What is Meltdown?

What is Meltdown

Meltdown is a security vulnerability published in 2018 together with Spectre. It is due to a vulnerability in the hardware architecture of processors and allows unauthorized reading of the memory contents of third-party processes. Processors from various manufacturers such as x86 processors from Intel are affected. Software patches to fix the problem cause performance degradation. …

What is Meltdown? Read More »

What is AES (Advanced Encryption Standard)?

What is AES Advanced Encryption Standard

The Advanced Encryption Standard (AES) is a very secure symmetric encryption method. It works with block ciphers and is the successor of the Data Encryption Standard (DES). Worldwide, AES is used in many different areas. What is AES (Advanced Encryption Standard)? The abbreviation AES stands for Advanced Encryption Standard and denotes an algorithm for symmetric …

What is AES (Advanced Encryption Standard)? Read More »

What is The Tor Network?

What is the Tor network

The Tor Network (simply Tor for short) aims to provide anonymous Internet browsing for all users. Tor uses the principle of onion routing to encrypt users’ connections and transfer data on the Internet. In this way, it allows anonymous, secure surfing on the Internet. What is the Tor network? The beginnings of Tor can be …

What is The Tor Network? Read More »

What is end-to-end encryption (E2EE)?

What is end-to-end encryption (E2EE)?

End-to-end encryption ensures secure communication between two partners. The encryption and decryption of the transmitted information are performed directly by the two communication partners. Other stations involved in the transmission cannot access the information. What is end-to-end encryption (E2EE)? The English term for end-to-end encryption is end-to-end encryption, abbreviated E2EE. End-to-end encryption enables the secure …

What is end-to-end encryption (E2EE)? Read More »

What is TOTP? Time-based One-time Password Algorithm (TOTP)!

what is totp

The Time-based One-time Password Algorithm generates time-limited valid passwords that can only be used once. The algorithm can be used for secure two-factor authentication via app or token. TOTP was developed by the Initiative For Open Authentication (OATH). What is TOTP? The abbreviation TOTP stands for Time-based One-time Password Algorithm. It is a method that …

What is TOTP? Time-based One-time Password Algorithm (TOTP)! Read More »

What is A Computer Virus?

What is A Computer Virus

A computer virus is a program code that attaches itself to a host file and multiplies itself independently. It changes the functions of the infected computer. It is usually programmed as malware and executes harmful functions or manipulates the computer and its data. What is a computer virus? A computer virus is capable of replicating …

What is A Computer Virus? Read More »

What is Patch Management?

What is Patch Management

Patch management is nowadays an integral part of system management. It deals with the procurement, testing, and installation of required updates for applications, drivers, and operating systems of computers. What is Patch Management? The literal translation of the English term “to patch” is “to mend”. Transferred to the world of programming, patch refers to software …

What is Patch Management? Read More »

What is Data Protection?

What is data protection

Data protection, i.e. the protection of personal data, secures the fundamental right of individuals to informational self-determination. This gives people the freedom to determine how their data is handled. Personal rights and privacy are to be preserved. What is data protection? Data protection does not protect the data itself, but rather the freedom of people …

What is Data Protection? Read More »

What is OpenID?

What is OpenID

OpenID is a decentralized authentication system for web services. The identities of the authentication system are based on URLs and allow logging into multiple services with a single identity without re-entering username and password (single sign-on). What is OpenID? OpenID is based on a decentralized concept and uses URL-based identities (IDs) for logging into web …

What is OpenID? Read More »

What is an Intrusion Prevention System (IPS)?

What is an Intrusion Prevention System IPS

An intrusion prevention system, abbreviated IPS, is able to detect attacks on networks or computer systems and to take automatic defensive measures. It provides additional protection compared to conventional firewall systems. An Intrusion Prevention System (IPS) clearly differs from an Intrusion Detection System (IDS) in some functions. What is an Intrusion Prevention System (IPS)? Although …

What is an Intrusion Prevention System (IPS)? Read More »

What Is A Firewall On A Computer and In Networking?

What Is A Firewall

A firewall is a system that is capable of analyzing data traffic. It protects IT systems from attacks or unauthorized access. The firewall can be a dedicated hardware or software component. Literally translated, firewall means “firewall”. The term refers to an IT system that can analyze, forward, or block data traffic. This enables the firewall …

What Is A Firewall On A Computer and In Networking? Read More »

What is Bitlocker Used For?

What is Bitlocker Used For

BitLocker is a security feature from Microsoft that is integrated into certain versions of the Windows operating system. The feature provides encryption of system drives, hard disks, or removable media. The stored data is protected against theft and unauthorized reading. What is Bitlocker Used For? With BitLocker, Microsoft offers a solution integrated into the Windows …

What is Bitlocker Used For? Read More »