Data Protection

How to clear cookies step by stepRawpixel.comShutterstock

How to clear cookies step by step

  • Website creation

Some cookies can be very helpful – they let you sleep on those impulse purchases and keep them from disappearing out of your shopping cart, or log into social media sites with just one click. But not all cookies make surfing the web easier, and some may even forward unwanted information to third parties. It is a good idea to learn how to clear cookies, and this guide will show you how to clear…

How to clear cookies step by step
How to turn off push notifications

How to turn off push notifications

  • Web development

Push notifications provide you with up-to-the minute information like messages and news updates. But if you have notifications activated for too many apps, you can quickly lose track of what’s going on. Luckily, it takes just a few clicks to deactivate unnecessary notifications. Keep reading to find out how to turn off push notifications in iOS, Android, and Chrome.

How to turn off push notifications
How to turn on push notifications

How to turn on push notifications

  • Web development

Push notifications are a great way to stay up to date on app and website news. Enabling push notifications is a breeze if you know how to do it. Learn how to turn on push notifications on your browser and your apps in just a few clicks, and how to customize and manage your notification settings. Read on to find out more.

How to turn on push notifications
How to recognize and remove malware

How to recognize and remove malware

  • Security

Practically every PC user fears Trojan horses and computer viruses. Security is paramount if you are managing sensitive data or setting up a server. You need a comprehensive security concept to protect yourself against insidious malware. It’s helpful to know the different types of malicious software that exist, and how to combat and safely remove them.

How to recognize and remove malware
What to do if your email is hacked? Steps to follow asap

What to do if your email is hacked? Steps to follow asap

  • E-Mail security

E-Mail accounts are one of our most important communication tools: we use them to register for online portals, for private and business exchanges, and as an organizer and digital address book. It is therefore all the more important to make sure your account is well-protected. But what if your e-mail account does get hacked? Our guide explains what methods internet criminals use to gain access to…

What to do if your email is hacked? Steps to follow asap
How to use PGP encryption for email

How to use PGP encryption for email

  • E-Mail security

Online privacy is a sensitive issue that affects experts and amateurs alike. Whether you’re posting on social networks, carrying out banking transactions, or buying from an online store, your data is not always sufficiently protected. The same applies to e-mails. Don’t let cyber criminals get their hands on your content by encrypting your e-mails.

How to use PGP encryption for email
How to remove personal information from Google

How to remove personal information from Google

  • Digital law

The internet never forgets – is it always true? In some cases, search engines are obliged to grant users permission to delete defamatory search results. If Google displays personal data that is outdated or of no interest to the public, users can request the search engine to delete links to that data from the results pages permanently. But what exactly is the ‘Right to be Forgotten’ act, and when…

How to remove personal information from Google
What are digital and analog data rooms?

What are digital and analog data rooms?

  • Know-how

In business acquisitions, mergers, real estate purchases and other important transactions, confidential documents usually have to be reviewed by all parties involved. Data rooms provide an appropriate framework for this. Find out how location-based and virtual data rooms work and which special features to consider when setting up a data room.

What are digital and analog data rooms?
Online Identity Theft

Online Identity Theft

  • Website creation

Many only know internet identity theft and similar crimes from movies or television. But stories of online fraudsters are not just mere phantasies of screenwriters; for many the experience is all too real. Online identity theft has become more and more of a problem over the past few years, and everyone is a potential victim. We have compiled some preventative steps than can help you stay out of…

Online Identity Theft
What is Metadata?

What is Metadata?

  • Web development

Metadata is generated by many applications in the digital world. If this data is collected and analyzed en masse, it poses a serious risk to privacy. But metadata doesn’t have to be dangerous. The term is broad and encompasses a lot of useful techniques. In this article we’ll explore the meaning of metadata with some examples.

What is Metadata?
We use cookies on our website to provide you with the best possible user experience. By continuing to use our website or services, you agree to their use. More Information.