Data Protection

What is a proxy server?

What is a proxy server?

A proxy server is a network component that provides an interface between a private network and the internet. A proxy makes it possible to have an influence on the data traffic, to cache packet data, and to conceal the identity of the communication partners by using different IP addresses.

Image copyright online

The most important facts on image copyright online

Just because a photograph or artwork is available to view on the internet, doesn’t mean that you can use it for your own purposes. The creator’s consent and payment for royalties are often required. The rules don’t solely apply to sharing images that don’t belong to you; even if you use your own, you have to stick to certain guidelines.

What is the EU-US Privacy-Shield?

EU-US Privacy Shield: What the replacement for Safe Harbor means for us

What is the Privacy Shield? The Safe Harbor Agreement’s successor raises questions for many stakeholders in the EU. Even if clear rules for data storage have been assured, there are still countless exceptions. However, the provisions for data storage are particularly important for online companies. This text provides an overview of the EU-US Privacy Shield agreement, which aims to establish legal...

S/MIME: the standard method for e-mail encryption

S/MIME: how to encrypt and sign your e-mails

If you send an e-mail without additional security measures, it’s like sending a postcard: if everything goes as planned, the information should arrive unchanged and unread in the recipient’s inbox. However, if someone intercepts the card or the e-mail in transit, they can read the contents without any problem and make as many changes as possible. Just like you would use an opaque envelope to...

Finding a website host: how to search successfully

Host: how to find out which provider is most suitable for your project

If you want to release a new web project today, you need to find the right host. Hosts have become a popular alternative for large companies, since they enable convenient outsourcing of certain work areas or data, saving company resources. But how do you know which host and which hosting package best meets your needs? And why is the provider’s security concept such a crucial criterion nowadays?

E-mail account hacked: what now?

E-mail account hacked: what now?

E-Mail accounts are one of our most important communication tools: we use them to register for online portals, for private and business exchanges, and as an organizer and digital address book. It is therefore all the more important to make sure your account is well-protected. But what if your e-mail account does get hacked? Our guide explains what methods internet criminals use to gain access to...

Scamming: How to protect yourself against online fraud

Scamming: What is behind the fraud?

The internet is not new territory for scammers: Scamming encompasses all tricks that criminals use online in chats, via mail, or over social networks, to get unsuspecting people to give them their money. The criminals play their victims through deceitful methods on almost every platform across the internet: They build up a relationship, and eventually, lead their victims to make advance money...

PrestaShop – the modular system for e-commerce

PrestaShop: the shop platform with HQ in Europe and Miami

The search for the perfect software to meet your requirements of design and functionality for e-commerce can be a long and tedious affair. Some platforms just don’t quite give you the design you’re after, while others might look great but lack important shop functions like flexible payment methods, legal certainty, or optimization for mobile devices. PrestaShop was developed especially for...

Display advertising vs. real-time advertising (RTA)

Display advertising/display marketing vs. real-time advertising (RTA)

Banner ads and other forms of display marketing have been proven to be effective marketing strategies for products and services online. The new practice in this field is real-time advertising (RTA) and its real-time bidding (RTB) approach. This new strategy carries out an automated bidding war in milliseconds to decide which ad will be displayed. But how does it differ from traditional display...

What is a network attached storage (NAS)?

Network attached storage (NAS): the basics of network storage

Growing sums of data require cost-effective, high-performance storage solutions. One option for fulfilling this requirement is a network attached storage. In business contexts, this model has already established itself as a viable alternative to file servers, hard drives, and the cloud. Private users have also caught on and use NAS systems at home. But what is a NAS? Read on, and we’ll show you...