Diese Webseite nutzt nur technisch notwendige Cookies.

Honeypot login form | 8 anti-spam strategies for 2025

What is a honeypot in the form? How can I protect myself from a flood of spam? This guide gives you all the basics. Let’s get started! What is a honeypot? In the past, hunters used a honeypot to attract bears (dangers) and eliminate them. The digital world also offers dangers (criminals), which we pose …

Smart Dumbphone – private, secure and distraction-free

You wanted to buy a dumbphone? Then read this article first before you burn your money on the next trend. Let’s get started! What is a dumbphone? A dumbphone is a mobile phone that can only make calls and send text messages. Many dumbphones have a keypad rather than a touchscreen. In 2025, the mobile …

Facebook Alternatives – 10 Replacements without Surveillance

Facebook Alternativen

Facebook is everywhere! No, you need to know these Facebook alternatives. This guide shows you which alternatives top Facebook’s online offering! Let’s get started! Meta (Facebook) is everywhere Meta (formerly Facebook) offers more than you think. Meta not only offers a social media platform Facebook to post messages, but also offers many different services and …

HTTP3 and QUIC – Fast Future of Our Web

HTTP3 QUIC - Steffen Lippke Coding Tutorials

What is HTTP3 and QUIC? This tutorial gives you an introduction and how to put it into practice. Let’s get started! What is HTTP? HTTP stands for “Hypertext Transfer Protocol” and is the protocol used to transfer some of the data on the Internet. It forms the basis for the exchange of information between your …

Pi Hole – How to Install on Raspberry Pi – 2025 Tutorial

Pi Hole Ads - Security Tutorial Steffen Lippke

Not in the mood for online advertising? (Spoiler: Pi Hole helps) How can I block adverts in apps where no ad blocker is available? I’ll show you the PI Hole, which bans such adverts forever. Basics: What is the Pi Hole? Pi Hole is a free software for blocking tracking and advertising URLs. The software …

What is Hacking? Definition, Explanation with All 6 Hacker Types

What is hacking? Who are hackers? This article will give you a quick overview of the topic without a lot of technical jargon. Let’s get started! Hacking Definition The word hacking has two meanings in Germany: Definition from everyday language: Hacking is the illegal intrusion into computers and the associated deletion, suppression and retrieval of …

TOP 30 Free Windows Tools 2025 for More Privacy

Unknown Windows Top Tools - Steffen Lippke Coding Tutorials

You don’t need mainstream tools? You want to use high-performance and free software without spying? This is the TOP 30 tools list. I’ll explain why it’s better than the well-known mainstream software. Let’s get started! Browser – Fast, Expandable, Robust Why should you worry about your browser and plug-ins? I spend 50 – 95 % …

Fingerprint Scanner Not Working – Best Tips and Tricks (2025)

Fingerprint Sensor not working - Steffen Lippke Coding Tutorials

The fingerprint sensor is not responding? This tutorial will help you troubleshoot and give you an insight into the security of the sensor! Let’s start.. How does a fingerprint sensor work? Every finger has a characteristic structure, the fingerprint, which a sensor can pick up with light photography or contact conductivity. The sensor scans over …

Setup Linux for Computer Science Students and Programmers – Guide

Linux for Beginner - Coding Tutorials Steffen Lippke

Are you looking for an operating system with the right software to double your productivity? Then this guide is for you. We’ll set up your computer together. Let’s get started! Choice of Hardware – Computer Science Students Laptop Linux runs smoothly on 10-year-old desktops / laptops. If you are honest with yourself, you don’t need …

Kubernetes Tutorial – The 6 Steps Guide about Clusters + Pods

Kubernetes Coding Lab Steffen Lippke Guide Tutorials

Kubernetes Tutorial – Create your first Docker container! Containers have been a popular buzzword for a few years now: What’s behind it? How do I create my first container? … and does Kubernetes work? That’s what I want to explain in this tutorial. Have fun! Create a local cluster We want to create a Node.js …

