Fast and User Friendly: Our Alternative to GitmojiOur Gitmoji alternative makes it easier to document changes and supports semantic versioning. More efficient work for developers.
Dark Web vs. Deep Web - What can you find there?Normal users rarely if ever come into contact with the Deep Web or Dark Web, but potential danger lurks in the 'depths' of the Internet. How do these two areas differ from the regular Internet and how can you protect yourself from danger?
How often should you change your passwords?After choosing the right password, the question arises if and how often you should change your passwords.
Phishing #2: CEO Fraud, Corporate Phishing and Angler Phishing AttacksIn this second part of our series on Phishing CEO Fraud, Corporate Phishing and Angler are introduced.
Phishing #1: Email Phishing, Baiting and Search Engine PhishingEmail phishing, baiting and search engine phishing - what is it? In this multi-part article, we give a brief introduction to the different variants that are used to deceive users.
Ransomware Secure Backup StrategyRansomware is currently a real and serious threat.The probability of being hit by it is currently high and realistic. An important protective measure against it is a ransomware-proof backup strategy.
Speed up Rust CI pipelines that use TarpaulinIn this article, we'll go over some specific tips to minimize agonizingly slow recompilations while using the code coverage tool Cargo Tarpaulin.
We're starting the Identeco BlogAt Identeco, we learn things every day. If you want to join this process, this blog will keep you telling new stories.