Diese Webseite nutzt nur technisch notwendige Cookies.

Category «Security + Hacking»

Hacking is the art of exploiting.

An exploit is the exploitation of a vulnerability.

Read this blog to learn how to protect your systems from hacks by understanding hacking.

Nextcloud Installation Guide – 11 Steps for Beginners

Would you like to install a Nextcloud? This guide explains the most important questions about the cloud and Nextcloud gives you instructions for your own Nextcloud! What is a cloud? The cloud is a server (computer) that is permanently connected to the internet and provides you with services. Most people use the term “cloud” synonymously …

What is an Antivirus Software? Is it Still Necessary?

What is an antivirus? Is it safe? This post is intended to give you an insight into the function and possibilities of an antivirus programme. What is an antivirus? An antivirus program (or virus scanner) is a programme that detects malware using virus signatures, for example. The software scans every file stored on your computer …

Duplicati – Simple, secure and reliable backup

You are looking for a good option for a backup. You should test the open source solution Duplicati. Here is your guide! What is Duplicati? Duplicati is a backup tool that enables 1-click backups to protect servers or private local computers from total failure. Duplicati is a software with a web interface that you call …

Honeypot login form | 8 anti-spam strategies for 2025

What is a honeypot in the form? How can I protect myself from a flood of spam? This guide gives you all the basics. Let’s get started! What is a honeypot? In the past, hunters used a honeypot to attract bears (dangers) and eliminate them. The digital world also offers dangers (criminals), which we pose …

Smart Dumbphone – private, secure and distraction-free

You wanted to buy a dumbphone? Then read this article first before you burn your money on the next trend. Let’s get started! What is a dumbphone? A dumbphone is a mobile phone that can only make calls and send text messages. Many dumbphones have a keypad rather than a touchscreen. In 2025, the mobile …

Facebook Alternatives – 10 Replacements without Surveillance

Facebook Alternativen

Facebook is everywhere! No, you need to know these Facebook alternatives. This guide shows you which alternatives top Facebook’s online offering! Let’s get started! Meta (Facebook) is everywhere Meta (formerly Facebook) offers more than you think. Meta not only offers a social media platform Facebook to post messages, but also offers many different services and …

Pi Hole – How to Install on Raspberry Pi – 2025 Tutorial

Pi Hole Ads - Security Tutorial Steffen Lippke

Not in the mood for online advertising? (Spoiler: Pi Hole helps) How can I block adverts in apps where no ad blocker is available? I’ll show you the PI Hole, which bans such adverts forever. Basics: What is the Pi Hole? Pi Hole is a free software for blocking tracking and advertising URLs. The software …

What is Hacking? Definition, Explanation with All 6 Hacker Types

What is hacking? Who are hackers? This article will give you a quick overview of the topic without a lot of technical jargon. Let’s get started! Hacking Definition The word hacking has two meanings in Germany: Definition from everyday language: Hacking is the illegal intrusion into computers and the associated deletion, suppression and retrieval of …

TOP 30 Free Windows Tools 2025 for More Privacy

Unknown Windows Top Tools - Steffen Lippke Coding Tutorials

You don’t need mainstream tools? You want to use high-performance and free software without spying? This is the TOP 30 tools list. I’ll explain why it’s better than the well-known mainstream software. Let’s get started! Browser – Fast, Expandable, Robust Why should you worry about your browser and plug-ins? I spend 50 – 95 % …

Fingerprint Scanner Not Working – Best Tips and Tricks (2025)

Fingerprint Sensor not working - Steffen Lippke Coding Tutorials

The fingerprint sensor is not responding? This tutorial will help you troubleshoot and give you an insight into the security of the sensor! Let’s start.. How does a fingerprint sensor work? Every finger has a characteristic structure, the fingerprint, which a sensor can pick up with light photography or contact conductivity. The sensor scans over …

