safety | April 2024

Report theft - how it works

You can report any theft, but you don't have to. Unless you insured the stolen items. If you want to report the theft, the nearest police station is a good place to place the complaint. Reporting theft - you should be aware of that Even if you can basically report any theft to the police, it is not always worth it...

Windows: file write protection cannot be removed - what to do?

If the write protection of a file cannot be removed under Windows, this is due to missing rights, for example. We'll show you how to solve the problem. Windows: This is why the file write protection cannot be removed Latest videos Windows: Write protection cannot be removed - First open the properties of the file Now remove the check mark next to "Read-only" If the write protection cannot be removed in Windows, there are a number of steps you can take...

Kaspersky: cancel subscription - how it works

If you no longer need the Kaspersky service, you can cancel your subscription online with just a few clicks. We'll show you how it works. Cancel your Kaspersky subscription online Log in to the Kaspersky Account Information page. You will need your password and the order number of your subscription, which you can find in the confirmation email or on the order confirmation page...

Does anyone use my WiFi? Here's how to find out

If you are afraid that someone else is using your WLAN, you can access all connected devices via your router. We'll show you how to detect such WLAN parasites with your telecom router, your Fritz! Box or a simple tool. Find out connected WLAN devices - this is how it works with Telekom routers Open the router configuration in your browser...

National identity number: where can I find it?

If you want to enter the USA without a visa, you must first provide your national identity number. We'll show you where to find the number. Where does the national identity number stand? German citizens do not have a national identification number, as required when entering the United States. Nevertheless, it is a mandatory field in the form...

TAN generator: change batteries - how it works

You need a TAN generator for secure online banking. We show you how you can change the batteries on the device. Changing the batteries of the TAN generator - How to proceed If your TAN generator shows that the batteries are almost empty or can no longer be switched on, you should change the batteries...

Mailbox.org: The advantages of the email provider

Data protection and protecting your privacy are just two advantages that the email provider Mailbox.org promises to its customers. We took a look at what else Mailbox.org has to offer you. This is how Mailbox.org can score After a spying scandal has been lined up seamlessly with the next, the need for guaranteed data protection is growing...

Additional address: what is it?

If you would like to send a letter or parcel, an additional address can be helpful. We'll tell you what it actually is and when an additional address really makes sense. Additional address: areas of application and necessity The same addressing is used for letters and parcels almost worldwide. In Germany, name, street, postcode and city each have their own line...

Popcorn time: get a warning - what to do?

The Waldorf Frommer law firm is currently sending warnings for illegal streaming at Popcorn Time. If you have received such a warning, there are several strategies how you can react to it. Popcorn time warning: is the use illegal? Popcorn Time is software that allows you to stream films and series via PC software or Android app...

Cancel ADAC membership

If you no longer wish to use the ADAC membership, you can cancel the subscription at any time. We'll show you how it's done. Unsubscribe from ADAC: You need to know that The period of notice for ADAC membership is 3 months for each tariff. If you do not cancel at least 3 months before the subscription expires, your membership will be extended for another 12 months...

Avira AntiVir: cancel license - how it works

You can easily cancel your Avira Antivir license. This practical tip shows you exactly how to do this. Avira license: the termination is successful First switch to the Avira website and log in with your data. Click on the "Payment history" option on the left. Here you can see when you made which payments...

Online banking: how secure is the mTAN process?

If you use the mTAN procedure for online banking, the security of your money may be at risk. We'll tell you how much security the mobile process really brings. Secure online banking with the mTAN procedure? With the mTAN procedure, the customer receives the TAN on his cell phone from his bank to confirm the transfer...

Cell phone theft: what to do?

If your cell phone has been stolen, you must take action immediately after the theft. We'll show you what you need to consider. First step: have the SIM card blocked and report it Regardless of whether the cell phone has been stolen or you have lost it, the first thing to do is to have the SIM card locked...

Cancel McAfee subscription - Here's how

If you no longer wish to use your McAfee anti-virus software, you can cancel the subscription. We'll show you how it's done. Unsubscribe from McAfee First, go to the McAfee website below to cancel the subscription. Click on "My Account" in the top right corner and log in to your account...

Norton: cancel subscription - how it works

If you no longer wish to pay for Norton's paid subscription, you can cancel it online at any time. We'll show you how it's done. Unsubscribe from Norton Open the following Norton website in your browser and log in with your account data. Go to the "My Norton" category above and select the "Automatic renewal and subscriptions" entry...

Deactivate Avira AntiVir Guard - how it works

The Avira AntiVir Guard keeps blocking benign programs. In such cases, deactivate the security tool so that there are no problems. Avira AntiVir: Briefly switch off the real-time guard Latest videos Click "Real Time Protection" Disable real-time protection Open Windows Explorer and display hidden files...

acrotray.exe - what is it? Easily explained

You may have noticed the acrotray.exe background process on your PC. This tip tells you exactly what acrotray.exe is and how the process is related to Adobe Acrobat. acrotray.exe: Adobe Acrobat Distiller utility - no danger The acrotray.exe process is an auxiliary program for Adobe Acrobat Distiller...

TÜV expired: You have to expect this fine

Driving your vehicle with expired TÜV can be expensive. In this article, we explain which fines you may face. Fine for missed TÜV appointment With your vehicle you have to go to the main inspection regularly, colloquially called TÜV. With a new car, this is the case after 36 months and then every 24 months. V...

Speedport: Change WiFi password

For security reasons it is advisable to change the WiFi password of your Speedport router at regular intervals. In this practical tip, we will show you step by step how to change your password and thus prevent possible network thieves. Change the speedport's WiFi password - how it works Open the website "//speedport...

Activate and set up Windows Hello - how it works

If you activate Windows Hello, you can log in to Windows 10 using facial recognition from a camera or a fingerprint. In this article we will tell you exactly how this works and what you need to consider when setting it up. Activate Windows 10 Hello: The system requirements The Windows Hello biometric authentication system should not only work well, but above all it should also be secure...

Aldi Talk: SIM card blocked - so proceed now

There are several reasons why your SIM card has been blocked by Aldi Talk. We will show you how you can solve the problem yourself. Aldi Talk SIM card suddenly blocked If you enter the wrong PIN three times, your SIM card will be blocked. Unlocking is only possible with the PUK. You will find this on the letter you received with your SIM card...

Zero external hard drive - how it works

If the normal formatting of an external hard drive is no longer sufficient, you can also completely zero it - i.e. safely delete it. We show you how it works. Zero hard drive with Windows The accessible hard disk sectors are overwritten with zeros via the formatting function under Windows (from Vista)...

