Do you think your Mac laptop is bulletproof for malware? Unfortunately, many Mac owners believe in this delusion. Throughout much less malware exists for Mac than for Windows, Apple production can be vulnerable too. Recent research has found a new kind of ransomware especially created to attack Mac computers. Actually, it’s much more dangerous than…

Read More

We recently recommended that you use Jitsi instead of zoom for video conferences. We received queries that we would be happy to answer. The main advantage of Jitsi is that it is an open source product. Everyone can therefore download it free of charge and install it on their own server. A good Linux admin can do this in under an…

Read More

We received several comments on our last blog post , thank you very much! We would like to comment on some questions and comments. A comment first mentions the essential protective measures, of which we only mentioned the first: “1. VPN 2. Login lockout 3. 2-factor authentication 4. Updates ”That’s completely correct, thanks for the addition! In addition, the commentator –…

Read More

A reader of our blog asked: “A friend of mine who was a system administrator told me a few years ago that Windows has a good remote maintenance capability in its philosophy and that therefore all possible ports are open by default. Is it still like that?” This cannot be answered with a short yes or…

Read More