Internet

Y2K38

Y2K38 – The new millennium bug?

At the turn of the year 1999/2000, there were dystopian predictions, from the failure of computer systems to the false starts of nuclear weapons systems. The reason for this was the bug known as the Millennium Bug or Y2K Bug – And in 2038, a related problem awaits us in … continue reading

dmarc

DMARC – Purpose & Functionality Explained!

Email itself is quite old, and so are the protocols standardized for it. Between all these old protocols, DMARC, short for Domain-based Message Authentication, Reporting and Conformance, is practically still an infant. We explain the purpose behind this protocol and how it works in this article. The history of DMARC … continue reading

digitale signatur

How do digital signatures work?

If you want to sign something in the analog world, you can simply take a pen and put your signature under the corresponding document. In the digital space, digital signatures exist for this purpose, but they can do much more than merely exist and be recognized as a legally valid … continue reading

Crypto Mining

What is crypto mining and how safe is it?

It all started with Bitcoin, or rather its whitepaper, which first revealed the idea of a digital currency. A currency that would not be controlled by states or governments and would be decentralized, so that any outside intervention seemed almost impossible. This is Satoshi Nakamoto’s Bitcoin, which is now known … continue reading

The pros and cons of clouds!

Clouds are used a lot. It is often more clever and practical to be able to access your data from anywhere. That’s why cloud services are becoming more and more relevant and are indispensable these days. However, there are also certain disadvantages that can occur when using clouds. Pros and … continue reading

DNS – The phone book of the Internet!

DNS stands for Domain Name System and is one of the most important services on the World Wide Web. Since it has such a central role, it is very important that it is configured properly. Incorrect configurations can cause errors as well as serious security vulnerabilities. What exactly is DNS? … continue reading