Avira hotline: Contact support by phone

You can only contact the Avira hotline if you have a paid Avira product. We will show you how to contact support in the event of problems. Avira: Call customer support by phone Note: If you use a free version of Avira, you can unfortunately not use the telephone support. In this case, contact the Avira help forum...

Encrypt PDF - how it works

If you send confidential information as a PDF attachment, for example, it makes sense to encrypt the document. There are several options to encrypt a PDF. Below we present an efficient and free program. How to encrypt a PDF document Latest videos Encrypt PDF documents Drag the document into the creator Click Custom to encrypt the document Select security and assign passwords for PDF Save the encrypted PDF document Encrypting a PDF is done quickly with the free PDF creator...

Microsoft: Enable two-factor authentication

If you set up two-factor authentication with Microsoft, you and your account are better protected against hackers. We will therefore show you how to activate the check in two steps. How to enable two-factor authentication with Microsoft Use the steps below to successfully set up two-factor authentication with Microsoft...

O2: How to cancel your cell phone contract

At O2, you can cancel your mobile phone contract either online or by post. We show you both options here and have a ready-to-use letter of termination for you to download. Termination at O2: By mail and by post At O2 you will find all information about a contract termination in your account "My o2"...

Tamper Protection: How to protect your Windows 10

A new tamper protection has been available since the new Windows 10 version. In this practical tip, we will tell you what this protective function does and how you activate it. Windows 10: What does Tamper Protection tamper protection do? Microsoft has announced a new security feature for Windows. Tamper Protection is now available in the in-house antivirus software Microsoft Defender...

FritzBox parental controls don't work - you can do that

To set an Internet time limit or to switch off the WLAN after a certain time, you can set a child lock on your FritzBox. If this no longer works, there are a few more solutions besides the classic restart. FritzBox: If the child lock does not work If there are problems with parental controls, one or more profiles, you should first try restarting your Fritzbox router...

SMART for Windows hard drives: what that means

Is your hard drive SMART? The meaning of the abbreviation and how you can use the function for yourself can be found here. The importance of SMART in hard drives S elf monitoring, analysis and reporting technology, in English "system for self-monitoring, analysis and status reporting", is used for all modern storage media...

Residual current circuit breaker: the function simply explained

The function of a residual current circuit breaker is to protect people from an electric shock. An FI switch also serves as fire protection. In this article we explain how the circuit breaker works. Function of the RCCB The circuit breaker should only be installed by a professional. Electronics pose numerous dangers...

TrustedInstaller - what is it?

For some operations, for example to delete files, you need the permission of "Trusted Installer". Here we explain what the Trusted Installer is used for under Windows because it has a variety of functions. Windows: What does the Trusted Installer do? Even if you are bothered by the process, the "Trusted Installer", "Windows Module Installer" or just "Windows Installier" contributes significantly to the security of your system...

Avira does not start automatically - you can do that

Protect your PC from viruses, malware and more with the free Avira. If the service does not start automatically, you should check the autostart programs. In this practical tip, we will introduce you to these and other solutions. Change start options of Avira Latest videos Open "Services" Search for Avira services and check the respective start type After clicking on "Properties" you can now set the start type To have Avira start automatically at system start, you should check the Avira start options...

Retrofitting FI switches: You have to reckon with these costs

If your home does not have an FI switch, you should retrofit it. The costs you have to expect depend entirely on how old the electrical system of your house or apartment is. Retrofit RCDs in modern buildings Even if FI switches are compulsory in new buildings from 2007, you may still have to retrofit one...

Reset PushTAN - how it works

If you are using a new mobile device, you must reset your pushTAN if you use this security technology. In this practical tip we will show you how. Reset pushTAN - it's that easy Some banks, such as the savings banks, offer the pushTAN method for online banking on mobile devices. If you switch to a new smartphone, you have to reset the pushTAN to take over the function on the new device...

ID card expired: How to get a new ID card

If your ID card has expired or is about to expire, you should have it renewed immediately. We will show you where and how you can get your new ID card and what penalties you may face. Identity card expired: How to apply for a new one From the age of 16, every German citizen must have a valid official ID...

Termshark: The Wireshark alternative can do that

Inspired by Wireshark, Termshark is a good alternative when it comes to network analysis. It is a terminal user interface for Tshark that makes working with servers easier. We explain the differences and what the alternative program can do. Termshark can do this as an alternative to Wireshark If you use Wireshark, you can quickly experience bottleneck problems...

Pay contactless: security concerns are justified

Contactless payment continues to spread. However, quite a few customers are concerned about security. This practical tip will tell you whether this is justified and what specific security measures are in place. Security: How exactly does contactless payment work? Almost all card terminals in shops now support contactless payment...

Pay contactless: that's how high the limits are

If you make contactless payments with your bank card, you do not have to enter a PIN up to a certain limit. This practical tip shows how high this amount is, depending on the card. Limits for contactless payments without a PIN In Germany there are three important types of money cards that support contactless payment: credit cards from the providers VISA and Mastercard, as well as the classic checking card, colloquially mostly called EC card...

Windows 7/10: Protect folder with password - how it works

If you share your PC with other people, it is safer to password-protect certain data. In this guide we show you how to secure entire folders in Windows 7 and Windows 10 with a password. Windows 7 and Windows 10: Protect folders with a password In the following instructions we use the WinRAR tool. This works for Windows 7 as well as Windows 8 and Windows 10...

Pay with a credit card without a PIN - how it works

In many cases you can pay with your credit card without a PIN. In this article we explain how this works and what restrictions apply. Credit card payment without a PIN - how it works In the past, there were two predominant options when paying by card: payment with a PIN or with a signature. Since signature protection is now considered too insecure, it is only used in very few stores...

Download and set up Eduroam - how it works

If you successfully download and set up Eduroam, you can access the Internet from university hotspots worldwide. As a student and employee of a college or university, you can use Education Roaming completely free of charge and without a VPN connection. We'll show you where to download the certificate, what settings you need to make successful setup, and where to get detailed step-by-step instructions for installing Eduroam...

Targobank email: Fake ITAN authentication - this is how you should proceed

Dangerous Targobank phishing emails are currently being sent that appear deceptively real. There is a link in the message that leads to a fake website. Here we explain how you should proceed with such Targobank fake emails. Targobank fake emails circulating Targobank is currently warning its customers of dubious fake emails...

Account has been blocked "- this is how you react to the T-Online mail

A phishing email is currently circulating claiming that your T-Online account has been blocked or that your storage space is full. You can find out how to react to this here. "Account has been blocked": Detect phishing mail Fraudsters keep trying to extract personal information from unsuspecting people - this is the case in this case too...

