What is Internet Protocol? Definition and basics.

When networking a computer system, protocols play an important role. An example is the Internet Protocol, which was published in a first specification in 1981, and is the indispensable basis for the smooth sending and receiving of data packets. But what is behind the RFC standard? And how does the internet protocol actually work? [...]  

Two factor authentication: How to protect your accounts

Poorly secured accounts on the web have repeatedly led thousands of people to become victims of hacking or phishing attacks and lose control of their accounts. With a two factor authentication, accounts can effectively be protected against such cases. Because more than just a password is required for log-in, internet criminals can’t do much with the spied credentials. Here, we explain how two factor authentication works, and which methods exist for securing your accounts. [...]  

What is the AIDA model?

The AIDA model has been around for more than one hundred years and illustrates the basic knowledge of advertising research. The schematic representation of the purchasing decision-making process is in four successive phases and is reduced to show the essential steps. Some see this model as too simplified and believe it doesn’t adequately depict modern, multi-layered communication processes. As a result, numerous reinterpretations, modifications, and extensions of the AIDA model have been created. We introduce the classic and most famous alternative models. [...]  

ARP Spoofing – flaws in network security

When it comes to network security, administrators focus primarily on attacks from the internet. But often times, the danger lurks in the internal network. If the LAN turns out to be a blind spot in the security IT, then internal attackers have an easy time. A popular method of attack is ARP spoofing. With this, hackers switch undetected between two communication partners in order to intercept, read, or manipulate data traffic. What exactly is ARP spoofing and what types of countermeasures exist? [...]  

403 Forbidden: What does the http status code mean and how do you fix it?

Is your browser displaying an http error 403 instead of the web page you requested? This means that the web server has not granted you access to that page. The reason for this differs from case to case; sometimes the website operator as secured this area from being accessed but sometimes it’s simply a case of adjusting your browser settings. This article outlines the various causes of the http status code 403 and explains what you can do to fix it. [...]  

Node.js: the JavaScript runtime environment at a glance

With the software platform, Node.js, you can use JavaScript server-side and benefit from the asynchronous, event-based programming and the range of options for developing server applications. In this Node.js tutorial, we give you an overview of the program’s modular structure, explain how you can install program modules at any time using the integrated package manager, NPM, and use them to set up your first Node.js-based web server. [...]  

Log analysis: What the web server log reveals about your visitors

How many pages are accessed by a single user when they’re visiting your website? And which links or search queries did they use to lead them to you? To answer such questions, well-known web analysis tools like Google Analytics seem to be the only option. But the web server’s automatically generated log file also provides a solid foundation for user information. The following guide discusses the possibilities of log file analysis. [...]  

Newsletter subject line: how to make customers curious

E-mail advertising is the ideal supplement to online marketing methods such as SEO or SEA. With the correct newsletter subject line, you can attract the reader’s attention – but it is crucial to choose the right content and text. Here are a few important basic rules for increasing your newsletter’s opening rate and, with that, your conversions. [...]  

What is MAC spoofing?

MAC spoofing is a method by which unique hardware addresses are masked using a Locally Administered Address (LAA) in the software. MAC spoofing can offer protection for your privacy when using public LAN or WLAN networks, but can also be used for illegal network activities. We explain to you here how MAC spoofing works and which settings in Windows must be accessed in order to change your MAC address. [...]  

Pinterest for businesses

It would be a serious mistake not to take Pinterest seriously as a marketing platform. While it may look like an extensive photo album of recipe ideas, DIY tutorials, and dream holiday destinations, the truth is that the social media site can offer a valuable service: generating referral traffic for your company website. Brands can therefore use the platform to curate their image and attract new potential customers to your website. In this guide, you can find a summary of the most important facts and features. [...]