Categories
Pages
-

IT Center Blog

Schlagwort: ‘Security’

Ethical Hacking: Hacking for More Security

July 19th, 2024 | by
A woman focused on computer code, engaged in hacking activities.

Source: Freepik

Imagine you let someone deliberately try to break into your house to test your security system. Sounds strange, doesn’t it? But that’s exactly what ethical hackers do in the digital space. They try to break into systems – with permission, of course – to uncover security vulnerabilities before they can be exploited by criminals. In this article, you will learn everything you need to know about ethical hacking, the important role it plays in IT security and how it is used in practice.

 

Read the rest of this entry »

E-Mail Security – How to Configure Forwarding Correctly

March 13th, 2024 | by
Hand-drawn text messages between two cell phones on the board

Source: Freepik

In this article in our mail security series, we will show you how to configure the forwarding of incoming mails. In our previous articles, we have informed you about the problems involved in sending mails, possible security vulnerabilities and security mechanisms that have already been implemented and explained why redirects are bad. This article is about setting up forwarding in the RWTH Mail App, also known as “OWA” (Outlook Web App).

Read the rest of this entry »

IT Fairytale Hour – Part 2

September 25th, 2023 | by
Animated woman woman looking through a magnifying glass comparing myths with facts.

Source: Freepik

Today we continue with our series, “All about the myths in the world of IT”.
If you missed the first part of the myths, feel free to check out our last post.

“The full moon causes sleepless nights” – a myth we all know. Experts have long since proven that the moon does not have magical powers. The brightness releases less melatonin in the brain, which helps us fall asleep.
So it’s worth taking another close look at widespread half-truths.

In the world of IT, there are myths that we can get to the bottom of together.
Today, it’s all about IT security and what you should know about it.

 

Read the rest of this entry »