Data Protection

Server Name Indication

What is server name identification, really? Encryption technologies play a big role when it comes to surfing on the net. Credit card data and other personal information must not fall into the hands of criminals. For now, TLS is one of the protocols used for this purpose. But it has a disadvantage: it only functions when each IP address only hosts one domain. If multiple virtual services are...

Using SSH keys for your network connection

Operating and managing a remote server located in a data center is often carried out by using a secure network connection provided by the SSH protocol. The necessary registration on the server is preceded by an authentication process. Usually this occurs in the form of the username and password. Alternative methods such as the public key authentication used by SSH, do have their advantages. But...

What is Big Data?

When we shop online, book vacations, and search for gift ideas, we hardly give a second thought to the fact that each search entry leaves behind a trail of our identity. Busy web bots are never far behind and sweep up this information. The result of all of this is Big Data: massive volumes of data that are analyzed and used for a variety of reasons. But is there reason to be wary of leaving behind...

Social plugins and privacy

For website operators looking to increase their outreach, the advantages of social media buttons are obvious; content can be spread and followers can be generated with just one click of the ‘Tweet’ button, the ‘Like on Facebook’ social plugin, or the ‘Follow on Instagram’ link. These helpful extensions are great tools for expanding an internet presence, but critics warn that these plugins don’t go...

Online identity theft protection

Many only know internet identity theft and similar crimes from movies or television. But stories of online fraudsters are not just mere phantasies of screenwriters; for many the experience is all too real. Online identity theft has become more and more of a problem over the past few years, and everyone is a potential victim. We have compiled some preventative steps than can help you stay out of...

How to recognize and remove malware

Practically every PC user fears Trojan horses and computer viruses. Security is paramount if you are managing sensitive data or setting up a server. You need a comprehensive security concept to protect yourself against insidious malware. It’s helpful to know the different types of malicious software that exist, and how to combat and safely remove them.

A case for thinking global: Germany’s Impressum laws

In today’s globalized world, strong bull markets on the home front simply aren’t enough if you wish to turn your company into a true Unicorn. Branching out into the world is a task that requires understanding and respect for different cultures and their laws. Failing to take such nuances into account may not only turn potential clients and customers off, it can also be the source of other, more...

E-Mail encryption with PGP

Online privacy is a sensitive issue that affects experts and amateurs alike. Whether you’re posting on social networks, carrying out banking transactions, or buying from an online store, your data is not always sufficiently protected. The same applies to e-mails. Don’t let cyber criminals get their hands on your content by encrypting your e-mails.

Data protection in e-commerce

Data protection and security in the area of e-commerce can be particularly tricky. Users are constantly leaving behind traces online - regardless of whether they are making online orders or simply surfing the web. Consumer data can be of great interest to businesses. It gives them the opportunity to advertise and make offers to potential customers. But which data are you actually allowed to...

Data mining: analysis methods for big data

The total amount of data generated worldwide increases by 40% every year. Many companies seek to make use of the constantly increasing mountain of data in order to increase their e-commerce business. But making use of such Big Data alone doesn’t add any value — enter data mining. Below you can find a discussion of the various analysis approaches involved in data mining, to give you an idea of how...