Remove Yessearches - Here's how

You should definitely remove Yessearches from your computer, because the hijacker can potentially redirect to virus-infected websites via your browser. This practical tip shows you how to get rid of Yessearches. Step 1: delete Yessearches from the Control Panel Since the adware is often supplied with an installed program, you should remove the software that was added last...

Secure online banking with Kaspersky

To prevent malware from gaining access to your online banking, Kaspersky provides a particularly secure browser in the Internet security program package. This means that other tools or programs on the computer have no access or even influence. Kaspersky: This is how secure online banking works You can set up secure payment transactions with Kaspersky so that websites of banks and payment systems are automatically recognized...

Register De-Mail with Telekom - how it works

De-Mail is used more and more often. We show you how to register for De-Mail with the large provider Telekom. How to register with Deutsche Telekom for De-Mail With De-Mail you can carry out legally binding mail traffic. Telekom offers De-Mail, registration is done in a few steps: Open the Telekom website and click on "Become a De-Mailer now"...

Commerzbank online banking: forgotten PIN - what to do?

If you have forgotten the Commerzbank online banking PIN, you can get it back in just a few steps. Step by step: get your PIN back It is always annoying to have forgotten your PIN. If you have lost the bank documents with your PIN, you should have your account for online banking blocked for security...

MS Security Essentials vs. Antivir comparison

If you fluctuate between Avira AntiVir and Security Essentials when choosing your antivirus, we will help you with this comparison. Avira AntiVir Avira provides both the paid Internet Security Suite and the free version Avira Free AntiVirus. Both versions work reliably, but the paid version contains additional functions such as a firewall...

Virus or adware? What is the difference

Not every unwanted program on your PC is a virus. You have often "only" caught adware. We explain to you in this practical tip what the difference is. Adware or Virus: What is Adware? What adware is, how it works and when it can be called a virus can be described as follows: Adware is a key word from "advertisement" and "software"...

Fritzbox security update: List of affected AVM routers and repeaters

The Fritzbox manufacturer AVM has published a list of all routers and WLAN repeaters affected by the security vulnerability. For which models you need a security update and which devices are safe according to AVM, you can find out here. Security update for Fritzbox router and WLAN repeater The list of affected Fritzbox routers can be found here or for international models here (as of February 21, 2014)...

0018504347982: Attention to this spam number

Under no circumstances should you accept calls from the spam number 0018504347982. Behind it is a brazen scam that fraudsters want to take control of your computer with. We show you how it works and what you do best. Call from 0018504347982 - that's behind it Many people in Germany are currently called from 0018504347982...

AES or TKIP - find the right setting

Encrypting your own WiFi is one of the most important points for your home network. This practical tip will tell you whether you should use AES or TKIP. AES or TKIP? Only one offers the greatest possible security Current routers offer a variety of encryption options for your WLAN connection. Here is a small overview: To best protect your network, you should always use WPA2 with AES as encryption...

Multiple socket: You should not plug in these devices

Improper use of multiple sockets quickly creates the risk of fire. You shouldn't plug in too many devices and pay close attention to which devices you connect. We explain what you should consider when using multiple sockets. Risk of fire with multiple sockets Caution is advised with multiple sockets...

Update Kaspersky - how it works

To protect your computer from viruses, you should always update and update your Kaspersky Antivirus. Then you will also receive the latest virus databases. We show you in detail how to update Kaspersky in this manual. Update Kaspersky - how to proceed Kaspersky automatically checks for the latest updates to the program...

Metal credit card - they are available from these providers

If you are interested in a metal credit card, you are following a new trend that is intended to give bank customers an additional feeling of luxury and value. We'll show you which banks you can already get credit cards from here. These banks offer a metal credit card Credit cards are usually made of plastic or are completely virtual...

Credit card: This is how you can change your PIN

Changing the PIN on a credit card works the same for most banks. You can usually do this via the online portal of the credit card provider. However, the bank needs some data for this. Change credit card PIN works in a few steps There may be several reasons why you want to change your credit card PIN...

What is malware?

Whether you find the anti-virus program or search the web, the term malware appears everywhere. In this practical tip, we explain what that actually is. What is malware? Malware is a collective term for programs that have been developed to harm users. There are numerous sub-types of malware - for example, viruses, Trojans, rootkits or spyware...

Msmpeng.exe - what is it? Easily explained

If you find the msmpeng.exe file in Windows Task Manager, it is not immediately apparent what is behind the entry. We tell you what the program is good for. Msmpeng.exe - what is it? The msmpeng.exe is used by the Microsoft Windows Defender program or by Microsoft Security Essentials to perform spyware scanning...

Viruses have been detected on your iPhone: how to react correctly

If you get the message "Viruses have been detected on your iPhone", you should keep a cool head. The problem can be solved quickly and easily. You just shouldn't click anything. Viruses have been detected on your iPhone: what does this mean? As long as you haven't changed anything in iOS, for example due to a jailbreak, a virus on the iPhone is actually not possible...

Remove adfarm.mediaplex.com - Here's how

If you discover adfarm.mediaplex.com advertising in your browser, you can easily remove it from your browser. We'll show you exactly how this works in two simple steps. Step 1: Remove adfarm.mediaplex.com from Windows Adfarm.mediaplex.com is relatively harmless adware. Your browser is manipulated in such a way that advertisements appear constantly and pop-ups start without being asked...

Remove PUA / InstallCore - Here's how

We will explain step by step how to remove PUA InstallCore.Gen7. It is not a virus, but it is potentially unwanted software. For example, it can secretly collect and send data. Remove PUA / InstallCore.Gen7 - Instructions The abbreviation PUA stands for "Potential Unwanted Application". These are unwanted applications that can affect the user's privacy and the security of the local system...

PUP - what is it? Easily explained

Viruses, Trojans and other malware end up on the computers of this world every day, including PUP. This practical tip shows you exactly what that is and how to get rid of PUP. Malware: what is PUP? The abbreviation PUP stands for "potentially unwanted program". It is software that is not as dangerous as viruses and Trojans, but should not be on your computer...

Block O2 SIM card - how it works

If you have lost your cell phone and want to block your SIM card with O2, the process is unfortunately not free. We'll show you how to get it blocked. O2: lock SIM card The cheapest option is to block online O2 login. Here you can block your SIM card directly with a click of the mouse for a fee of 5 euros...

Amazon email: fake notification from the security service - this is how you should proceed

You should always check in advance whether an Amazon email is fake. Fraudsters are increasingly trying to get your credentials through nasty phishing loops. Read here how you can recognize a fake email and what you can do if you have already released your data. Fake: Email from Amazon could be phishing When attempting phishing, cyber criminals pretend to receive an email from a major online service such as Amazon...

