Search What is Detectify?
×

IT Sec FAQ

IT Security FAQ 10: What is malware, phishing, spyware, data mining and DDoS?

Data Mining DDoS IT Sec FAQ Malware Phishing Spyware
Antivirus Detectify Firewall IT Sec FAQ Security Services

IT Security FAQ 9: What is the difference between a firewall, antivirus and services like Detectify?

encryption IT Sec FAQ SSL

IT Security FAQ 8: SSL? Https:// – how do you connect it? What info should be encrypted?

IT Sec FAQ OWASP Top 10 Vulnerabilities

IT Security FAQ 7: What is OWASP Top 10?

Facebook IT Sec FAQ Vulnerabilities WordPress

IT Sec FAQ

IT Sec FAQ Vulnerabilities

IT Security FAQ 6: What CMS is the most vulnerable?

Bug Bounty Ethical Hacking IT Sec FAQ White hat

IT Security FAQ 5: What is White Hat vs Black Hat hacking? And what is a bug bounty hunter/program?

Facebook IT Sec FAQ Two-factor authentication

IT Security FAQ 4: Is two-factor authentication really necessary online? How do you activate it?

IT Sec FAQ KeePass Password Managers Password Safe

IT Security FAQ 3: What password-managers are good? Why should you use one?

IT Sec FAQ Plugins WordPress

IT Security FAQ 2: What should you think about when installing a new plugin on WordPress?