Categories
News

Trading With Crypto Currencies

The world of crypto currencies is becoming increasingly confusing. Almost all existing crypto currencies are listed on the www.coinmarketcap.com website. Altogether there are meanwhile far over 1,000 crypto currencies – tendency rising. The most important ones should be presented here: Bitcoin, Bitcoin Cash, Bitcoin Gold, Ethereum and Ethereum Classic, Ripple, Litecoin, DASH, Monero and Dogecoin.

Bitcoin – the “First Mover”, Bitcoin Cash and Bitcoin Gold

As the first known crypto currency (“First Mover”), the Bitcoin naturally enjoyed a certain advantage (“First Mover Advantage”). Ever since there have been new all time highs, read the reasons behind it at ALERTADIGITAL. However, there has also been friction within the Bitcoin community for some time. Due to the increasing use of Bitcoin, the system has become quite slow and expensive (transaction costs), which one would like to change. By an update called SegWit2x, which will be activated shortly, these difficulties should be eliminated at least partly.

But a part of the community didn’t want to wait for this update. So in summer 2017 Bitcoin Cash was the first so called “hard fork” of Bitcoin. The main difference between Bitcoin and Bitcoin Cash is the block size. While the Bitcoin block size is fixed at 1 MB, Bitcoin Cash allows up to 8 MB. Soon there will be another such spin-off with Bitcoin Gold. Should there be a SegWit2x fork at the end of November, there would be three alternative bitcoins in addition to the original one: Bitcoin, Bitcoin Cash, Bitcoin Gold and Bitcoin SegWit2x.

The advantage of such spin-offs is that Bitcoin owners automatically receive the Bitcoin alternatives created by the spin-off. In the case of Bitcoin Cash, the value of the new, alternative Bitcoin (Bitcoin Cash) peaked at just under 900 US dollars. In this respect, each spin-off appears as if it were a money printing machine (“free money”). But of course such a spin-off does not only offer advantages.

If more and more such spin-offs occur in the future, the value of the original bit coin could ultimately fall – simply because investors lose confidence in alternative bit coins due to inflation. Of course, it would also be possible for one of these alternative Bitcoins to emerge as the best alternative – and for all investors to shift their money, i.e. concentrate on this one alternative. Then the original Bitcoin would probably go under and it would be replaced by an alternative Bitcoin.

Ethereum, Ethereum Classic and Ripple

Ethereum, Ethereum Classic and Ripple do not see themselves as crypto currencies in the classical sense. The company Ripple Labs (in which Google Ventures, Andreessen Horowitz and other venture capitalists are involved) is trying to set up a payment network and, ultimately, a quasi-private monetary system.

If you want to learn how to trade get this trading book: https://cryptotradingbook.com/

Although the protocol for this payment network is open source, so that in principle anyone can participate in the development. In principle, however, Ripple Labs retains control here, as can be seen from the fact that the company itself retains half of all generated Ripples (XRP) in order to profit from their possible increase in value. A total of 100 billion XRP currently exist and the current status is not expected to be any more, so mining is not planned.

  • Ethereum on the other hand sees itself as a distributed system that offers a platform for the execution of Smart Contracts and is based on its own, publicly accessible blockchain.
  • The crypto currency ether is actually only used as a means of payment for computing power provided by network participants. At first it looked as if Ethereum could outstrip Bitcoin.
  • Due to an error in the smart contract of a so-called decentralized autonomous organization (The DAO), an unknown hacker managed to render 3.6 million ethers worth around 65 million euros unusable.
  • Finally, the Ethereum community decided to fend off this attack with the help of a hard split. However, there have been two Ethereum blockchains since then. The followers of the original blockchain simply continue these as Ethereum Classic.
Categories
News

Sports Betting With Bitcoin

In recent years, the Bitcoin as a crypto currency has been able to celebrate an impressive success after the next. Meanwhile the currency has undoubtedly arrived in the middle of society and is also used here in numerous variants. On the one hand, the currency can be traded “classically”, on the other hand, the Bitcoin betting providers are luring. These have been able to present themselves better and better in recent years and have meanwhile become a highly interesting industry. So it is all the more exciting to take a look at the different portfolios of Bitcoin betting providers – and that is exactly what we have done.