Setup Linux for Computer Science Students – Guide

Linux for Beginner - Coding Tutorials Steffen Lippke

Are you looking for an operating system with the right software to double your productivity? Then this guide is for you. We’ll set up your computer together. Let’s get started! Choice of Hardware – Computer Science Students Laptop Linux runs smoothly on 10-year-old desktops / laptops. If you are honest with yourself, you don’t need …

What is a Sandbox Environment? Explanation + Tools Alternative

What is a sandbox - Security Tutorials Steffen Lippke

Sandbox in software development? No idea! I’ll introduce you to the sandbox in this post. Practical tutorial on how to create and use a sandbox. What is a Sandbox? A sandbox is an isolated area in a computer. Any data processing within the sandbox has no effect on the external system. A sandbox is used …

Block ads on Android, iOS, Firefox more

Block ads - Steffen Lippke Hacking and Security Tutorials

Can’t see the content because of all the adverts? Adverts are annoying! Here’s your first aid guide to blocking adverts. Let’s get started! Why should I block ads? Online advertising is dangerous Adverts on the internet are more than just images and text. Advertising in the 21st century on your mobile phone is a small …

Docker Security Checklist – Operating Docker Securely

Docker Security Checklist - Steffen Lippke Coding Tutorials

Do you want to use Docker securely? Here is your checklist. Let’s get started Everything about images 1. Prefer trustworthy images If you don’t build your own images, you can quickly fall victim to a supply chain attack. You should not run images that do not come from an official, verified source in your environment …

Home Office Security – TOP 14 Actions Checklist (2025)

Home Office Security Tipps

What does good home office security look like ? What is different? More dangerous or more secure? This guide gives you 14 concrete tips on how to continue IT security in the home office. Let’s get started! What’s different about working from home? The biggest difference from an IT security perspective is that the employee …

Bluetooth does not work Android / iPhone (connection)

Solve Bluetooth Issues - Security Tutorials Steffen Lippke

Who hasn’t experienced it: Bluetooth problems always occur when you don’t need them: How can I solve the problems quickly and prevent the causes? This guide explains the solutions. Let’s get started! What is Bluetooth? The Bluetooth Special Interest Group (SIG) developed Bluetooth as a standard for wireless communication over a short distance (1 m …

Why IT Security, Climate or Pension does not improve!

Security Climate Retirement - Security Tutorial Steffen Lippke

IT security, climate protection and pensions – 3 different topics have so much in common. Nothing is happening! This article explains why the issues of the future are not being tackled by yourself or by politicians! Let’s get started! No initiative and bad laws – why? Better IT security IT security is absolutely not necessary …

Locate Mobile Phone – 7 Best Methods for iPhone Android

Locate Mobile Phone - Security Tutorial Steffen Lippke

How can I locate a mobile phone quickly and easily? This guide explains 7 tracking methods to find your device again. Let’s get started! Tracking is not just GPS If you are looking for a smartphone or a push-button mobile phone, you have the following seven options. Depending on the circumstances and requirements, you must …

20 Must-Have Hacking Apps on Android for 2025

Hust Have Android Apps - Hacking Series Steffen Lippke

Need a few free hacking apps? The more open Android platform offers a wide range. I’ll show you the top 20 apps. Let’s get started! What are hacking apps? These apps are Android applications that help white hats detect vulnerabilities in software anddiscover privacy liars. The white hat examines apps, Wi-Fi networks and other devices …

What comes after the cloud? The anti-cloud is taking off!

Die Anti Cloud erklärt Tutorial - Steffen Lippke Coding Lab

Cloud – a trend. But what comes next? The experts see “the anti-cloud” on the horizon. What will that be? And why? What is an anti-cloud? An anti-cloud is a server (computer) that stores all private data and offers all personal applications, games, and services in every person’s private home. Whether on a laptop, VR …

get rss abo

Jetzt
Abbonnieren
academy

Erhalte Free
Security Kurs

Jeden Monat teile ich mit Mitgliedern
4 neue praxisnahe Tutorials (je 1000+ Wörter).


Trage Deine Mail, damit Du
Deine Coding + Hacking Skills erweitern kannst!