The EU plans to significantly tighten data security online: With the ePrivacy regulation, the collection of personal data should only be allowed following explicit allowance. At this point, it’s not certain what exactly will be included in the ePrivacy regulation: We’ve consolidated for you here what we already know. As website operators, it makes sense to inform yourselves now as to which changes [...]
In the days of mainframe computers and the first smaller networks, terminals were a crucial building block for sharing hardware and software resources. It is no coincidence that terminal servers – the central administrative entity of such networks – are in demand decades later, now that applications are to be made available to multiple users.
On 25 May 2018 a new European law on data protection will take effect. However, many companies and website operators are unprepared for the new General Data Protection Regulation (GDPR) despite it being relevant to their day-to-day business. On top of this, high fines will be imposed for those violating the regulations. Here we summarize everything worth knowing on the new EU GDPR for [...]
Numerous companies and nonprofit organizations offer web search services beyond the Google algorithm. The competition is usually stuck with an outsider status but they also present interesting approaches and innovative business models that don’t necessarily rely on the advertising industry. The trend toward anonymous web searches is also starting to appeal to more and more users, meaning that [...]
To ensure that your newsletter campaigns continue to be effective in the future, you shouldn’t miss these e-mail marketing trends in 2018: more automation possibilities, new design options, stricter data protection, and things that are made possible thanks to artificial intelligence. In our article on this year’s newsletter trends, we explain what you should look for in your future strategies and [...]
Operating and managing a remote server located in a data center is often carried out by using a secure network connection provided by the SSH protocol. The necessary registration on the server is preceded by an authentication process. Usually this occurs in the form of the username and password. Alternative methods such as the public key authentication used by SSH, do have their advantages. But [...]
When we shop online, book vacations, and search for gift ideas, we hardly give a second thought to the fact that each search entry leaves behind a trail of our identity. Busy web bots are never far behind and sweep up this information. The result of all of this is Big Data: massive volumes of data that are analyzed and used for a variety of reasons. But is there reason to be wary of leaving behind [...]
For website operators looking to increase their outreach, the advantages of social media buttons are obvious; content can be spread and followers can be generated with just one click of the ‘Tweet’ button, the ‘Like on Facebook’ social plugin, or the ‘Follow on Instagram’ link. These helpful extensions are great tools for expanding an internet presence, but critics warn that these plugins don’t go [...]
Many only know internet identity theft and similar crimes from movies or television. But stories of online fraudsters are not just mere phantasies of screenwriters; for many the experience is all too real. Online identity theft has become more and more of a problem over the past few years, and everyone is a potential victim. We have compiled some preventative steps than can help you stay out of [...]
Practically every PC user fears Trojan horses and computer viruses. Security is paramount if you are managing sensitive data or setting up a server. You need a comprehensive security concept to protect yourself against insidious malware. It’s helpful to know the different types of malicious software that exist, and how to combat and safely remove them.