YouTube Stories: The video platform now offers a Story function

In order to remain at the forefront of the social media world, even pioneers like YouTube must be guided by younger competition from time to time....

MOOC – the online education platform

MOOC opens the door to a new era of learning. Massive open online courses give everyone with internet access the opportunity to receive education at...

What is Chrome 68?

Early next month, Chrome 68 will be launched and the new browser will distrust all webpages that do not have HTTPS encryption as “not secure”. This is...

Selling online: the top English-speaking online marketplaces

You want to sell online – but where? If you don’t want to be entirely responsible for your own online shop, then you should offer your products on...

Faster with Excel: the VLOOKUP function explained

It can often be incredibly time-consuming to search for a specific entry in an Excel table by hand, which is where VLOOKUP comes into play. This practical function allows you to find the exact value for a specific search criterion. The VLOOKUP function is indispensable for managing price lists, members directories, and inventory catalogues. To ensure you can benefit from this practical function,...

Keyloggers: how do they work and how do you protect yourself from them?

Keyloggers are programs or devices that get access to your credentials by recording your keystrokes. Keyloggers hide in operating system software and leak data. Some keylogger hardware is even more sophisticated, since it can document your keyboard behavior or tap directly into the data stream. Learn how keyloggers work and which variants are available in our guide. We also give you tips on how to...

B2G – business-to-government

In the course of setting up a business, there is no way around important authorities such as the tax or trade office. But a relationship to the tax returns office need not just be a purely functional one – sometimes, it is possible to enter into a business relationship with these authorities too. This kind of business relationship between companies and authorities is called B2G...

How to write a briefing that results in the perfect text

If you commission someone to write copy, a copywriter briefing is the most important tool for communicating your ideas and specifications. Good text briefings are clear, precise, and highlight the most important content and key points of the commissioned text in such a way that writers can execute the assignments well. This step-by-step guide lays out which sub-items are essential to writing a...

How to recover unsaved Word documents

If either Word or your PC crashes while working on a Word document, don’t panic! Recovering unsaved Word documents is easy to do; even damaged or deleted files are not always lost. Microsoft has numerous tools built into its popular text program which allow you to retrieve the edited or in-progress file. And if these tools don’t work, Windows and special repair and recovery tools offer plenty of...

What is SSH? The secure shell simply explained

If you want to establish a secure connection to your server via the internet, you will need SSH. Whether sending commands, uploading files, or during remote maintenance, secure shell ensures that criminals cannot gain access to your sensitive data. Effective encryption and correct authentication are essential for this. To help you understand what is behind the SSH protocol, we reveal how it works...

iTAN, mTAN, chipTAN? An overview of all TAN procedures

Security in online banking has always been a cornerstone of the industry – TAN procedures like chipTAN are what make it possible. However, there are also many other variants of this two-factor authentication system that can be used to protect your banking transactions. As they say, a chain is only as strong as its weakest link – and in this case, it’s the user. Find out which TAN procedures are...

Raspberry Pi and Plex: how to turn a single-board computer into a media server

Plex is among the most popular and user-friendly solutions for creating a media server in your home network. In contrast to many other applications, which are often Windows-only, the Plex server is compatible with Linux, Mac, and even single-board computers like the Raspberry Pi. In this Raspberry Pi and Plex tutorial, you will learn what technical requirements must be fulfilled and how...

Blockchain

Blockchains are a rather hot topic right now. Though the term is far less common than Bitcoin itself, its significance in today’s world far exceeds that of the latter. After all, cryptocurrencies are run entirely on blockchain technology, which combines peer-to-peer networks with cryptographic methods and various assumptions of game theory. The result: reliable infrastructures tailored for...

How are websites accessed?

In order to access a web page in a browser, you just have to enter the URL into the address bar in your web browser and the requested website will pop up on your screen. This seems simple enough, but the process that’s taking place in the background is a highly complex one. Learn about what happens when you access a website – from the URL translation to the relevant IP address via data transfer,...