Category: Hacking for Non-Geeks
How can I manipulate people to gain access to protected systems?
Non-technical hacking is an essential part of IT security threat prevention.
Social engineering is a mix of psychology, tricks, rhetoric and James Bond …
Learn to Code Java – Start WITHOUT Pre-Knowledge 2025
Do you want to learn Java programming? Then this tutorial is for you. I’ll show you how you can learn to programme with Java without any previous programming knowledge. Let’s get started! Goal: We develop a Java software…
Update / Patch Linux Desktop + Server – Best Practices (2025)
How do I keep Linux servers and desktops up to date? This guide shows you how to do it the smart way! Let’s get started! Choice of distribution Linux Server – No half measures in the company Open…
Nextcloud Installation Guide – 11 Steps for Beginners
Would you like to install a Nextcloud? This guide explains the most important questions about the cloud and Nextcloud gives you instructions for your own Nextcloud! What is a cloud? The cloud is a server (computer) that is…
What is an Antivirus Software? Is it Still Necessary?
What is an antivirus? Is it safe? This post is intended to give you an insight into the function and possibilities of an antivirus programme. What is an antivirus? An antivirus program (or virus scanner) is a programme…
Core Web Vitals Explained – 8 Tips for a Fast Website
What are the Core Web Vitals … … and how do I optimise my website for optimum loading speed? Here is the guide for more speed Let’s get started! What are Core Web Vitals? Core Web Vitals are…
Duplicati – Simple, secure and reliable backup
You are looking for a good option for a backup. You should test the open source solution Duplicati. Here is your guide! What is Duplicati? Duplicati is a backup tool that enables 1-click backups to protect servers or…
Honeypot login form | 8 anti-spam strategies for 2025
What is a honeypot in the form? How can I protect myself from a flood of spam? This guide gives you all the basics. Let’s get started! What is a honeypot? In the past, hunters used a honeypot…
Facebook Alternatives – 10 Replacements without Surveillance
Facebook is everywhere! No, you need to know these Facebook alternatives. This guide shows you which alternatives top Facebook’s online offering! Let’s get started! Meta (Facebook) is everywhere Meta (formerly Facebook) offers more than you think. Meta not…
HTTP3 and QUIC – Fast Future of Our Web
What is HTTP3 and QUIC? This tutorial gives you an introduction and how to put it into practice. Let’s get started! What is HTTP? HTTP stands for “Hypertext Transfer Protocol” and is the protocol used to transfer some…
Pi Hole – How to Install on Raspberry Pi – 2025 Tutorial
Not in the mood for online advertising? (Spoiler: Pi Hole helps) How can I block adverts in apps where no ad blocker is available? I’ll show you the PI Hole, which bans such adverts forever. Basics: What is…
What is Hacking? Definition, Explanation with All 6 Hacker Types
What is hacking? Who are hackers? This article will give you a quick overview of the topic without a lot of technical jargon. Let’s get started! Hacking Definition The word hacking has two meanings in Germany: Definition from…
TOP 30 Free Windows Tools 2025 for More Privacy
You don’t need mainstream tools? You want to use high-performance and free software without spying? This is the TOP 30 tools list. I’ll explain why it’s better than the well-known mainstream software. Let’s get started! Browser – Fast,…
Fingerprint Scanner Not Working – Best Tips and Tricks (2025)
The fingerprint sensor is not responding? This tutorial will help you troubleshoot and give you an insight into the security of the sensor! Let’s start.. How does a fingerprint sensor work? Every finger has a characteristic structure, the…
Setup Linux for Computer Science Students – Guide
Are you looking for an operating system with the right software to double your productivity? Then this guide is for you. We’ll set up your computer together. Let’s get started! Choice of Hardware – Computer Science Students Laptop…
Kubernetes Tutorial – The 6 Steps Guide about Clusters + Pods
Kubernetes Tutorial – Create your first Docker container! Containers have been a popular buzzword for a few years now: What’s behind it? How do I create my first container? … and does Kubernetes work? That’s what I want…
What is a Sandbox Environment? Explanation + Tools Alternative
Sandbox in software development? No idea! I’ll introduce you to the sandbox in this post. Practical tutorial on how to create and use a sandbox. What is a Sandbox? A sandbox is an isolated area in a computer.…
Phone / Computer Broken Again? 9 Tips to Increase Lifetime
Many of us take it for granted that we have to buy new technology every few years. But why is that? This article explains why and what you can do about it. Let’s get started! Robust Machines for…
How to Code Your Own AI – Step-by-Step Beginner Guide
Would you like to code artificial intelligence? I’ll show you the essential basics and 3 methods for programming your first AI. Let’s get started! What is Artificial Intelligence? Because computer scientists have not yet agreed on a definitive…
WebAssembly Tutorial for Beginners with Example (2025)
Do you need a WebAssembly tutorial? Get to know WebAssembly in under 15 minutes with this tutorial! I’ll explain how easy it is to get started with WebAssembly. Let’s get started! What is WebAssembly? “WebAssembly” is a new…