The best betting providers with Bitcoin as a payment option

Too many betting providers who offer you the opportunity to deposit with Bitcoin actually don’t exist yet. For many, the crypto currency is simply not yet established enough to be included in their payment portfolio. However, a few have been added in recent years and we have taken the trouble to find the best bookmakers with Bitcoin for you:

Sports betting with Bitcoin: Secure and versatile sports bets

The fact that it was only a matter of time before the first betting providers formed up with Bitcoin was foreseeable a few years ago. After all, Bitcoin has numerous advantages for users, which can also be transferred to the sports betting market. Payments, for example, can always be described as one hundred percent secure; after all, transactions with Bitcoin are absolutely forgery-proof. Sensitive or personal customer data is not required, which means that criminals have no way of obtaining this confidential information from tipsters.

But that’s not all: All deposits and withdrawals for Bitcoin sports bets can be made within a few seconds.

  • If Tipper deposits an amount with one of the betting providers, it will be available within a very short time and can be used. If a profit was paid out with the sports bets, this is also brought with the Bitcoin problem-free and briskly into the own pocket.
  • In the meantime, however, the Bitcoin betting providers are also so interesting because the other areas of the portfolio have changed significantly.
  • The selection of sports bets has grown considerably, and at the same time the bookies have increased by more than just one level in terms of customer support and service. All in all, there are several arguments in favour of taking a closer look at Bitcoin sports betting.

How do Bitcoin sports bets work?

In principle, sports bets can be placed “normally” with a Bitcoin betting provider. Of course, every bettor must first open their own betting account with the bookmaker before the odds can be used. Immediately after registration, new customers have to pay a certain amount into their account, which serves as capital for betting. In most cases already enormously small amounts are sufficient, so that the piggy bank does not have to be plundered for the deposits. The deposits are usually carried out in the cash area of the bookmakers, where the customers only have to specify the desired payment method and the respective deposit amount. Once this is done, the portfolio can be searched for the desired bet.

The bets can often be found using different filters or search functions. This ensures that the bets can be placed within a few moments. To select a bet, simply click on the odds, which then automatically land on the betting slip. Once the desired bet has been determined, the bet can be placed. A small tip on the side: numerous betting providers supplement their offer with a mobile portfolio.

This means that customers can also place bets while on the move if they access the portfolio with their smartphone or tablet. There are no disadvantages or differences compared to regular betting on the home computer. But now enough of the many words – and off to the top five betting providers for Bitcoin sports betting.

Read more at these sites:

https://sportsbet.io/
https://www.bbc.co.uk/sport
http://www.bestbitcoinbetting.com/soccer/
https://bitcoin.org/

Categories
News

What To Consider With VPN Services – A Guide

VPN, Virtual Private Network is also moving the general public to the “anonymously on the net” area. The concealment of the IP address is actually only a by-product, but it is far from being anonymous.

In contrast to proxies, VPNs are intended to connect company networks to other locations. For example, a service employee who is traveling can be with the customer, but technically he can still stay in the company network and use all internal services.

A proxy is like a forced way point for every packet you send to the internet and then receive others, neither encrypted nor anonymous, because the proxy simply tells the web server: “Hey, user XY asked me to call the page for him”. – so proxies are something completely different.

VPNs are encrypted, e.g. to keep corporate communication private. The IT representative in the customer company should not necessarily know what purchase price you actually pay for a spare part if you order it directly from the customer in the VPN network.

It is exactly this encryption rail that companies use and sell VPN services because they are encrypted. With this you enter the company network of a company that only promised to make you look like you’ve been abroad.

Many people are not aware that this alone creates risks.

You are in a company network with other customers and employees of the provider. The provider has to ensure that these cannot communicate with each other like in a classical company network, some inexpensive providers do not. You are then in a network with your computer and every customer and every employee sees that you are there and possibly also which shares you have with Windows.

If, for example, a printer is shared in your local network, it can now be controlled by every customer on this VPN server.

It basically works in such a way that your computer is part of a company network and the actual protection mechanisms offered by a router are no longer available.

Many services pay attention to this and do not allow it, but even then there are some things to consider. It always depends on the purpose for which you want to use the VPN. For example, if you travel to China and want to continue surfing the Internet as usual, you have to consider something completely different than if you do not want to pay the GEMA fees for watching the videos on YouTube in order to make these videos available in Germany.

The GEMA Youtuber

The case is quite simple, your VPN does not have to attach any importance to any data protection at all. It should only be fast enough to let a 1080p video pass smoothly, which is blocked in Germany. Switzerland, the Netherlands or the surrounding area of Germany in general is a good location, but almost every service should have a location there. In addition, Hulu, Wilmaa and other services that are basically not allowed or active in Germany due to license chaos also work.

