WLAN security: how to make your wireless network into a fortress

When you’re travelling with portable devices, you’ll find public WLAN everywhere, giving you access to the world wide web. Even in residential and work spaces, practical wireless networking is widespread. It’s easy to forget that there’s a risk involved when transferring data using one of these access points. In the following article, we explain the biggest security risks and show you how to make your WLAN more secure. [...]  

HTTP 504 (Gateway Timeout): How to fix an error 504

If the error message ‘HTTP 504 Gateway Timeout’ appears when you attempt to open a website, it means that the allowed time for responding to browser queries has been exceeded. A lot of the time the culprit is not the web server itself, but instead some other component of the server, i.e. a gateway, which is integral to the path of communication. What does 504 gateway timeout mean? How can you fix the problem as a browser user or as a website operator? This and more can be read in our digital guide. [...]  

HTTP 400: Bad Request explained

Internet users are often confronted with error messages. HTTP status codes can be especially annoying, and even more so if you don’t understand what they mean. The message 'HTTP 400 – Bad Request' is a mystery for many internet users, but luckily it can be solved in most cases. We explain what the error message means and how to fix the error. [...]  

Debian: what does this Linux kernel offer?

Anyone looking to learn about Linux operating systems will come across Debian soon enough. The GNU/Linux distribution was one of the first of its kind and is still one of the most widely used today. Over 1,000 community members work on the Debian project, furthering the development of the collection. But how did Debian become so successful? And what makes this system software so interesting to server operators? [...]  

Malvertising: how to protect your computer

Malvertising is a growing problem for webmasters, online marketers and, last but not least, the millions of people who are affected every year. Behind this term is a sneaky method in which advertising banners are used to spread malicious software. No website is safe from this deceit – even well-known websites with millions of visitors have been compromised by these viruses. There are, however, countermeasures that you can take. Our article explains everything you need to know about how malvertising works and how to protect your website against it. [...]  

What is Slack – what can it be used for?

What is Slack? This program with its memorable name is used for internal company communication but what exactly can Slack do? And is it worth switching over to it? We outline some of Slack’s key features so you can decide for yourself whether the new Silicon Valley program might be something for you or your company. [...]  

Reading habits on the web: keep your online content snappy

When it comes to content design, trends are always moving forward. Long-established patterns in the offline world have moved into the digital age and evolved into a whole new way of reading web pages. In both conveying and consuming information, our online behaviour has changed our communication and reading habits. Online content is now scanned rather than read word-for-word. These developments have knock-on effects in the world of online marketing. [...]  

Geo-targeting: the regional optimization of web content and how it works

Geotargeting is a unique way of directly addressing a target group using its geographical information. Many websites and applications used on mobile devices use the device data in order to locate their users. Knowing an individual user’s location allows website owners and app providers to tailor their content and advertising directly to the user in his or her respective region. But geotargeting does have its limits, namely the choice of available localization methods and the possibility of anonymous surfing. [...]  

IP Spoofing: Simple manipulation of data packets by attackers

Sending data over networks is one of the most important and highest utilised functions of the modern computer era. But the structure of the necessary TCP/IP connections makes it all too easy for criminals to intercept data packets along their way and either view or alter their contents. One of the most common methods of attack is IP spoofing, which allows DoS and DDoS attacks, among other things that cannot be traced back to the attacker. [...]  

Network protocol: The basis of electronic data exchange

For computer systems to be able to communicate with each other and exchange information, they need common ground, just like humans must share a common language. But computers don’t rely on foreign language lessons, and instead only need the appropriate network protocol to successfully communicate. This provides guidelines and structures for the data transfer, and so plays a decisive role in the ultimate arrival of sent data packets to the addressee. [...]