What is a Sandbox Environment? Explanation + Tools Alternative

What is a sandbox - Security Tutorials Steffen Lippke

Sandbox in software development? No idea! I’ll introduce you to the sandbox in this post. Practical tutorial on how to create and use a sandbox. What is a Sandbox? A sandbox is an isolated area in a computer. Any data processing within the sandbox has no effect on the external system. A sandbox is used …

Phone / Computer Broken Again? 9 Tips to Increase Lifetime

How to use computer longer - Coding Tutorials Steffen Lippke

Many of us take it for granted that we have to buy new technology every few years. But why is that? This article explains why and what you can do about it. Let’s get started! Robust Machines for Eternity? Computers are machines for eternity! Lasered processors and encapsulated chips – but why do we throw …

How to Code Your Own AI – Step-by-Step Beginner Guide

Code your own AI - Coding Tutorial Steffen Lippke

Would you like to code artificial intelligence? I’ll show you the essential basics and 3 methods for programming your first AI. Let’s get started! What is Artificial Intelligence? Because computer scientists have not yet agreed on a definitive and standardised definition, you can sell almost any software “as artificial intelligence”. I (and other computer scientists) …

WebAssembly Tutorial for Beginners with Example (2025)

WebAssembly - Steffen Lippke Coding Tutorials

Do you need a WebAssembly tutorial? Get to know WebAssembly in under 15 minutes with this tutorial! I’ll explain how easy it is to get started with WebAssembly. Let’s get started! What is WebAssembly? “WebAssembly” is a new way to execute bytecode in the browser in a secure and portable way. Bytecode is superior to …

Block ads on Android, iOS, Firefox more

Block ads - Steffen Lippke Hacking and Security Tutorials

Can’t see the content because of all the adverts? Adverts are annoying! Here’s your first aid guide to blocking adverts. Let’s get started! Why should I block ads? Online advertising is dangerous Adverts on the internet are more than just images and text. Advertising in the 21st century on your mobile phone is a small …

Chrome Developer Tools Tutorial – 8 steps guide (2025)

Chrome Dev Tools

Do you need an introduction to Chrome Developer Tools? Every web developer should know this powerful toolset inside out, because good development is only possible with an in-depth analysis of websites! Let’s start… What are the Browser Developer Tools? The Developer Tools are a collection of different website tools that help with the development of …

Docker Security Checklist – Operating Docker Securely

Docker Security Checklist - Steffen Lippke Coding Tutorials

Do you want to use Docker securely? Here is your checklist. Let’s get started Everything about images 1. Prefer trustworthy images If you don’t build your own images, you can quickly fall victim to a supply chain attack. You should not run images that do not come from an official, verified source in your environment …

Home Office Security – TOP 14 Actions Checklist (2025)

Home Office Security Tipps

What does good home office security look like ? What is different? More dangerous or more secure? This guide gives you 14 concrete tips on how to continue IT security in the home office. Let’s get started! What’s different about working from home? The biggest difference from an IT security perspective is that the employee …

Bluetooth does not work Android / iPhone (connection)

Solve Bluetooth Issues - Security Tutorials Steffen Lippke

Who hasn’t experienced it: Bluetooth problems always occur when you don’t need them: How can I solve the problems quickly and prevent the causes? This guide explains the solutions. Let’s get started! What is Bluetooth? The Bluetooth Special Interest Group (SIG) developed Bluetooth as a standard for wireless communication over a short distance (1 m …

Database Types – The 8 Most Important Products in 2025

Database Types - Steffen Lippke Coding Tutorials

Which database types should you know? What are the differences? Which one should I choose? This article aims to answer these questions. Let’s get started! So many databases – why? There are hundreds of databases on the market. Their task is to store, change and read data. You need a different database depending on your …

get rss abo

Jetzt
Abbonnieren
academy

Erhalte Free
Security Kurs

Jeden Monat teile ich mit Mitgliedern
4 neue praxisnahe Tutorials (je 1000+ Wörter).


Trage Deine Mail, damit Du
Deine Coding + Hacking Skills erweitern kannst!