Encryption is a minor issue here and even insecure connection methods such as PPTP or OpenVPN without activated encryption already lead to the desired result. So the free choice is at your disposal, even if you should test some services for speed beforehand.
The search for privacy…

For example, your employer has the right to check what you are doing in the company network. Even during the lunch break, during which many employers allow private things to be looked up on the Internet, he is allowed to have a look. If you want to make this more difficult, you need a VPN that is strongly encrypted and ideally does not log.

Even then, the employer may ask what you are doing while you are connected and ask to disable the VPN, but in this case he must ask and cannot just log because you have taken special precautions. However, the employer may also demand that the service no longer be used in the company network.

A further protective mechanism is then created here. Without encryption, an employer may be able to log, but not with encryption – but most corporate programs and services are not available when using encrypted VPNs and your employer may have already taken precautions to prevent this. Then just ask your employer here, or try it out. If you can connect to the VPN service at home, but not in the company – then it seems to have already been blocked in the company.

Perhaps a more practical application here are public hotspots, which, as in New York, are often recently refinanced by the sale of all the data you produce in this way. A VPN is rarely blocked in hotspots – so it is usually possible to provide more security here. Besides, you protect yourself a little better against attackers who try to record the data of other visitors in the same network.

The Network Outbreaker…

Some networks are closed, mostly in schools and universities. But some employers also like to install censoring firewalls so that colleagues can work and not have fun on the Internet. Instead of using the TOR browser you can also use a VPN which e.g. supports OpenVPN over TCP port 443. Such communication is basically not distinguishable from normal network traffic via HTTPS, only they all go to a single server. It requires a relatively comprehensive firewall to distinguish such traffic from normal web surfing. However, very few institutions make this investment.

SSH tunnel is the next point. Many locks can be easily bypassed by setting up an SSH connection and thereby directing any Internet traffic that you cause. A little further and we are already at obfsproxy, one of the programs created thanks to the Chinese Internet surveillance.

The Persecuted – Or, Who Suffers From Internet Censorship…

The situation becomes much more serious if you know, for example, that you are being monitored by state organizations. Usually this is also told to the persons concerned by the flower, therefore they know mostly that the state is anxious to find out everything about you. Here the location of the VPN service provider is critical again.

Germany, half of Europe, Great Britain and the USA will thus already be eliminated. Secret services function particularly well here, even across borders. Fourteen Eyes” plays a role here. The service provider may not be located in one of the listed countries, as the secret services there could, on their own free decision, intervene too extensively in company activities.

Ideally you have a closer look at the country in which a VPN service is registered. “How well organized is the legal system there?” “How much is already regulated by law and how quickly are new ones enforced”, a certain degree of unorganisation is okay, but one should not overdo it. If a state system is not as efficient as, for example, EU countries, then the secret services have more difficult information to obtain “officially”.

Here again, more decision-making power lies with the VPN service provider. If this ensures that as little traceability as possible is possible on its servers, half the game is already won once. Secret services have a lot more work to do here because they have to actively hack into the company servers to get ahead at all. A VPN service provider that attaches great importance to security is worth its weight in gold.

Another important point here is that the provider’s support can be contacted in encrypted form. By this I do not mean a contact form on an HTTPS website, but an e-mail address with ideally linked PGP public key. This is a bit cumbersome, because the customers also have to have PGP, but always better than HTTPS.

The Great Firewall of China

A quality feature is also obfsproxy. This program was originally developed by the Tor project. It serves to enable Chinese citizens to surf the Internet without the state as an intermediary. The network traffic is “hidden” in other harmless-looking data and, as the name suggests, sent to a proxy server, which in turn finds the hidden data and can send it on without problems. The same would be possible with a VPN without obfsproxy. However, pure VPN connections can be identified and traced.

The TOR project is technically possible in China, but everyone who uses this network is targeted by the state. Obfsproxy switches to Tor, sends all traffic to the proxy server and then continues on the TOR network. The proxy can not only be used with the TOR network, it can also be switched before VPN. A service whose software brings this function with it is a good deal better – at least in terms of the configuration effort.

In China itself, obfsproxy is a completely different caliber, where further developments are now recommended, since security experts are constantly working for the state to locate and block such proxy servers.

For Germany and the rest of the world Obfsproxy is already overkill. German politicians and their thoughts on data retention do not even go so far as to deliberately hide network traffic from programs or users.

