General Data Protection Regulation: new laws from 2018

On 25 May 2018 a new European law on data protection will take effect. However, many companies and website operators are unprepared for the new...

Gender marketing

What makes men and women tick? As we know, it’s not always the same thing. Advertisers have long been aware of this fact, and over the years, gender...

Behavioral targeting: tailored advertising on the internet

In the world of advertising, behavioral targeting is the method used by advertisers to record surfing behavior of potential customers, with the aim of categorizing visitors into key demographic groups. Website owners can create profiles based on users’ interests, preferences, and motives. This information determines the ad campaigns presented to the user, simultaneously reducing scattering loss [...]   

Learn PHP: a PHP tutorial

With a market share of more than 80%, PHP is the go-to scripting language for many programmers when it comes to creating dynamic content. Whether you’re operating your own weblog, running an internet forum, or designing an online shop, it’s likely that the software behind this will be written via PHP. Our PHP tutorial for beginners will introduce you to the basics of the popular scripting [...]   

What is Internet Protocol? Definition and basics.

When networking a computer system, protocols play an important role. An example is the Internet Protocol, which was published in a first specification in 1981, and is the indispensable basis for the smooth sending and receiving of data packets. But what is behind the RFC standard? And how does the internet protocol actually work?   

Two factor authentication: How to protect your accounts

Poorly secured accounts on the web have repeatedly led thousands of people to become victims of hacking or phishing attacks and lose control of their accounts. With a two factor authentication, accounts can effectively be protected against such cases. Because more than just a password is required for log-in, internet criminals can’t do much with the spied credentials. Here, we explain how two [...]   

What is the AIDA model?

The AIDA model has been around for more than one hundred years and illustrates the basic knowledge of advertising research. The schematic representation of the purchasing decision-making process is in four successive phases and is reduced to show the essential steps. Some see this model as too simplified and believe it doesn’t adequately depict modern, multi-layered communication processes. As a [...]   

ARP Spoofing – flaws in network security

When it comes to network security, administrators focus primarily on attacks from the internet. But often times, the danger lurks in the internal network. If the LAN turns out to be a blind spot in the security IT, then internal attackers have an easy time. A popular method of attack is ARP spoofing. With this, hackers switch undetected between two communication partners in order to intercept, [...]   

403 Forbidden: What does the http status code mean and how do you fix it?

Is your browser displaying an http error 403 instead of the web page you requested? This means that the web server has not granted you access to that page. The reason for this differs from case to case; sometimes the website operator as secured this area from being accessed but sometimes it’s simply a case of adjusting your browser settings. This article outlines the various causes of the http [...]   

Node.js: the JavaScript runtime environment at a glance

With the software platform, Node.js, you can use JavaScript server-side and benefit from the asynchronous, event-based programming and the range of options for developing server applications. In this Node.js tutorial, we give you an overview of the program’s modular structure, explain how you can install program modules at any time using the integrated package manager, NPM, and use them to set up [...]   

Log analysis: What the web server log reveals about your visitors

How many pages are accessed by a single user when they’re visiting your website? And which links or search queries did they use to lead them to you? To answer such questions, well-known web analysis tools like Google Analytics seem to be the only option. But the web server’s automatically generated log file also provides a solid foundation for user information. The following guide discusses the [...]   

Newsletter subject line: how to make customers curious

E-mail advertising is the ideal supplement to online marketing methods such as SEO or SEA. With the correct newsletter subject line, you can attract the reader’s attention – but it is crucial to choose the right content and text. Here are a few important basic rules for increasing your newsletter’s opening rate and, with that, your conversions.