Mac OS X: Protect file with password - how it works

This practical tip describes how to protect a file with a password on Mac OS X. If you want to hide sensitive files from other users, you can find out in the following article which steps you need to take into account. Mac OS X: Protect files with an encrypted image with a password You don't need an external tool to lock files on your Mac with a password...

Encrypt passwords - here it goes

If you want to encrypt your passwords, you have several options. We'll tell you exactly how this works in this practical tip. Encrypt passwords - there are options LastPass: You can easily integrate this tool into your browser and thus encrypt your passwords. You also have access to all your passwords with just one login - for download KeePass: This tool also encrypts your passwords easily and conveniently...

Virus protection for Samsung TV: You should be aware of this

There are several ways to install virus protection on your Samsung TV. You can find out how to increase the security of your Smart TV and what you need to know about it in the following practical tip. Virus protection for Samsung TV - these are the options Like all technical devices with an Internet connection, smart TVs are not immune to being targeted by viruses and other malware...

Symantec Norton PUA.DownloadSponsor: This means the antivirus message

The anti-virus software Symantec Norton keeps warning about the threat "PUA.DownloadSponsor". However, in many cases this message is unfounded, for example with the CHIP installer. We show you how to recognize a hoax and what you can do when it appears. Symantec Norton reports PUA.DownloadSponsor The anti-virus software Symantec Norton is one of the best anti-virus tools on the market...

Remove virus with Malwarebytes: a guide

In this guide we show you how to remove a virus with Malwarebytes Anti-Malware. Remove Malwarebytes Anti-Malware virus - Preparations Make sure that the Malwarebytes database on your PC is up to date. To do this, click on "Update Now" under "Database Version" in the dashboard. In order for all potential threats to be found on your PC, you should carry out a complete system scan under "Scan"...

Avast: 3 good alternatives

Avast is considered reliable virus protection, but in our last tests other leaders emerged. In this practical tip, we show you which alternatives are really worthwhile. Kaspersky Internet Security: alternative to Avast In the last test, the latest version of Kaspersky Internet Security 2015 achieved top marks in the areas of detection, performance and usability...

What are ping calls? Easily explained

Ping calls or ping calls are often called lock calls, which already reveals a lot about them. In this practical tip, we will show you exactly what is meant by the term "ping call". Ping calls should make you curious If you get a lot of calls, but don't have the chance to get on the phone fast enough, it's probably a so-called ping call...

PayPal: How to confirm your bank account

You can confirm your bank account with PayPal in just a few steps. We explain how this works in this practical tip. Confirm bank account with PayPal - how it works You will receive an amount of EUR 0.01 three to four working days after adding the PayPal bank account. You will find a code in the purpose...

Sparkasse set up tan process: how it works

ChipTAN, smsTAN and pushTAN - these are the Sparkasse's new TAN processes. The days of the TAN lists on paper, previously indispensable for online banking, are finally history. Instead, the Sparkasse offers you three new, digital TAN procedures. Sparkasse's new digital TAN processes - that's them After the previous TAN procedure became too insecure over time, the financial institution had to upgrade...

iZettle costs - all prices at a glance

There are costs for using the iZettle mobile POS system. You need various accessories to use the service. There are also fees for use. Cost of purchasing iZettle There are various costs for using the iZettle mobile POS system. Generally you need a smartphone or tablet for iZettle, which controls the system...

Android: Google account hacked - you should do that now

A lot of sensitive data is linked to a Google account. This practical tip shows you how to react when your Android account has been hacked. Android: Google account hacked - the signs There are several scenarios where you can determine that your account has actually been hacked. Of course, this includes, of course, the Google-typical notification if unusual login processes are identified...

Dashlane: delete account - how it works

If you no longer want to use Dashlane Password Manager, you can delete your Dashlane account. In this way you ensure that all your saved passwords and your account data are no longer available. Dashlane: delete account Your Dashlane account contains all passwords that you can manage using the password manager...

Google Pay doesn't work - you can do that

With Google Pay, paying with your smartphone is very easy. However, Google Pay may stop working. You can find out what you can do in this case in the following practical tip. Google Pay is not working - so you can fix the problem There are many reasons why Google Pay doesn't work normally. Use the following tips to fix the problem...

Google: Enable 2-step verification

This practical tip shows you how to activate the "Confirmation in two steps" feature for your Google account and thus additionally protect your account from unwanted tampering. Activate "Confirmation in two steps": Latest videos First navigate to the "Security" menu and select "Two-step verification"...

Remove CoinVault - Here's how

If you have "CoinVault" on the PC, you will be blackmailed with your own data. In this guide, we reveal how to remove the tool and whether it is a virus. CoinVault - is it a virus? CoinVault is so-called ransomware. The software is usually installed unnoticed when other programs are installed...

Payback: change PIN - how it works

If your Payback PIN is too cumbersome for you, you can change it to a simpler number code. In this article we will tell you how to do this. Change PIN of Payback With your Payback PIN, you can log into your Payback account, among other things. If you create an account, you will be assigned a four-digit number PIN...

What is phishing and how can I protect myself against it?

You often hear "phishing" on the Internet - we show you what it is and how you can protect yourself against it. Phishing: what is it? The word "phishing" is derived from "fishing" and means fishing for passwords and account details. Fake websites and e-mails try to steal this data from Internet users: You will receive a fake email from your internet provider asking you to update your account details...

Giropay24: Receive an email with a reminder - that's the reason

Giropay24 GmbH is currently sending emails with reminders. If you have also received such a warning, you should act quickly. We show you what to do and what happens if you do nothing. Giropay24: Is the e-mail reminder genuine? The alleged Giropay24 GmbH are fraudsters. The scammers use phishing emails to attack you and your computer on several fronts...

Nintendo Switch: set up parental controls - how it works

Nintendo's new Switch console offers exemplary parental controls. It works either via the app or through the console menu. We show you how to activate protection: Nintendo Switch: parental controls via app The advantages of the app are obvious. You can monitor the console and make settings from your smartphone...

Is Mobile Banking Safe? You have to pay attention to that

With mobile banking, you can manage money transactions on the go with your smartphone. Whether your account is secure depends primarily on your bank's standards and your own precautions. In this practical tip, we will tell you what you absolutely have to pay attention to and what precautions you can take to protect your money...

What is a direct debit and how does it work?

Direct debit is one of the basics of cashless payment. We'll tell you what exactly is a direct debit and how it works. What is a direct debit? With a direct debit, companies or authorities can collect money from their customers or creditors independently. This will relieve you of the transfer work and the money will be debited from your account...

Termination: Free templates for any purpose

You can send cancellations quickly and easily with our free templates. Whether mobile operator, insurance or electricity provider - you can always use our sample templates. Termination templates can be downloaded free of charge Cancellations can be annoying, especially at the end of the year, but they do not have to be: With our free cancellation templates, the address and text are already included, so all you have to do is enter your customer number / contract number, name and address...

