September 8, 2024 | 13:30

Enterprise-Backup Solution

Why is the ransomware business model so successful? How do criminals manage to steal data, encrypt it and often also destroy data backups? According to a representative survey conducted by BITKOM over the past 12 months, 60% of companies in Germany have been affected1. A brief excursion into this topic, my work and how I was able to help a company save EUR 17,000. Read more

November 21, 2021 | 14:00

Digitalisation out of hell

10 years ago, the buzzword and digitalisation project “Industry 4.0” first emerged with nothing less in mind than the intention of unleashing a fourth industrial revolution.1 Revolution as a term and metaphor is, of course, nonsense. Anyone with the slightest sense in the matter knows that digitalisation is rather like a marathon with many intermediate stages and does not come overnight to a company as a result of a management decree. Read more

August 18, 2021 | 07:01

Raspi Horchposten in c't 19/2021

Hard-wired networks are usually provided with numerous security features. With wireless networks, however, admins often remain blind to intrusion attempts, which can be carried out by inexperienced users thanks to affordable gadgets. The remedy is a Wireless Intrusion Detection System (WIDS). Sounds expensive, but it isn’t. Read more

August 7, 2021 | 14:23

Beyond Good and Evil

Recently I was looking for a very particular music track. It is a song from the 2017 anime adaptation of “Ghost in the Shell” with Scarlett Johansson. More precisely: the official trailer music1, which was not included in the sound score and therefore cannot be found in any of the mainstream music stores. Read more

© 2025 Tomas Jakobs - Imprint and Legal Notice

Support this blog - Donate a Coffee