don’t have a ready-made template or a homepage kit for the development of a front-end, but also don’t want to completely start from square one, then you should think about using a CSS framework such as ZURB Foundation. The open source solution offers a flexible grid system, numerous other pre-made code snippets, and everything you need to implement a responsive web presence. [...]  

E-Mail marketing basics: the double opt in process

An inbox full of spam is enough to grind anyone’s gears. Too many marketers try to worm their way into the inboxes of potential customers without seeking permission. The double opt in process is used in the UK to try to combat spam. To ensure you don’t drive any customers away or ruin your company’s reputation by sending undesired newsletters, you should look into the double opt in process. [...]  

How log file analysis works with GoAccess

The log files of web servers and cloud services reveal a lot about the users that access them. They contain information about which browser or operating system is being used, which search terms have been entered and how many different pages a user has accessed, for example. Since manually analyzing these extensive text files is nigh on impossible, you can use log file analysis programs such as GoAccess, which process corresponding information and present it in clear reports. [...]  

Domain grabbing & cybersquatting: the difference and legal consequences

Domain grabbing and cybersquatting are often used as synonyms, but there is a slight difference between the two. The former is a term for perfectly legitimate domain trading, whereas cybersquatting damages name rights and trademark laws and usually leads to disputes in court. We explain the difference and what trademark infringement can mean for you. [...]  

Error 404: what the error page means and how to use it

How often have you stumbled upon a dead end while surfing the net? HTTP 404 error pages are commonplace online to inform users that the requested page isn’t available. As well as being annoying for visitors, they spell bad news for website owners since a dead link may have a bad influence on a website’s search engine ranking. In this article, we’ll demonstrate the importance of 404 pages and explain how you can create your own. [...]  

Domain change: how to set up your new web address

If you own a website, you should know that it needs to be continually maintained and adjusted. But in addition to normal tasks such as administration, maintaining content, and web design, sometimes radical, fundamental changes need to be made. These are especially necessary if you decide to rename your website, a process which is known as a domain change. But how exactly does a website operator go about changing a domain name, and which aspects do they then need to consider? [...]  

Man-in-the-middle attack: attack patterns and countermeasures

A man-in-the-middle attack is a deceitful espionage attack which aims to listen, record, or manipulate sensitive data being sent between unsuspecting internet users. To do this, hackers rely on methods that enable them to position themselves, unnoticed, between two or more computers communicating with one another. We introduce you to some well-known attack patterns and countermeasures that can be taken against them for your protection. [...]  

Hardware firewall – the external security system

Most computer users are at least aware of the term firewall. When activated, they help protect computers. But notifications about blocked applications can become a source of irritation for many users, especially when the background information for such messages is unknown. But how do firewalls work? And what role do hardware firewalls play in protecting your computer? [...]