PayPal triangle fraud: what is it and how do you protect yourself?

The new scam via the PayPal payment service is triangular fraud. We show you what it is and how you can protect yourself against it. PayPal triangle fraud: how the mesh works The new mesh, which is processed via the PayPal payment service, is well thought out. You post a product for any value (100 euros in the example) on the Internet...

Windows Firewall: Add exception - how it works

If a program is blocked by the Windows Firewall, you can allow it again by adding an exception. Our instructions show you the exact procedure. Windows 10: Add exception in the firewall The following instructions apply to Windows 10. However, you can find your way around older versions of Windows just as well...

Check individual files online for viruses - how it works

If you find suspicious files that your anti-virus program does not recognize, check them online again for viruses. We show you on which pages this works. Scan files online for viruses There are several providers where you can upload files and have them checked for viruses. After uploading, your file will be scanned by several anti-virus tools...

Windows: Detect hacker attacks - how it works

If you want to check your system for hacker attacks, you can track down the potential dangers under Windows yourself. We show you what warning signals there are and how to check your system for attacks. Warning signals: How to identify hacker attacks The following criteria are only signs of a hacker attack...

Listen to Alexa? The Amazon Echo is really that safe

If you have an Amazon Echo at home, you have to ask yourself whether you can listen to Alexa. Because many users are concerned about security. Fortunately, there are tests and lots of details. Listen to Alexa? How easily can you be spied on? Call "Alexa" once - the Amazon Echo will listen to you and help you in everyday life...

Dashlane: Overview of password manager costs

The Dashlane password manager securely stores your passwords for you. The cost of this service varies depending on the type of subscription selected. We have summarized the individual packages, their price and their functions for you. Dashlane's cost Dashlane is a password manager that allows you to store all your passwords online in one place...

Update Adobe Flash Player: Update closes security hole

Adobe Flash Player fixes a dangerous security hole with an update. We explain how you can update the version. Install the update for the Flash Player - so you protect yourself from hackers To install the update for the Flash Player, first check which version of the Flash Player is on your systems. Go to this page from Adobe...

Remove Social Search - Here's how

The Toolbar Social Search is not a virus, but you should remove the toolware as it can harm your PC. This guide shows you how to delete Social Search from the PC. Social Search: Remove the program from the PC To get rid of the program, first open the "Control Panel" and switch to "Programs and Features"...

Virus in Word document? How to get it out

More and more viruses are being sent via supposedly harmless Word documents. We show you how to recognize such a virus and thus protect yourself effectively. Word documents with viruses - how does it work? Word files usually consist only of text, images and links. A Word file is therefore usually quite harmless...

Boarding pass contains important information about you: That's why you should shred your boarding pass

After a flight, the boarding pass is no longer needed and is often thrown in the trash. In this practical tip, we explain why you should let it go and shred the boarding pass. Shred your boarding pass and destroy sensitive data Don't carelessly throw away your boarding pass after your trip. She reveals a lot about you and makes it easy for potential criminals to misuse your data...

Cancel newspaper subscription - how it works

If you no longer wish to use your newspaper subscription, you can cancel it at any time. We show you how it works and what you have to watch out for. Unsubscribe from newspaper: You need to know that Newspaper subscriptions usually have a contract term of one to two years. The notice period may not exceed 3 months...

Onewheel: Germany allows driving with an electric board (not)

The onewheel found its way to Germany from America a long time ago. An adapted and final regulation of the motorized vehicle is still pending. What is the OneWheel? A OneWheel is a kind of electric skateboard with just one big tire placed in the middle. The vehicle is controlled by shifting weight. If you put pressure on the front foot, move forward - a principle similar to that of the already known Segways...

Car keys in the fridge: Protect against car theft

Keeping your car key in the fridge may prevent car theft. We will explain why this measure is effective protection against car thieves here. Car keys in the fridge: Protect against car theft In order to understand the meaning of the measure, one must know the procedure of car thieves. Almost every car now has a remote control for opening the doors...

LastPass Free vs Premium: Comparison of subscription models

LastPass is a password manager that is offered both in a free version and in a paid version. This practical tip tells you what LastPass Free vs Premium can do. What does LastPass Free vs Premium do? LastPass Free includes these basic functions: LastPass remembers your passwords and is safe and easy to use...

Gold bars or coins: this is the better investment

As an investor, you can put your assets in gold bars or coins. Depending on your requirements and ideas, one or the other method may prove to be more profitable. Gold bars or coins - gold bars as an investment Gold bars are best suited for the portfolio on the gold market: The production of the gold bars takes up little work and comes closest to the gold price...

Change permissions on Linux - how it works

You can change the access rights for each file under Linux. In this practical tip, we explain how this works and what the permissions mean. What access rights are there? You can assign permissions to read, write and execute a file. You assign read rights with "r" or "4". With "w" or "2" you define the write access...

LastPass vs 1Password - password manager comparison

Lastpass and 1password are both popular password managers. So that you can make an informed decision as to which of the programs better suits your needs, we have compared the two. Lastpass vs 1password: the prices in comparison First, let's compare the prices of the two programs. With LastPass you can first choose a free trial month...

Call 022129263422: that's behind the calls

If the number 0221-29263422 tries to reach you, you should exercise caution: The caller indicates to call the cable provider Unitymedia. But this is a brazen lie. In fact, he has criminal intentions. What happens when you call 0221-29263422? Many users have already been bothered by calls to 0221-29263422...

Logging at Cyberghost: All information

VPN networks such as cyberghost are designed to protect user privacy. This is often not the case with so-called logging. In this practical tip, we will tell you whether Cyberghost also stores and logs your visited websites. Logging at Cyberghost - you need to know that Logging means that the VPN provider logs your surfing behavior, records your IP address or stores similar private information...

Combofix: Instructions for malware scanning

With Combofix you scan the PC for malware and other malware. In our instructions, we show you all the basics for the antivirus tool. Search for viruses, Trojans and malware with Combofix First download Combofix from the manufacturer's website. We recommend that you only use this page. After successful installation, open ComboFix...

Remove com.master.wallet - Here's how

If you find "com.master.wallet" on your Android smartphone, you should remove the virus immediately. Here we show you how to get rid of the virus quickly. com.master.wallet: What is it actually? Com.master.wallet is a relatively new Android virus. There are several ways the virus got on your smartphone...

