Diese Webseite nutzt nur technisch notwendige Cookies.

Category «Hacking»

Hacking is the art of exploiting.

An exploit is the exploitation of a vulnerability.

Read this blog to learn how to protect your systems from hacks by understanding hacking.

Pi Hole – How to Install on Raspberry Pi – 2024 Tutorial

Not in the mood for online advertising? (Spoiler: Pi Hole helps) How can I block adverts in apps where no ad blocker is available? I’ll show you the PI Hole, which bans such adverts forever. Basics: What is the Pi Hole? Pi Hole is a free software for blocking tracking and advertising URLs. The software …

What is Hacking? Definition, Explanation with All 6 Hacker Types

What is hacking? Who are hackers? This article will give you a quick overview of the topic without a lot of technical jargon. Let’s get started! Hacking Definition The word hacking has two meanings in Germany: Definition from everyday language: Hacking is the illegal intrusion into computers and the associated deletion, suppression and retrieval of …

TOP 30 Free Windows Tools 2024 for More Privacy

You don’t need mainstream tools? You want to use high-performance and free software without spying? This is the TOP 30 tools list. I’ll explain why it’s better than the well-known mainstream software. Let’s get started! Browser – Fast, Expandable, Robust Why should you worry about your browser and plug-ins? I spend 50 – 95 % …

Fingerprint Scanner Not Working – Best Tips and Tricks (2024)

The fingerprint sensor is not responding? This tutorial will help you troubleshoot and give you an insight into the security of the sensor! Let’s start.. How does a fingerprint sensor work? Every finger has a characteristic structure, the fingerprint, which a sensor can pick up with light photography or contact conductivity. The sensor scans over …

Setup Linux for Computer Science Students and Programmers – Guide

Are you looking for an operating system with the right software to double your productivity? Then this guide is for you. We’ll set up your computer together. Let’s get started! Choice of Hardware – Computer Science Students Laptop Linux runs smoothly on 10-year-old desktops / laptops. If you are honest with yourself, you don’t need …

What is a Sandbox Environment? Explanation + Tools Alternative

Sandbox in software development? No idea! I’ll introduce you to the sandbox in this post. Practical tutorial on how to create and use a sandbox. What is a Sandbox? A sandbox is an isolated area in a computer. Any data processing within the sandbox has no effect on the external system. A sandbox is used …

Block ads on Android, iOS, Firefox more

Block ads - Steffen Lippke Hacking and Security Tutorials

Can’t see the content because of all the adverts? Adverts are annoying! Here’s your first aid guide to blocking adverts. Let’s get started! Why should I block ads? Online advertising is dangerous Adverts on the internet are more than just images and text. Advertising in the 21st century on your mobile phone is a small …

Docker Security Checklist – Operating Docker Securely

Docker Security Checklist - Steffen Lippke Coding Tutorials

Do you want to use Docker securely? Here is your checklist. Let’s get started Everything about images 1. Prefer trustworthy images If you don’t build your own images, you can quickly fall victim to a supply chain attack. You should not run images that do not come from an official, verified source in your environment …

Home Office Security – TOP 14 Actions Checklist (2024)

Home Office Security Tipps

What does good home office security look like ? What is different? More dangerous or more secure? This guide gives you 14 concrete tips on how to continue IT security in the home office. Let’s get started! What’s different about working from home? The biggest difference from an IT security perspective is that the employee …

Bluetooth does not work Android / iPhone (connection)

Who hasn’t experienced it: Bluetooth problems always occur when you don’t need them: How can I solve the problems quickly and prevent the causes? This guide explains the solutions. Let’s get started! What is Bluetooth? The Bluetooth Special Interest Group (SIG) developed Bluetooth as a standard for wireless communication over a short distance (1 m …

Why IT Security, Climate or Pension does not improve!

IT security, climate protection and pensions – 3 different topics have so much in common. Nothing is happening! This article explains why the issues of the future are not being tackled by yourself or by politicians! Let’s get started! No initiative and bad laws – why? Better IT security IT security is absolutely not necessary …

Locate Mobile Phone – 7 Best Methods for iPhone Android

How can I locate a mobile phone quickly and easily? This guide explains 7 tracking methods to find your device again. Let’s get started! Tracking is not just GPS If you are looking for a smartphone or a push-button mobile phone, you have the following seven options. Depending on the circumstances and requirements, you must …

20 Must-Have Hacking Apps on Android for 2024

Hust Have Android Apps - Hacking Series Steffen Lippke

Need a few free hacking apps? The more open Android platform offers a wide range. I’ll show you the top 20 apps. Let’s get started! What are hacking apps? These apps are Android applications that help white hats detect vulnerabilities in software anddiscover privacy liars. The white hat examines apps, Wi-Fi networks and other devices …

What comes after the cloud? The anti-cloud is taking off!

Die Anti Cloud erklärt Tutorial - Steffen Lippke Coding Lab

Cloud – a trend. But what comes next? The experts see “the anti-cloud” on the horizon. What will that be? And why? What is an anti-cloud? An anti-cloud is a server (computer) that stores all private data and offers all personal applications, games, and services in every person’s private home. Whether on a laptop, VR …

How to Build a Home Server – Your Homelab on Budget

Homeserver Guide - Coding Tutorials Steffen Lippke

Building a home server? How can this be done quickly, easily and without a lot of subsequent maintenance? This guide gives you the answers to these questions! Let’s get started! Why do I need a home server? #1 The best price-performance ratio You want to store a 2.4 GB video in your cloud? It can …

Which storage is most secure? Best Option on Market

Secure Storage Types - Hacking Tutoirals Security Steffen Lippke

You need a secure storage? You’ve often heard the term, but you can’t do anything with it. I’ll show you all the ways you can store content securely at low cost. Let’s get started! What does secure mean? Before we can talk about secure storage, we need to clarify what “secure” you mean. Computer science …

Encrypt Email Outlook – 10 Steps Tutorial (2024)

You want to encrypt an email in outlook? The content is top secret and only the recipient should be able to read the message? This guide will give you instructions. Let’s start! Why are normal (secure) emails not secure? Secure IMAP / SMTP – encryption all the way to the server is secure. The big …

Secure Boot Enabling? Theft protection and encryption

Secure Boot Explained - Hacking Tutoirals Security Steffen Lippke

What is Secure Boot? This article explains Secure Boot and how you can effectively protect your data. Let’s start! What happens when booting with Secure Boot? Booting under Windows is not so trivial – the user pushes a button and sees the logo of the manufacturer / of Windows. Within the few seconds of booting, …

Hacking Devices – The Best 8 for 2024 | What You Need

Hacking Gadgets - Hacking Tutoirals Security Steffen Lippke

Need some cool hacking devices? Here are the best products and this post explains their function in detail! Let’s get started! Need to be rich to hack? Hacking is a field in IT which you can do on your 14-year-old cucumber (e.g. your old laptop). You usually don’t need a lot of hardware, memory or …

Secure Data Transfer Methods – 4 Secure Types explained (2024)

Secure Data Transfer - Hacking Tutoirals Security Steffen Lippke

How can I send a file securely? I’ll explain four methods, varying in security and complexity. Let’s start! Sending files securely – only for professionals? You need to get confidential documents from A to B quickly. The postal service is unreliable and not a secure partner. Some critical documents should not be seen by secret …

get rss abo

Jetzt
Abbonnieren
academy

Erhalte Free
Security Kurs

Jeden Monat teile ich mit Mitgliedern
4 neue praxisnahe Tutorials (je 1000+ Wörter).


Trage Deine Mail, damit Du
Deine Coding + Hacking Skills erweitern kannst!