Man-in-the-middle attack: attack patterns and countermeasures

A man-in-the-middle attack is a deceitful espionage attack which aims to listen, record, or manipulate sensitive data being sent between unsuspecting internet users. To do this, hackers rely on methods that enable them to position themselves, unnoticed, between two or more computers communicating with one another. We introduce you to some well-known attack patterns and countermeasures that can be...

Hardware firewall – the external security system

Most computer users are at least aware of the term firewall. When activated, they help protect computers. But notifications about blocked applications can become a source of irritation for many users, especially when the background information for such messages is unknown. But how do firewalls work? And what role do hardware firewalls play in protecting your computer?

Cybersecurity – digitally protected on the go

More and more dangers are creeping into the digital world. So it is no surprise that the issue of cybersecurity is gaining more and more weight and is taking a leading role in the fight against cybercrime. But how can you protect yourself from dangers on the network? And what is the current state in the UK? We provide you with an overview of this.

Alternatives to ownCloud: an overview of the best hosts

When it comes to cloud storage services with synchronisation functions, many users see ownCloud as the most reliable option. That being said, it is also worth broadening your perspective, as the best alternatives to ownCloud also offer some other interesting features, which cloud storage service enthusiasts should not be missing out on. This article is here to help you find the alternative to...

Installing and configuring an Apache web server

The Apache http server is the standard web server for providing HTTP documents on the internet. But did you know it’s also possible to install an apache web server locally on your Windows PC? This is a great method of testing out web pages and checking scripts. To get started, all you need is the free software package and a few minutes.

Server migration: how to transfer your data to a new server

Moving to a new server can become a real challenge even when you’re not changing provider. You need to take care and plan your strategy well. This is the only way to ensure the integrity of the data transferred to a new server and to keep downtime to a minimum. But what exactly is server data migration? And what problems can be expected during implementation?

Securing your server with Fail2ban

For server operators, security is of the utmost importance. Only those who have developed and set up a foolproof defence strategy are ready for drastic situations. As well as regular protection mechanisms, like security software, backups, and encryption, there are also some useful tools and frameworks that may come in handy in the fight against intruders. We have laid out the essential details on...

What is a web server? And which web server software is there?

The equation is simple - without it, there’s simply no web content: when a web server is out of order, then it’s no longer possible to call up any websites that are connected to it. Web servers are what allow online presences to reach the internet in the first place. But just how do these systems work? Which functions do the programmes responsible for this task offer? And what’s an example of a...

What is a floating IP?

IP addresses are essential for modern digital communication. They are the 'connection numbers' of all devices in the network and this is why they are one of key foundation elements of the internet as well as other networks. Communication is based on a common 'language': the internet protocol. But what exactly is a floating IP and what is it used for? What is the difference between a floating IP of...

What is a VPS (virtual private server)?

A virtual private server (VPS) is a compromise between shared hosting and a dedicated server. The VPS product allows web hosts to combine the strengths of both hosting models in one, cost-efficient IaaS solution. We’ll take a closer look at this hosting solution, demonstrating how a virtual private server works, exploring the advantages and disadvantages of it, and deciding who the model is best...