Remove Web bar on Windows 10: How to get rid of the adware

If you find "Web Bar" in Windows 10, you should remove this adware immediately. It is not a virus, but the software makes various changes to the PC without being asked. We help remove the adware. Step 1: remove web bar from Windows 10 Web bar is ordinary adware. Although this is not particularly dangerous, it can spy on search queries and influence your surfing behavior...

Change WiFi password - how it works

There are many good reasons to change the WiFi password. Often, the given password is simply too complicated to remember. We show you how the change works for the most common devices. Change the WiFi password on the router If you receive a new router from your Internet provider, the WLAN password is in many cases printed on the underside of the router...

SumUp: These are the best alternatives

SumUp is one of the largest providers of mobile EC card readers. We show you alternatives to SumUp with similar products. Card readers with a modern design iZettle The card readers from iZettle are characterized above all by their modern design. You can buy the card reader from iZettle in black and white...

Uninstall Dashlane - how it works on Windows, Mac, iOS and Android

With the Dashlane password manager, you can easily manage your personal data and passwords. If you no longer want to use the program, we will show you here how you can completely uninstall it. Uninstall Dashlane from Windows Under Windows you can completely remove the Dashlane program from the computer via Control Panel -> Programs -> Uninstall a program ...

Minimize radiation from baby monitors - how it works

A baby monitor gives parents security, but you should minimize the radiation from these devices as far as possible. Electrosmog is a growing problem. Baby monitor: minimize radiation - these measures make sense When choosing the baby monitor, you should pay attention to the radiation from the device, because where there is radio, there is also radiation...

Make windows burglar-proof: you should note that

There are various ways to make your windows burglar-proof later. We'll show you how to best protect your home. How to make your windows burglar-proof Open windows, even if they are only tilted, pose no problems for burglars. Therefore, you should pay attention to the following points. When you leave the house, close all windows completely...

Secure your PC with your fingerprint - how it works

If you want to secure your PC with your own fingerprint, you can do this in several ways. We'll show you how it works on Windows 10. Windows & Samsung: Secure your PC with your fingerprint If there is no fingerprint sensor installed in your computer, you have to access external hardware. Note that your computer must have a Trusted Platform Module (TPM) in order to unlock it with a fingerprint...

LastPass vs. Dashlane: Comparison of password managers

LastPass and Dashlane are password managers that allow you to securely manage your passwords. So you only have to remember a single master password. We show you the advantages of both programs. LastPass: your globally accessible password manager The password tool "Lastpass" impresses with its secure system and simple operation...

Difference between data protection and data security - all information

Many people don't even know that there is a difference between data protection and data security. In fact, the two words describe completely different things. So that you know in the future, we will explain the difference here. Difference between data protection and data security - that means data protection Data protection is intended to protect people when processing their data...

Remove adware.chinad - how it works

If you have found adware.chinad on your computer, you should remove it as soon as possible. It is not a virus, but nasty adware. We'll show you how to get rid of adware.chinad. Step 1: Uninstall adware.chinad Adware.chinad is classic adware and not a virus. But that should not be underestimated. It usually arrives on your computer by installing free software and then nests in the browser...

Remove Linkey - Here's how

If you have Linkey on your PC, you should remove it immediately. While this is not a virus, it is annoying adware that infects and slows down your browser. In this practical tip, we will show you how to remove the malware. Step 1: Uninstall Linkey The adware is usually installed subconsciously when you install other freeware...

Remove webdiscover - how it works

If you find the Webdiscover browser on your computer, you should remove it immediately. It is not a virus, but the exact dangers cannot be assessed yet. We show you step by step how to get rid of webdiscover. Remove Webdiscover: Virus or Software? Webdiscover is a browser based on the well-known Google Chrome browser...

Remove Secure Surf - Here's how

If you find Secure Surf as the start page in your browser, you should remove the tool immediately. We show you step by step what to do. Step 1: Uninstall Secure Surf Secure Surf is so-called adware. It usually gets to your computer unnoticed by installing free programs. In addition to changing the homepage, there may also be unwanted advertisements and redirects to websites...

Industroyer: That is behind the malware

The name Industroyer is a malware that is also known as a Stuxnet brother. In this practical tip, we explain what exactly is behind it. Industroyer: All information about malware The so-called Industroyer is considered malware and is primarily aimed at industrial plants. This is a malicious program that outwits the security software in power plants and substations and pretends to be new control software...

Amazonoprime: block annoying pop-up ads - how it works

On smartphones and tablets, an advertising pop-up is currently appearing on some websites, which pretends a competition with the address "Amazonoprime.de" and cannot be blocked. We'll show you what you can do about it. Block Amazon Prime Popups A dubious advertising that is currently circulating promises to win a smartphone...

WLAN: Rename network

You should rename your WLAN so that the network is not confused with several networks in the house with a similar or even the same name. In this guide, we show you how to rename your WLAN. Rename WLAN: Router settings To rename your WLAN, you have to call up the router settings in any browser. Call up the router settings by entering the IP address of the device in the address bar of your browser and pressing Enter...

Detect fake BSI mail: the most important features

Fake BSI emails are currently circulating on the Internet to tap user data. We'll show you how to recognize the fake emails and how to protect yourself from the phishing attack. Recognize a fake BSI email The Federal Office for Security and Information Technology (BSI) shows an example of a fake email on its homepage...

OpenSSL vulnerability Heartbleed: Which passwords do I have to change?

Heartbleed scares the online world. Here you can find out which passwords you should change due to the OpenSSL bug. What is the OpenSSL Gap Heartbleed? Heartbleed is a bug in OpenSSL, a software that encrypts data connections. Some connections supposedly encrypted by OpenSSL could be intercepted by this error by third parties...

Protect user account: You should change your password as often

The best way to protect your user account is with a password. However, you should change this regularly. How often, we tell you in this practical tip. Frequent password changes protect your user accounts You should change your password regularly. It is up to you how often you do this. Because with every new password you have to remember a new combination of characters and numbers...

Airborne germs: how to protect yourself

It can make sense to protect yourself against germs, especially on planes. This is because there are a lot of people in a relatively small space. Protection against germs on the plane - you have these options Protecting yourself from the germs on the plane is not that easy. However, with these precautions you reduce the risk...

What is ransomware?

You've probably heard of malware, but what is ransomware? We clarify this question in our practical tip. This is ransomware Ransomware is a very malicious malware that locks your computer completely (lockscreen) or encrypts important files such as invoices. "Ransom" is the English word for "ransom" and also means what the Trojan wants you to do: money...

This is how a TAN generator works - simply explained

There is no general explanation of how a TAN generator works. There are different types of TAN devices that generate a TAN in different ways. We will introduce you to all the generators. Bank's TAN generators: how they work An generates the TAN via the chip on the customer card. This generator does not have a numeric key, but only a button that you can use to let the device create a TAN as soon as the card is inserted...

