Data Protection

Deleting a Google result and protecting personal data

Deleting personal data with Google

The internet never forgets – is it always true? In some cases, search engines are obliged to grant users permission to delete defamatory search results. If Google displays personal data that is outdated or of no interest to the public, users can request the search engine to delete links to that data from the results pages permanently. But what exactly is the ‘Right to be Forgotten’ act, and when...

Alternatives to Google

The most popular alternatives to Google

Numerous companies and nonprofit organizations offer web search services beyond the Google algorithm. The competition is usually stuck with an outsider status but they also present interesting approaches and innovative business models that don’t necessarily rely on the advertising industry. The trend toward anonymous web searches is also starting to appeal to more and more users, meaning that...

ePrivacy Regulation: About the EU’s privacy policy

ePrivacy regulation is on the way! What do you have to expect?

The EU plans to significantly tighten data security online: With the ePrivacy regulation, the collection of personal data should only be allowed following explicit allowance. At this point, it’s not certain what exactly will be included in the ePrivacy regulation: We’ve consolidated for you here what we already know. As website operators, it makes sense to inform yourselves now as to which changes...

Terminal Servers – the Secret Behind Remote Hosts

Terminal servers: definition, basics, and advantages

In the days of mainframe computers and the first smaller networks, terminals were a crucial building block for sharing hardware and software resources. It is no coincidence that terminal servers – the central administrative entity of such networks – are in demand decades later, now that applications are to be made available to multiple users.

Extranet

What is an extranet, and how can I use it?

Order status, product compatibility, updated delivery terms – manual transmission of data to business partners by mail or phone takes a lot of time. But this can also be done with less effort. The solution: an extranet. But what is an extranet? How do companies use it? This article looks at how to create an extranet, as well as the benefits and some disadvantages of using one.

Social plugins and privacy

Social plugins and privacy: how to use the ‘like’ button legally

For website operators looking to increase their outreach, the advantages of social media buttons are obvious; content can be spread and followers can be generated with just one click of the ‘Tweet’ button, the ‘Like on Facebook’ social plugin, or the ‘Follow on Instagram’ link. These helpful extensions are great tools for expanding an internet presence, but critics warn that these plugins don’t go...

Online identity theft protection

Online identity theft protection

Many only know internet identity theft and similar crimes from movies or television. But stories of online fraudsters are not just mere phantasies of screenwriters; for many the experience is all too real. Online identity theft has become more and more of a problem over the past few years, and everyone is a potential victim. We have compiled some preventative steps than can help you stay out of...

How to recognize and remove malware

Malicious software: how to recognize, remove, and prevent malware

Practically every PC user fears Trojan horses and computer viruses. Security is paramount if you are managing sensitive data or setting up a server. You need a comprehensive security concept to protect yourself against insidious malware. It’s helpful to know the different types of malicious software that exist, and how to combat and safely remove them.

Data mining: analysis methods for big data

Data mining: analysis methods for big data

The total amount of data generated worldwide increases by 40% every year. Many companies seek to make use of the constantly increasing mountain of data in order to increase their e-commerce business. But making use of such Big Data alone doesn’t add any value — enter data mining. Below you can find a discussion of the various analysis approaches involved in data mining, to give you an idea of how...

Tips for better website security

Website security: how to protect your web presence

Would you leave your window open at night if you knew there were intruders lurking about? Obviously the answer to this question is ‘no’. Many companies and individuals leave their virtual window open to cyber criminals by not adequately protecting their websites. Website security is an extremely important topic. Only by regularly carrying out security checks and following the proper precautions...