FPS
Frames per second (FPS) in TV, cinema, and gaming
  • Know-how

Frames per second (FPS) are an important metric in gaming, determining how smoothly a game can run. How many frames per second can a human being process and what use are higher frame rates? In our article, we’ll explain in which cases movies, videos, and games benefit from higher FPS and in which cases they don’t. Let’s begin.

Frames per second (FPS) in TV, cinema, and gaming
Install SteamCMD
SteamCMD: how to install the command line client
  • Know-how

SteamCMD is the command line version of the well-known Steam client. Once you connect to a gaming platform, you can use the tool to download dedicated server applications for games, among other things. Learn how to download SteamCMD and how to install the software on Windows and Linux in our handy article on the topic.

SteamCMD: how to install the command line client
Delete Steam account
Delete your steam account: here’s how
  • Social media

If you no longer want to use Steam for downloads or to play computer games, you may want to delete your Steam account. In that case, it’s recommended to fully remove your data from the database. Unfortunately, this is currently only possible via Steam Support. If you want to delete your account, submit a deletion request. Here’s how this works.

Delete your steam account: here’s how
Steam Refund
Steam refunds: How to return a game
  • Social media

If a game you purchased on the popular gaming platform wasn’t a hit, you can request a refund and get your money back after a few days. Find out which requirements you have to fulfill to get a refund, which games can be exchanged, and how to apply for a refund on Steam. Our dedicated article holds all the answers. Read on for more.

Steam refunds: How to return a game
Steam Family Sharing
Steam Family Sharing: how to share your Steam library
  • Social media

The Steam Family Sharing feature lets you share games with up to five other users on a maximum of ten computers. We’ll explain what exactly the Steam Family Library is, what its advantages and disadvantages are, as well as its restrictions, and how you can share your games on Steam in just a few steps. Our article’s got it all covered.

Steam Family Sharing: how to share your Steam library
MongoDB Drop Collection
How to remove collections from MongoDB with Drop Collection
  • Web development

By using MongoDB Drop Collection, you can completely remove collections as well as all the links contained within them from your database. Here we use a practical example to show you how to write and use this command. This will allow you to manage your databases more efficiently and quickly remove collections you no longer need.

How to remove collections from MongoDB with Drop Collection
Retrieve Windows 10 product key
How to find and retrieve your Windows 10 product key
  • Configuration

If you’re planning to update your computer or reinstall Windows 10, you need to retrieve your Windows 10 key – also referred to as a product licensing key. In 2016, Microsoft changed the way it licenses products and issued digital licenses for codes to be automatically transferred during a reinstallation. But there are some situations when it may be necessary to find your Windows key and enter it...

How to find and retrieve your Windows 10 product key
How to recover unsaved Word documents
How to recover unsaved Word documents
  • Online sales

If either Word or your PC crashes while working on a Word document, don’t panic! Recovering unsaved Word documents is easy to do; even damaged or deleted files are not always lost. Microsoft has numerous tools built into its popular text program which allow you to retrieve the edited or in-progress file. And if these tools don’t work, Windows and special repair and recovery tools offer plenty of...

How to recover unsaved Word documents
Man-in-the-middle attack: an overview of attack patterns
Man-in-the-middle attack
  • Security

A man-in-the-middle attack is a deceitful espionage attack which aims to listen, record, or manipulate sensitive data being sent between unsuspecting internet users. To do this, hackers rely on methods that enable them to position themselves, unnoticed, between two or more computers communicating with one another. We introduce you to some well-known attack patterns and countermeasures that can be...

Man-in-the-middle attack
Content Security Policy: how websites are becoming safer
Content Security Policy
  • Security

Websites can be full of security risks, especially when it comes to active content like JavaScript. Cross-site scripting enables cyber criminals to modify this content for their own purposes. This is dangerous for website operators and especially for internet users. The Content Security Policy tries to reduce this risk. Learn what’s behind the security standard and how it works.

Content Security Policy