Remove launchpad.org - Here's how

Launchpad.org does not destroy your files, but does redirect you to virus-infected sites and share personal information. To remove the unwanted program from your computer: Remove Launchpad.org from Control Panel You can usually get the Launchpad.org virus by downloading free and shareware. The first step is to delete Launchpad...

Digitally sign emails - how it works

If you want to digitally sign your emails, you have to use small additional tools. We present the procedure in this article. Sign emails via certificate - with "Gpg4wub" With the free tool "Gpg4win" you can digitally sign emails with certificates. To do this, you must first generate a key pair: Download and install the free software...

MD5 Checksum: What do you need it for?

With many downloads you will find an MD5 checksum. In this practical tip, we'll tell you what you need it for. MD5 Checksum - that's what you need MD5 is the abbreviation for "Message-Digest Algorithm 5". In German this means something like "message checking algorithm". The checksum consists of 32 hexadecimal numbers...

The best password manager for Linux

Can't remember every single password? We'll show you how to do everything under Linux with a password manager without having to remember every single password. 1. KeePassX: One of the most secure password managers KeePassX runs not only for Linux, but also under Windows and Mac. A plus point is definitely that you can create different data records to manage your passwords by categories...

Encrypt emails with Hushmail - how it works

In this practical tip, we will show you how to encrypt your emails with the Hushmail service. Encrypt emails with Hushmail First, log in to Hushmail. Click the "Compose" link. Write a new message about it. Enter the recipient in the "To" field and the subject in the "Subject" field...

Vaccination certificate lost: what to do?

The vaccination card is an important document that lists all the vaccinations you have received. If you have lost it, you can have a new vaccination certificate issued. Vaccination certificate lost - so do the right thing If you have lost the document, you can have your family doctor issue a new vaccination certificate...

SumUp vs. iZettle: comparison of payment services

SumUp and iZettle are the two largest providers of card payments with mobile EC card terminals. We compare the two providers and show you where their strengths lie. SumUp vs. iZettle - The devices First we compare the respective card terminals with which payments are accepted. iZettle only offers a card reader, which is available in black and white...

Top up Revolut Account: This is how the money gets into your account

There are two ways to top up the Revolut account, either by bank transfer or by credit card. In this article we will show you how it works. Top up Revolut account by bank transfer In order for you to successfully top up your Revolut account, you must ensure that you always transfer the money in the currency of your account...

How safe is OneDrive? All information

Clouds like Microsoft OneDrive are repeatedly criticized for their lack of security. You can read how safe OneDrive really is in this practical tip. How safe is OneDrive? - all information It is difficult to assess how safe OneDrive really is. Although the service uses the common, high-quality encryption techniques to block access to your data, the data itself is stored unencrypted on Microsoft's servers...

Malicious file is blocked by Chrome - what to do?

Sometimes Google Chrome displays the message "A malicious file is being blocked". We'll show you how to use it correctly and still download the file. Malicious file blocked by Chrome - that's why In addition to dangerous websites, the Chrome browser also blocks downloads if it classifies them as dangerous...

McAfee blocks Skype - what to do?

In this practical tip, we show you what to do if McAfee blocks Skype. Add Skype in McAfee as an exception so that it is no longer blocked To stop McAfee from blocking Skype, you must add Skype as an exception: Start "McAfee" and switch to the "Web and E-Mail Protection" tab. Then click on "Show firewall and anti-spam settings"...

Remove Offers4U: Complete instructions

We explain how to remove Offers4U malware. Offers4U is a browser hijacker. To get your browser back in order, you should follow these instructions. Remove Offers4U from the programs and use the scanner First open the "Control Panel". Click on "Uninstall a program" in the "Programs" category...

Windows Phone 8: Activate SSL encryption

Enabling SSL encryption on Windows Phone 8 increases the security of your mail traffic. We will show you the necessary settings. Enable SSL encryption on Windows Phone 8 To activate SSL encryption, you only have to make the corresponding option in the settings of the email app. Open the email app of the email address for which you want to activate SSL encryption...

GMX Mail: Activate SSL encryption

With this practical tip, you will be able to easily activate SSL encryption on your GMX mail account. SSL encryption for GMX on Windows 8 mail Of course, you can set up SSL for GMX-Mail on any email client, smartphone and tablet. Our example shows the setup in Windows 8 - Mail and in the picture gallery you will find the steps illustrated...

Use cloud services safely - you have to pay attention to that

There are a few things to keep in mind to securely store your data in cloud services. With our 5 tips you can make your online storage secure. 1. Do not share private information Your private data, such as bank details or passwords, do not belong in a cloud: You have no influence on the further use of your data...

T-Online: Activate SSL encryption

This practical tip shows you in just a few steps how to activate the SSL encryption of your T-Online email account. T-Online: Set SSL encryption in Outlook We'll explain how to encrypt your Outlook 2010 account here. In the picture gallery you can follow the instructions step by step. Start Outlook 2010 and open the account settings via File - Information...

Avast upgrade makes sense or not?

Avast offers a paid upgrade to one of the better versions after each update. We'll tell you whether the upgrade makes sense or whether you can safely save the money. Does an Avast upgrade make sense or not? The free version of Avast Free Antivirus already offers very good protection. If you only surf the web on secure websites, the free version is sufficient...

Vintage cars: When your car is one of them

Many car owners would like to have the title of classic car for their vehicle, but certain requirements are required. You can find out when an old car officially becomes a classic car here. Old car or classic car - that makes the difference In order for your nasty old car to be named a cultural asset in automotive engineering, it must meet the following requirements: The car must have been registered at least 30 years ago...

Thunderbird: Activate SSL encryption

Your email traffic will be more secure if you activate SSL encryption. We explain how this works with Thunderbird below. SSL encryption under Thunderbird in four steps First click on the email account and go to the "Account Settings". In the "Account Settings" menu you decide on the "Server Settings"...

Verification with PayPal - how it works

For security reasons you have to verify your account with PayPal. You can find out how this verification works in this practical tip. PayPal verification - this is how the confirmation works In order to enjoy the full functionality of your PayPal account, you should verify this: Log in to PayPal with your data...

Share WiFi - you have to consider that

If you share your WiFi with flatmates or neighbors, there are several things to consider. We will introduce you to the most important points in this practical tip. Share WiFi: The most important information is simply explained According to a judgment of the Federal Court of Justice, anyone who has an open WLAN is no longer liable for the abuse that is carried out by neighbors or others via the WLAN connection...

Virus encrypts files: you can do that

If a virus has encrypted all files on your computer, you need special software to decrypt it. We'll show you how to get your data back for free. Ransomware: Virus encrypts files Such viruses are ransomeware. Once the malware has made it into your system, all files are encrypted using a complicated algorithm...

