Vero – True Social: a closer look at the hyped-up network

Where has this Vero – True Social suddenly come from? The social network has been experiencing a remarkable hype since the beginning of the year....

How to delete your Facebook account: a step-by-step guide

Recent scandals with Facebook’s data protection policies have left many users feeling betrayed by the social networking giant, which has been facing...

How to create the perfect out of office message

The out of office message is a crucial part of email communication in the workplace. If you don’t have access to your email, your contacts will want...

The best WhatsApp alternatives

Invitations to dinner parties; updates about work; an away day with your Sunday football team: if you’re not using WhatsApp, you run the risk of...

Servers by comparison in web hosting

Carry out a server comparison and you will notice that website operators have a large selection to choose from. Professional hosts offer virtual, dedicated, and cloud based servers in different performance levels. How do these server models differ from one another? What features does a root server have in comparison to a managed server? Which type of hosting is best for your web project? Take a...

Introduction to Linux directory rights

With Linux, access rights for directories and files are often set through the terminal. There, file owners can be defined and groups can be assigned. With the command, chmod, user classes can be assigned certain file rights. Access rights in the Unix file system can be changed in two different ways: symbolic or numeric. Find out more about both notation types here.

DoS: attack patterns and countermeasures

It is very important for a server service to always be available since this is directly related to an online company’s success. Many servers are susceptible to DoS and DDoS attacks, which cause overloads and trigger costly crashes . But which patterns do these attacks follow and which counter measures can be put into place in order to protect critical systems from being targeted?

Website security: how to protect your web presence

Would you leave your window open at night if you knew there were intruders lurking about? Obviously the answer to this question is ‘no’. Many companies and individuals leave their virtual window open to cyber criminals by not adequately protecting their websites. Website security is an extremely important topic. Only by regularly carrying out security checks and following the proper precautions...

Malware on the server: consequences and countermeasures

A website operator is responsible for the security of a web project as well as the content. Neglecting security may lead to hackers easily infiltrating the system through security gaps. If a malware-infected website goes unnoticed, it could cause serious damage. It is therefore important to make sure your site is fully protected.

Four reasons to switch to cloud hosting

Say goodbye to dedicated server hosting. The future belongs to the cloud. Still not sure if you should make the switch to flexible Cloud hosting? These four arguments for a contemporary web hosting strategy illustrate how you can achieve effective IT requirements for a competitive business.

Five excellent FTP programmes for web hosting

Are you familiar with the file transfer protocol also known as FTP? Those who answered this question negatively are advised to learn more about FTP by reading this guide. FTP immensely eases the task of transferring data over the internet. FTP servers are an especially wise choice when faced with the job of transferring large volumes of data. Transferring files to servers for exchange requires a...

Secure data transfers with WinSCP

Are you still transferring your data online over an unencrypted connection via FTP (File Transfer Protocol)? WinSCP offers a comfortable and secure alternative to the current FTP client programs for the operating system, Windows. The encrypted network connection is based on the implementation of Secure Shell (SHH) and enables a fast data transfer via SCP (Secure Copy) and the flexible remote...

WordPress Security – The most important security plugins

WordPress is among the most frequently used content management systems for blogs, forums and other online publishing platforms. With one million users its popularity means that it is also a hive for criminal activity with hackers scanning websites for possible weak areas. The only way to prevent hackers from gaining back door access is by taking adequate safety precautions.

SAN storage: how to safely store large volumes of data

Due to rising worldwide data usage, more and more companies around the world are moving away from dedicated data servers and instead opting for more holistic solutions in the form of centrally stored data networks. This structure is carried out in the form of storage area networks, or SANs. SAN storage users profit from quick data access and comprehensive hardware redundancy.