If you look for service providers with the above criteria, many already fall out, and those that remain are not cheap. Costs of 5-10€ per month are more evidence that the provider also gets the money to ensure security. Cheap providers for 2-3€ per month need other ways to win. As a result, the company is no longer fully focused on VPN services and their security. It lives actively from advertising on the webistes or even intervenes in the connections of the customers to cheat own advertising. The sale of user data is also popular. With VPNs, this is the entire network traffic of a device.

An Example

As an example I take here gladly times ivpn.net. With 15 USD per month in the single month and not much cheaper (approx. 7.50 EUR) in the (half-)yearly offer one of the most expensive offerers. However, obfproxy is integrated into the client software here and routes that work via two IVPN servers in succession also work. In addition, the service provider is very anxious to present incidents to the public. There is a public promise that no incident has happened to IVPN staff, that everyone is contactable and will not be knowingly prosecuted. This is signed with the PGP key of IVPN. This way you can make sure that the text comes from the administrator behind IVPN. (or at least from someone in possession of their private key).

This is a matter of trust, but it is still better than a service that is completely silent.
The servers are basically fast enough. I’ve been using the service for a few months now and I can easily get what the Internet provider provides me from the nearest servers in terms of data throughput. They also respond quickly to incoming PGP encrypted emails and respond quickly.

On the side of encryption, they are very anxious to raise it very high.

North VPN can be seen as an alternative to IVPN. Technically identical to IVPN, but not so much about guaranteeing that nothing has happened with NordVPN yet. The promise the IVPN gives one searches in vain with NordVPN and also obfsproxy must be furnished before. NordVPN also does much more bumming and advertising for its own service, which could also be interpreted negatively.
Find the ideal VPN service

The two services above are intended more for China travelers and for those who may be really paranoid or afraid of losing their privacy. All possible services are also available in an English table, which takes some time to load. The whole procedure for selecting a suitable VPN service provider can also be made a little more detailed than described here. All these things are also explained here in the English How-To.

Categories
News

Compare The Top 5 VPN Providers

To make it easier for you to choose the right VPN tool, this practical tip compares the five best VPN providers.

Categories
News

What is Blockchain?

The Blockchain technology provides a lot of discussions across industry boundaries. Especially in the financial sector, it takes place more frequently, but also the IT industry discovers the topic. IT managers should take a closer look at Blockchain to understand its utility.

What Is A Blockchain?

A blockchain is a distributed database that maintains an ever-growing list of transaction records. The database is extended chronologically linearly, similar to a chain, at the lower end constantly new elements are added (hence the term “block chain” = “block chain”). If one block is complete, the next one is created. Each block contains a checksum of the previous block.

The technical model of blockchain was developed as part of the cryptocurrency Bitcoin – a web-based, decentralized, public accounting system for all Bitcoin transactions that have ever been made. The Bitcoin blockchain is growing steadily as new blocks of newly completed Bitcoin transactions are added. Each computer connected to the Bitcoin network, generating new bitcoins, and / or managing the previously generated ones manages a 1: 1 copy of the complete blockchain, which was already around 50 gigabytes in size by the end of 2015. More detailed technical information about the Bitcoin blockchain is available at Wikipedia.

And What Is Bitcoin?

Bitcoin is a purely digital currency – founded in 2009 – based on a decentralized payment network that requires a blockchain as the backbone. Those who pay with bitcoins on the web pay lower transaction fees than traditional online payment providers. Another possible advantage of Bitcoin is that the currency is not controlled by a central state bank or similar entity. Disadvantages are the manageable number of acceptance points and the now very high cost to calculate new bitcoins – their value increases correspondingly strong.

There are no physical bitcoins, only account balances associated with public and private keys. These account balances are deposited in a public accounting system – the blockchain – along with all Bitcoin transactions ever made. The computing power needed to manage this massive amount of data is provided by a large network of computers.

What Makes Blockchain So Special?

The Blockchain is probably the biggest technological invention of the Bitcoin universe. Without blockchain, the Bitcoin system would not work because new bitcoins can only be calculated based on the bitcoins generated so far and therefore must be tracked, which has already happened in the past. Nevertheless, the blockchain principle must be considered detached from Bitcoin. Imagine the blockchain as a pipeline and Bitcoin as the water flowing through it. Or Blockchain as a street and Bitcoin as a car. The conspicuous thing is that based on the blockchain technology, new applications can be developed and completely new ecosystems can be justified.

What advantages and disadvantages does a decentralized technology such as Blockchain have?

