SSL stripping: Basics and protection options

Data transmission via SSL/TLS is one of the most effective means to give a web project more security. Even before packets are sent, powerful algorithms ensure the encryption of the information. If third parties capture the data on the transmission path, the true content remains hidden from them. However, it becomes problematic if attackers are active with their tools, even before the encryption process has begun. This is the case with so called SSL stripping. [...]  

The right configuration to secure your server

If you operate or rent your own server, it is your responsibility to protect it against failures and external access. You can immediately begin to set the foundation for this when configuring the server, if you have the necessary administrative rights. The correct settings can work wonders, especially with encrypted remote connections via SSH protocol, and greatly increase security. [...]  

HTTPoxy: Threatening the security of CGI applications

Fifteen years after the discovery of the security flaw HTTPoxy, it’s still an issue with CGI applications. The reason for this is the fact that the Common Gateway Interface standard provides the use of environment variables to process HTTP requests. These can include header contents that modify the original proxy configuration, allowing hackers to redirect data packets to a completely foreign server. [...]  

White Paper – A document used for advertising with facts

How do you write a white paper? And what actually is white paper marketing? The term white paper can often create confusion as it is not clearly defined. This article gives you an overview of what types of white paper documents there are, as well as useful tips on how to create a white paper. [...]  

Affinity marketing: Advertising through reference groups

What is affinity marketing? This form of online marketing is relevant to all of us, whether we want it to be or not. The techniques of affinity-based advertising are particularly successful in e-commerce. This article defines the term affinity marketing, and provides information about the methods and relevance of this marketing technique. [...]  

Recommendation systems in e-commerce

Admittedly, automated systems also make mistakes, but overall, it’s quite impressive that online stores can suggest products that users like. By streaming movies and series, the respective platforms are able to 'learn' the users’ tastes and then generate playlists automatically. This isn’t a coincidence, but rather the ability of modern recommendation systems. [...]  

Spring – the framework for complex Java applications

Java doesn’t play a big role when it comes to simple web development, although the programming language has still maintained a strong appeal. The language, which is no longer supported by browsers, has established itself as an efficient solution finding tool, especially when designing backends for business applications. The Spring framework contains various modules that serve as a basis for complex web and desktop applications and significantly simplify programming when using Java. [...]  

Guerrilla marketing: effective ads in the age of advertising

In this era of Facebook, Twitter, etc. it’s more important than ever for businesses to attract consumers’ attention. But in such a barrage of multimedia ads, how do you succeed in getting noticed? Through the use of remarkable advertising techniques, so-called guerilla marketing offers the opportunity to reach millions of social media users worldwide. Welcome to guerilla marketing 2.0 – where anything goes as long as it’s original, and more importantly, generates plenty of clicks, likes, and shares. [...]  

Viral marketing: digital word of mouth

Targeted and intelligent advertising is the key to a company’s success – online as well as offline. In the ideal case, your own messages and content are so good that they will spread quickly, like a virus. Sometimes when advertising messages run under their own momentum, problems such as chaotic situations and reputation damage occur. But if you practice viral marketing correctly, you have the chance of achieving maximum success with minimum expenditure. [...]  

Neighbor Discovery Protocol (NDP) – what is it?

Network configurations today are done quickly. For those who do not rely on their own fixed settings for routers, computers, and more, the Internet Protocol family provides the appropriate set of automatic mechanisms to determine critical parameters, such as the default gateway, IP address, and MAC address. [...]