How log file analysis works with GoAccess

The log files of web servers and cloud services reveal a lot about the users that access them. They contain information about which browser or operating system is being used, which search terms have been entered and how many different pages a user has accessed, for example. Since manually analyzing these extensive text files is nigh on impossible, you can use log file analysis programs such as GoAccess, which process corresponding information and present it in clear reports. [...]  

Domain grabbing & cybersquatting: the difference and legal consequences

Domain grabbing and cybersquatting are often used as synonyms, but there is a slight difference between the two. The former is a term for perfectly legitimate domain trading, whereas cybersquatting damages name rights and trademark laws and usually leads to disputes in court. We explain the difference and what trademark infringement can mean for you. [...]  

Error 404: what the error page means and how to use it

How often have you stumbled upon a dead end while surfing the net? HTTP 404 error pages are commonplace online to inform users that the requested page isn’t available. As well as being annoying for visitors, they spell bad news for website owners since a dead link may have a bad influence on a website’s search engine ranking. In this article, we’ll demonstrate the importance of 404 pages and explain how you can create your own. [...]  

Domain change: how to set up your new web address

If you own a website, you should know that it needs to be continually maintained and adjusted. But in addition to normal tasks such as administration, maintaining content, and web design, sometimes radical, fundamental changes need to be made. These are especially necessary if you decide to rename your website, a process which is known as a domain change. But how exactly does a website operator go about changing a domain name, and which aspects do they then need to consider? [...]  

Man-in-the-middle attack: attack patterns and countermeasures

A man-in-the-middle attack is a deceitful espionage attack which aims to listen, record, or manipulate sensitive data being sent between unsuspecting internet users. To do this, hackers rely on methods that enable them to position themselves, unnoticed, between two or more computers communicating with one another. We introduce you to some well-known attack patterns and countermeasures that can be taken against them for your protection. [...]  

Hardware firewall – the external security system

Most computer users are at least aware of the term firewall. When activated, they help protect computers. But announcements about blocked applications can become a source of irritation for many users, especially when the background information for such messages is unknown. But how do firewalls work? And what role do hardware firewalls play in protecting your computer? [...]  

Mobile app design: create your own app – part 3

Designing an application isn’t just a question of shapes and colors – mobile app design covers the positioning of app content and app usability, too – and these factors are vital in helping create a successful app. The more time and effort you invest at this stage, the higher the chance of creating an app that people will want to use and keep on their device. [...]  

Create your own app – part two: app makers

If you want to create your own native mobile app, you’ll need to think about the technical implementation of it. When it comes to classic programming, integrated development environments are useful tools to help make the process easier. But since this requires prior knowledge of software development, many beginners prefer to find an alternative option. The answer for inexperienced users usually lies in specialized app makers. These require no coding experience and sometimes come with a surprising array of functions. We’ll show you how they work. [...]  

Cybersecurity – digitally protected on the go

More and more dangers are creeping into the digital world. So it is no surprise that the issue of cybersecurity is gaining more and more weight and is taking a leading role in the fight against cybercrime. But how can you protect yourself from dangers on the network? And what is the current state in the US? We provide you with an overview of this.  [...]  

More security online: sign e-mails with a digital signature

Spam e-mails may be annoying, but they’re mostly harmless. What’s more problematic is phishing – a technique whereby fraudsters try to con you by posing as trustworthy sender addresses in an attempt to get hold of sensitive data. These messages appear genuine too, because without a digital signature, it’s very easy to assume a trusted identity online. In order to protect customers and their own reputations, businesses operating online should be fully aware of the importance of electronic signatures. Find out more about how they function here. [...]