The decentralization of IT in general and Blockchain in particular has some advantages and disadvantages. As advantages can be stated:

  • Protecting large amounts of data through encryption and access management;
  • Ability to collect and analyze large amounts of data across companies;
  • easier verification of data reference points;
  • automatic detection of weak links in the supply chain, payment transactions and other business processes;
  • Reduction or avoidance of unnecessary costs for the IT infrastructure;
  • Reduction of costs for internal and external financial transactions, financial reporting and administration;
  • Creation of a mechanism to improve board reporting and regulatory reporting;
  • Acceleration of the annual financial statements.

As Disadvantages Can Be Mentioned:

  • still little individual scalability;
  • low data throughput;
  • Limitations on storage space;
  • hard-to-manage permissions;
  • difficult integration with existing legacy in the enterprise.

How Is Blockchain Used In The Financial Industry?

Even today, a lot of IT is decentralized – thank the internet and the cloud. With applications based on the blockchain principle, new developments continue to emerge, which will gradually reduce the listed disadvantages. Thus, the cryptocurrency ethereum is based on the blockchain principle of decentralized computing power and can be seen as a kind of bridge between blockchain and enterprise systems.

The “scalable blockchain database” BigchainDB can manage up to one million writes per second, store petabytes of data, and still have a latency of less than a second – all managed in a decentralized manner and with the highest data integrity.

Blockchain application platforms for the financial industry that are still under development – such as ERIS or R3CEV – are designed to establish the “business rules” of blockchain technology and bring new transparent, secure and verifiable business models to IT, especially the financial sector. For the CIO, such a new decentralized technology stack, along with a growing ecosystem, means that it can better perform its tasks: faster completion for business operations, more secure transaction processing, cost reduction and closer alignment with regulatory requirements.

The integration with already existing systems is still a challenge, but it is not insurmountable and can be justified very well with the benefits to be expected from Blockchain for both IT and business.

Why Can Other Industries Benefit From The Blockchain?

IT is increasingly developing decentralized structures because users want to keep an eye on their digital data. Decentralized systems can store information in a network of several computers accessible via the Internet. With the Internet, the decentralization of communication began and everyone got more control over the information he consumed. In the next step, in addition to the communication, computing power and memory are decentralized (cloud computing), and the blockchain adds another element. The Blockchain fuels ideas not only to control cryptocurrencies like Bitcoin via distributed networks, but also other digital content such as art, music, text or photos.

The first practical examples for the use of blockchains in various industries have been compiled in the article “Blockchain in Action”.

What Are The Big IT Companies’ Blockchain Offers?

Large IT corporations jump on the blockchain train and are currently working on software and service ecosystems around the technology. For example, IBM has already been actively involved in the Bitcoin initiative of the Linux Foundation for some time now – within its cloud developers it is possible to set up its own blockchains. For this purpose, Big Blue has provided the Bitcoin blockchain underlying Hyperledger code on its developer platform Bluemix.

By the simultaneous integration of the container service Docker it would be “for developers now in twelve seconds possible to get its own mini Blockchain within a sandbox to run”, how Jerry Cuomo, with IBM for the Blockchain offers responsible, in the context of the Presentation of services in February 2016 underlined. “And just a minute later, the first complete blockchain application will be live.”

Microsoft has also recognized the benefits of Blockchain and launched “Project Bletchley” under the umbrella of “Ethereum Blockchain as a Service” in the Azure Cloud. In the near future, several middleware tools are to be launched that enhance the business value of Blockchain. For example, “Blockchain as a Service” is primarily a developer. As a technical tool of the solutions so-called “cryptlets” are used, with the help of which users can enter external data into a blockchain without destroying their security and integrity.

These cryptlets can be developed in any programming language and run analogous to the IBM offer within a secure container. Microsoft sees the benefits of blockchain technology, especially in security-related issues such as identity management and encryption, and has integrated the corresponding services already in Project Bletchley.

Other major IT players, such as SAP or HPE, have also been monitoring the technology for some time and, according to their own statements, are still evaluating the possibilities of developing offers around Blockchain.

Categories
News

The Difference Between Proxy And VPN

There are significant differences in technology between proxy and VPN services.

We have listed some important points for comparison here. Proxy servers are “proxies” and VPN services are “secure tunnels” through the Internet. But what’s the difference?

Categories
News

How To Make Your Cell Phone Safe

Protection against Hackers and Viruses

Smartphones today are small computers and thus susceptible to viruses and hacker attacks. But many users are not worried about it – with just a few measures, security can be increased.

