Honeypots: IT security through decoy programs

What is a honeypot?

Businesses use IDSs (intrusion detection systems) and firewalls in order to keep attackers away from sensitive IT systems. These safeguards can be enhanced through so-called honeypots, which bait hackers to isolated network areas where more information on their attack patterns can be collected. Find out more here on how honeypots work and with which programs honeypots can be implemented for both...

The Best Altcoins

Altcoin: What are the alternatives to Bitcoin?

Bitcoin’s success has spawned hundreds of cryptocurrencies now available on the market. Known as altcoins, they try to fix Bitcoin’s weaknesses or else have a completely different focus. In this article, we present the most popular and important alternatives to Bitcoin and explain their main differences: what are the advantages and disadvantages of each cryptocurrency?

Web analytics and data privacy

Web analytics: data privacy when creating a profile

Tracking tools can provide website operators with a useful indication on how to adapt an online project to suit a target group. These tools focus on user profiles, which reveal how users find the website, and which content provokes interactions. This information is based on user data, which can be subject to stringent data protection guidelines in some countries within the European Union. Find out...

ERR_SSL_PROTOCOL_ERROR: the best solutions

ERR_SSL_PROTOCOL_ERROR: how to fix the Chrome bug

Chrome is the world’s most widely-used internet browser. The application scores points not only when it comes to security and speed, but also with its features such as cross-device synchronisation of user data. But errors can occur even when surfing with Google’s wonder weapon. These can lead to the browser crashing or prevent certain pages from being accessed. The error message...

What is a VPN (virtual private network)?

VPN — secure data transfer through public networks

VPN implementations offer an affordable alternative for locally connecting networks, as well as making network resources available for external devices. In contrast to corporate networks, no private communication network is required. Instead, like the internet, VPNs rely on networks, and protect sensitive data through a process known as tunneling.

FileZilla: tutorial for the FTP client program

How to use FileZilla: a tutorial on the popular FTP client

FileZilla is considered to be the standard in software for transferring data between locally connected computers and online servers. The network protocol is able to transfer via FTP and its encrypted variants, SFTP and FTPS. We’ve created an overview of the client program’s features and break down the details of this program from installation to data transfer.

Chrome 56: changes to make the web safer

Google is planning to label unsafe websites in Chrome

For two years now, Google has been actively promoting SSL encryption for websites. The search engine giant started acknowledging data transfer protection as a ranking factor in 2014, but now wants to go one step further. Users of Google’s browser, Chrome, will soon be actively warned about websites with unsafe data exchanges. This articles explains what the planned changes are and which...

Two factor authentication: Protection for your accounts

Two factor authentication: How to protect your accounts

Poorly secured accounts on the web have repeatedly led thousands of people to become victims of hacking or phishing attacks and lose control of their accounts. With a two factor authentication, accounts can effectively be protected against such cases. Because more than just a password is required for log-in, internet criminals can’t do much with the spied credentials. Here, we explain how two...

Man-in-the-middle attack: an overview of attack patterns

Man-in-the-middle attack: attack patterns and countermeasures

A man-in-the-middle attack is a deceitful espionage attack which aims to listen, record, or manipulate sensitive data being sent between unsuspecting internet users. To do this, hackers rely on methods that enable them to position themselves, unnoticed, between two or more computers communicating with one another. We introduce you to some well-known attack patterns and countermeasures that can be...

Brute force attack: definition and protective measures

Brute force attacks: when passwords are served on a silver platter

Being constantly faced with headlines about stolen passwords, it’s understandable that many users are concerned. Your best bet is to make your passwords as complicated as possible and have them consist of many different types of characters. But even this won’t help if it’s the actual log-in area that isn’t secure enough. Even today, attackers are still successful with the notorious and simple...