Products
The bicycle is locked, but the USB stick with our most important and confidential data we simply carry around openly? Not so smart. Of course, a U...
View full detailsThe computer is on but the monitor stays black.Problem reports like that make IT guys and tech-savvy, helpful geeks like us just criiiinge, don...
View full detailsIf you've had OpenOffice up and running for ages, then maybe it's because you write your letters with Latex? If this is the case, then yo...
View full detailsDo you know the situation? After a long year of work, you are really looking forward to your next holiday. So you book a great hotel and you make s...
View full detailsPenguins are cool, pretty goofy and probably the only birds in the world who forgot to be birds. No other animal looks funnier waddling in the snow...
View full detailsWith Magic: The Gathering there is something for everyone. And that doesn't just mean the different colours and editions, but also the different wa...
View full detailsLet's keep our computers clean and ban Unicode! Abominations like Unicode are destroying our good nerd-values and when you get right down to it, AS...
View full detailsAwaken your ingenuity with MaKey MaKey! Turn apples into computer game controllers or invent a 'banana keys' piano. The MaKey MaKey Kit offers ever...
View full detailsEven Unix has no clue how to explain women.
On the one hand, this might be understood as a parody on Star Wars, but it is also so much more: an ideal of the open source movement. If you cann...
View full detailsNeed some help with an everyday problem? Then summon Mr. Meeseeks! Simply teleport into a famous TV series about a scientist and his grandson, grab...
View full detailsooner or later, you’re bound to lose your keys at home. And when do they decide to go AWOL? Yep, right when you’re in a hurry and don’t have time t...
View full detailsSo, your computer centre urgently needs better security? Are you perfectly qualified for the job? Then don't hesitate: Become a member of the ...
View full detailsAre you and your notebook pretty much an inseparable team? Wherever you go, does your portable buddy go with you? Do you sometimes wish you could &...
View full detailsProgrammers who use pointers should be careful because they aren't far away from hell ;) At least that's what the 2nd of the 10 commandme...
View full detailsLinux - The choice of the GNU generation.
True story."Look, Mum, with the new router you don't need cables anymore! Now you can use WLAN in the whole house"."So can I wr...
View full detailsAt least in theory, we nerds should not have problems with curfews, right? After all, we usually spend the majority of our time at home in front of...
View full detailsAs a nerd, one needs to be careful. One small mishap, one mistake and the whole disguise of a friendly and harmless computer guy can come crumbling...
View full detailsDid you know that you can make a lot of money with compression? And we’re not talking about the inventors of WinRAR (who are most likely still wait...
View full detailsBatman flits through the night like a shadow. Hardly tangible for normal people like us. That's what he has in common with most mobile phones, whic...
View full detailsFrank Castle, better known as the Punisher, is a legendary antihero of the Marvel universe, often thanks to his questionable methods, but his decla...
View full detailsWhat's the trick behind all the software and where does it come from? That's what we asked ourselves and then we went on a investigation....
View full detailsSometimes a simple card game is the best pastime. You know, those times when you're forced to de-digitise, or because of those slow university or w...
View full detailsDifferent accessories for your Raspberry Pi enable new possibilities:- <b>Cases</b>Available in two versions: white, and transparent. D...
View full detailsTo understand recursion, you have to understand recursion first.
There has to be an end to this dumb "Connection reset by peer".
It's not enough for talented coders to write their own code, they try to analyze other programs and hardware too! For example, they'll wr...
View full detailsWhether through portals or with the help of a flying saucer through the vastness of the universe, with Rick Sanchez at your side you usually end up...
View full detailsAn answer to every single newbee question... Now you do not even have to make the effort to open your mouth!For those who do not know (and are afra...
View full detailsIf one were to believe the genre legends Run DMC, hip-hop really does have one thing in common with informatics: It's tricky! While the trio of Run...
View full detailsWho remembers the good old times when you had to choose between Internet and talking on the phone? The Dial-up connection needed the modem and ever...
View full detailsEveryone who speaks a language with special characters knows the problem: Wrong encoding.
The main assumption of the computer and network security principle "security by obscurity" is that a system cannot be compromised if nobody on the ...
View full detailsWithout words.
Uh Oh...Moments where you do not want to be the database admin...