Mobile phones are now more small computers than mini-phones. Nevertheless, most people – unlike their laptop or PC – do not worry about viruses on their smartphone. Users do not take security and privacy as seriously as they do with their personal computers. And smartphones are just as threatened!

In most cases, just a few measures are enough to protect the mobile phone from viruses and hackers. The notes are sorted by the difficulty of their implementation for the smartphone owner.

1. Activate the Screen Lock

The screen lock is especially important in case you lost your smartphone or it was stolen. This feature also helps to prevent anyone from gaining access to the data on your smartphone.

Set a PIN of at least 6 Characters

If possible, better use a six-character PIN instead of just four. A short PIN is far too easy to guess and easy to remember for a stranger watching the input. If your device does not have the functionality of a six-character PIN, then activate one of the other security measures presented below.

Biometric security

Many modern smartphones today have a fingerprint scanner, some even a retina scanner. Although the biometric sensor of the scanner can be tricked, this security measure is better than a PIN or password. It provides good security without unduly compromising usability.

Password

Just like on a PC, a password is the hardest to work around and crack. A good password is a combination of uppercase and lowercase letters, numbers, and characters.

2. Install an Antivirus Program

You need an antivirus program for the minimum protection. These apps detect threats such as spyware, adware, ransomware, sometimes even certain types of phishing emails. There is absolutely no excuse not to install an antivirus product. Virtually all security manufacturers provide free versions of their programs (freemium or completely free). Just search for terms like “antivirus” or “security” in your app store and you’ll have many apps to choose from. Before installing an app, please take a look at the installation base and user comments. A good app must have at least 4 stars and a few million users.

PS: You will not find any antivirus for Apple iOS. However, there are dedicated security solutions for Apple, which include other features to increase your security.

3. Use Encryption

All modern smartphones come with the functionality to encrypt the internal memory of the device and the SD card. Encryption is needed to prevent anyone from reading your data in case your phone is stolen.

4. Don’t just install any App

There are millions of apps. Here are a few simple rules that will massively increase your security and protect your privacy:

Only install apps that many other users have installed before you and that have mostly positive reviews
Do not install apps from app stores that you do not know and trust. Never enable the installation of applications from the SD card or other app stores.

Be suspicious if an app calls for dubious permissions. Use common sense and stop the installation if you see that a game, for example, needs access to your photos, emails, or text messages.

5. Activate the Location Function of the Smartphone

This feature requires a network connection and allows you to transfer the location of the phone. Various apps make it possible to remotely take pictures with the front and / or rear camera when losing their smartphone, which are then sent to a cloud service. With these images, you can either identify the thief or find the place where you forgot your phone.

6. Activate functions such as remote “lock” and remote “delete”

The remote lock feature allows you to remotely lock your device. With the remote erase feature, you can remotely erase all your personal information from the device. So you can sleep at least quietly, if you lose your phone.

The device remains locked despite the complete data deletion. Note that these features are not available on every version of Android. Nevertheless, they are available in almost all security products for Android.

7. Activate the Automatic Backup

Mobile devices may be stolen or lost (and in that case you should use the “remote lock” and “remote delete” functions) or be damaged irreparably. In such cases, it is better to have all your data (settings, accounts, documents, pictures) stored in a safe place from which you can easily restore them at any time. Best of all, this feature comes completely free of charge from Google and is also integrated into almost every device.

8. Do not be easy prey for Internet Criminals

Never forget that your data is just as vulnerable on a mobile device as on a regular PC. Malvertising (malware through advertising) and phishing can still be a problem. Luckily, in almost all browsers, the pop-up windows are blocked by default and some have anti-phishing filters built in as well.

Categories
News

Fanless, Compact, Reliable: PrimeServer

Customers are increasingly demanding that their IT service providers include ecologically and economically responsible IT products in their portfolios. This not only applies to the shortest possible supply chains but also to sustainable means of production and longer product cycles. In addition, servers and co. should burden the environment and users as little as possible.

Categories
News

Microsoft And The Internet Of Things

Lately I watched an interview with Oliver Niedung from Microsoft on the occasion of the product launch of Windows 10. In the interview he talks about the Internet of Things from Microsoft’s point of view, how the Microsoft products fit into this scenario and that the IoT market will still come up with enormous figures.

Categories
News

Cloud Services Facing the Need For Encryption

Essential: Data Protection-Compliant Encryption

The DSGVO and other legal regulations are increasingly requiring users to handle sensitive and personal data as carefully as possible. This also applies to cloud data storage and its applications like Office 365, Salesforce and Co.