Although Linux distributions can also be controlled via a graphical interface, many things can be done more quickly via commands in the command line. For example, you can use SED under Linux to revise complete databases with just one line. To do this, however, you need to be familiar with the options and functions of the command, as well as with regular expressions. We’ll make it easy for you to...
The Linux SCP command used to be the standard for securely copying files between computers in a network. These days, the tool has become outdated and eclipsed by more powerful alternatives. We explain how to use the command and give practical examples, before presenting two great alternative tools.
For small businesses, SEO is about getting as many of the users, who are the most likely to buy their products and services, off the unpaid results of search engines like Google and into their website or store. This is also a key objective for larger businesses, but their starting point and key areas of focus often differ greatly from the SEO tactics that work best for small businesses. That is...
To work with large data sets, long tables, and large arrays, Excel offers several features. These facilitate navigation through the mass of values and data. For instance, to quickly find the right cell, you can use MATCH in Excel. The function searches for a value and then specifies the position of the cell. How does it work?
Want to know how to show hidden folders in Windows? By default, the Windows operating system hides numerous files and folders to prevent the user from accessing them. Most of these files are important system files that are protected for a good reason, but sometimes you need to display them anyway. In this guide, we’ll show you how with step-by-step instructions.
From PDF to JPG and TXT, there are countless different file extensions out there. These extensions are the last part of a file name and are separated from the actual name by a dot. Nowadays, there are so many that it is easy to lose track of them. In this article, you will learn about the most important file extensions for image files, text documents, media files and more.
Google, Amazon, Facebook, Alibaba, Tencent: Data infrastructure is dominated by a few large corporations, none of which come from Europe. Gaia-X aims to change that. A group of politicians, businesspeople, and researchers hope the concept will strengthen the development of European digital projects, and increase the importance of transparency, data protection, and cloud independence.
Fixed guidelines about design and branding are essential for a professional and serious web presence. Companies usually outline these in what’s known as a style guide. These serve as outlines for web designers and editors, and have the aim of presenting companies or institutions as one single entity across all media – including their website and social media accounts. But what does this actually...
Abstruse theories about epidemics and politicians or personal insults against individuals: online things can quickly turn hurtful. Some users deliberately engage in what is known as trolling. Read on to find out what the goals of online bullies are, how you can recognise a genuine troll, and how to deal with hate speech correctly.
Every click reveals a piece of bad news. At least that’s what it feels like ever since coronavirus emerged (if not long before). But are things really as bad as our social media news feeds like us to believe? It’s easy to fall victim of doomscrolling. Find out what’s behind it and how you can protect yourself from it.