Direkt zum Hauptinhalt
Erweiterte Suche
Suchbegriffe
Inhaltstyp

Exakte Treffer
Schlagwort-Suchen
Datumsoptionen
Aktualisiert nach
Aktualisiert vor
Erstellt nach
Erstellt vor

Suchergebnisse

1069 Ergebnisse gesamt

Instructions

IT-Sicherheit (ESC-IT)

Backups

IT-Sicherheit (ESC-IT) Instructions

[!toc] Table of Contents In the article on backups in the countermeasures section, we described why backups are so important. Here we want to show how backups can be made. Backup of what? Of course, everyone has to think for themselves about what needs to...

Vera-Crypt-Encryption

IT-Sicherheit (ESC-IT) Instructions

[!toc] Table of Contents The software VeraCrypt is required for all methods mentioned here. This means that this program must be installed on your PC in order to encrypt and decrypt (reopen) encrypted storage, such as folders or USB sticks. Encrypt entire ...

Vera-Crypt-Installation

IT-Sicherheit (ESC-IT) Instructions

[!toc] Table of Contents Downloading the installer file To install VeraCrypt, you must first download the appropriate installer file. Installer files for various operating systems are available on the VeraCrypt website. Verifying the installer file Before ...

Auto-Reboot

IT-Sicherheit (ESC-IT) Instructions

[!toc] Table of Contents Because all encrypted devices store their encryption keys in their RAM after you first entered the device password during the start up, bad actors could try to read your encryption keys out of the RAM, even when your device is just...

Nextcloud-App-Passwords

IT-Sicherheit (ESC-IT) Instructions

[!toc] Table of Contents Nextcloud allows you to create app passwords. This allows you to assign a different password to each device or app that you connect to your account. The advantage of this is that you can easily revoke access to your account for ind...

Diceware

IT-Sicherheit (ESC-IT) Instructions

[!toc] Table of Contents Diceware is a method for generating passphrases/passwords using dice and a word list. These contain genuine randomness and, if sufficiently long, can be considered secure. This tutorial briefly describes how you can create a secure...

Signal

IT-Sicherheit (ESC-IT) Instructions

[!toc] Table of Contents Credit: The article is a translation of the LG Wiki Signal section. [!tip] Tip {static} In addition to the following practical guides, we have a general article, in which we discuss the advantages and disadvantages of Signal and ...

System-Updates

IT-Sicherheit (ESC-IT) Instructions

[!toc] Table of Contents One of the first answers to questions about IT security is always: Install updates. Since apps and systems should always be up to date, it is advisable to set automatic updates. Depending on your operating system, you may need to d...

Graphene-Os

IT-Sicherheit (ESC-IT) Instructions

[!toc] Table of Contents Recommended Apps Install Accrescend Download the Accrescend App Store from the default App Store, that comes preinstalled with GrapheneOS From Accrescend install App Verifier and Inter Profile Sharing, if you plan to share files be...

Keepassxc

IT-Sicherheit (ESC-IT) Instructions

[!toc] Table of Contents [!info] Getting Started {static} The official English-language KeePassXC documentation offers a very good and comprehensive “Getting Started” article. We recommend reading it to get an overview of the available features! Below, ...

Nextcloud-Webdav

IT-Sicherheit (ESC-IT) Instructions

[!toc] Table of Contents Nextcloud Sync Client The Nextcloud Sync Client is Nextcloud's own software for synchronizing content in the cloud with your own devices (PC, mobile phone, tablet). Installation and setup is very easy in most cases. Content synchro...

Nextcloud

IT-Sicherheit (ESC-IT) Instructions

[!toc] Table of Contents Nextcloud is often used as a privacy-preserving alternative to Google Drive, iCloud or other commercial Cloud providers. Nextcloud is open-source software that can be installed (hosted) by anyone on their own server. Solidarity-bas...

Countermeasures

IT-Sicherheit (ESC-IT)

Backups

IT-Sicherheit (ESC-IT) Countermeasures

[!toc] Table of Contents Much has been written about why backups are so important, and better and worse jokes have been made about the curious fact that everyone knows this but no one seems to do it. [!success] Fact is {static} We need backups! Backups v...

Wifi-Sd-Cards

IT-Sicherheit (ESC-IT) Countermeasures

[!toc] Table of Contents Photographers in particular often face the problem that their newly captured images are stored unencrypted on their camera's SD cards until they can transfer them to encrypted hard drives once they are back at their laptops. Added ...

Data-Hygiene

IT-Sicherheit (ESC-IT) Countermeasures

[!toc] Table of contents Whether it's network surveillance, digital forensics, or house searches: surveillance is always about data that could potentially be used against you. That's why it's important to regularly ask yourself what data is really necessar...

Communication-Encryption

IT-Sicherheit (ESC-IT) Countermeasures

[!toc] Table of Contents The encryption of all communication plays an essential role in our digital lives. In this article, we want to explain what communication encryption means, what different types of encryption exist, and what advantages and disadvanta...