How secure is my password? How to test it

Regardless of whether for Facebook, Twitter or online banking - with all services you should always ask yourself: "How secure is my password". We show you how you can easily test security yourself and give tips for a secure password. How secure is my password really? You can easily test your password security online...

Paysafecard: All fees at a glance

Fees may also apply to the Paysafecard. We present an overview of the costs. Paysafecard: Overview of possible fees Using and paying with a Paysafecard is usually free. We explain to you when fees may apply: If you return your Paysafecard and want to pay off the credit again, a fee of EUR 7.50 will be deducted from the amount to be paid back for the return...

Remove Crazy Score - this way you will get rid of the adware

If you have caught the "Crazy Score" adware, you should remove it immediately. It is not a virus, but what exactly the adware does is not known. Step 1: remove Crazy Score from Windows Crazy Score is an adware. This is usually installed unnoticed when other software is installed. Uninstall Crazy Score: Open the Control Panel and sort the list of installed programs by the installation date...

Take food through airport security: this is allowed

If you want to take food with you through the security check at the airport, you have to be careful. Because many foods are not allowed and are mercilessly taken out of your luggage. We show what security personnel look out for and what you can take with you. Take food through security You can put as much food (and drink) in the hold baggage as you like...

Provide account number for contest calls - is this safe?

For many contest calls, you should provide your account number in order to receive a prize. Here we explain in which cases this is safe and when you should hang up. Contest Calls: Specify Account Number or Not? If you suddenly hear the phone ring and you receive the message about a win, you should be careful...

WiFi smoke detector - you should pay attention to this when buying

In most federal states, it is already mandatory to install several smoke detectors in the house. Buying a WiFi smoke detector has several advantages. For example, you can query the battery level on your smartphone. In this practical tip, we explain what you should also consider when buying a WLAN smoke detector...

Lock Vodafone SIM card - Here's how

This guide shows you how to block your SIM card with Vodafone. Block SIM card at Vodafone A 24-hour hotline is available to block your SIM card at Vodafone. Customers with a term contract dial the number 1212 from the Vodafone network. You can use the free phone number 0800 172 12 12 from all other German networks...

Consent.exe - what is it? Easily explained

In this practical tip we will show you what Consent.exe is and what you can do about it. Consent.exe - what is it? Easily explained The process "Consent.exe" originates from Microsoft Windows. The associated file can be found under C: / Windows / System32. The process prevents Windows from starting and programs from running...

Scanpst.exe - what is it? Easily explained

The scanpst.exe file appears on your computer if you are using Microsoft Office (Outlook). On this page we will show you what the file does and whether it is harmful. Scanpst.exe: is it harmful? The scanpst.exe file is a tool to repair the Microsoft Outlook inbox. The small but helpful program not only scans corrupt Outlook PST files or viruses, it also repairs them...

Ntoskrnl.exe - what is it? Easily explained

If you get an error message about the Ntoskrnl.exe file, ask yourself what it is. We clarify it. Ntoskrnl.exe: what does the process do? "Ntoskrnl" is the abbreviation for "Windows NT operating system kernel". It is one of the most fundamental and therefore most important processes in Windows...

Mbamservice.exe - what is it? Easily explained

Find the "mbamservice.exe" process in Task Manager and ask yourself what it actually is. We will explain and show you how dangerous the process is. mbamservice.exe: harmful or not? The mbamservice.exe process belongs to the software Malwarebytes Anti-Malware. It is a free and frequently recommended virus scanner...

Facebook: Use USB security key - Instructions

If you use a USB security key to log in to Facebook, it is much more secure than with just a password. Here we show how to set up the security key. Use USB security key on Facebook Two-factor authentication is more secure than logging on with just one password. If your password is stolen, the fraudster will still not be able to log in...

Wusa.exe - what is it? Easily explained

In the Task Manager you will surely already have the wusa.exe process. seen. You can find out what this is and whether you should deactivate the process on this page. Wusa.exe - what is it exactly? The wusa.exe file is part of the Windows update installer. If the file appears in Task Manager, Windows is probably installing updates...

Taskeng.exe - what is it? Easily explained

If you see taskeng.exe in Task Manager in Windows 7 or Windows Vista, the meaning of the process is not entirely clear. We will therefore explain what the process means. Taskeng.exe - what is it? Taskeng.exe runs the task scheduling service of Windows Vista and Windows 7. If you as a user have set a temporary task, the application starts it at the scheduled time...

Remove Ads by Couponarific - Here's how it works

The browser hijacker Ads by Couponarific causes annoying advertisements in your browser. Although it is not a virus, you should remove the adware as soon as possible. We'll show you how. Remove Ads by Couponarific from the computer First you need to delete the adware from your computer. Start the Control Panel and open "Programs and Features"...

Remove Right Deals - Here's how

Discover Right Deals in your browser if you remove the software directly. We'll show you how it's done. Step 1: remove Right Deals Virus Right deals are not a virus, but annoying adware. This usually gets into your computer by installing other programs. Right deals bother you with pop-ups, among other things...

Remove Virus CoinMiner - Here's how

If the CoinMiner virus has nested on your PC, you should remove it immediately. We will show you how to do this in our step-by-step instructions. Virus: Remove CoinMiner Trojan The CoinMiner virus misuses the processing power of your computer so that the owner of the virus makes money from complex calculations...

Remove Melondrea - Here's how

If you discover Melondrea on your PC, you should remove the software as soon as possible. We'll show you how it's done. Step 1: remove Melondrea from the system Melondrea is not a virus in the strict sense, but rather adware, which is usually unintentionally embedded on your PC via share or freeware...

Remove Swift Browse - Here's how

This guide shows you how to remove the Swift Browse malware from your PC. Swift Browse: How to remove the malware Swift Browse is not a virus in the classic sense, but a browser hijacker that can change both the start page and the search engine, as well as showing unwanted toolbars and advertisements...

AntiVir: 3 good alternatives

There are many alternatives to Avira AntiVir - we present 3 good virus protection packages. AntiVir alternative "Kaspersky Internet Security 2014" Like Avira, Kaspersky is an anti-virus program. You can download the demo here. A beautiful user interface and easy operation make it easy for beginners to use the anti-virus software...

Bitlocker vs TrueCrypt: Security tools compared

Bitlocker and TrueCrypt are two methods that you can use to secure your hard drives against unwanted access. We compare the encryption programs for you so that you can sleep a little more peacefully in the future. Bitlocker - encryption by and for Windows Bitlocker is encryption software that has been included in the scope of delivery for certain versions of Windows since Windows Vista...

Remove MPC Safe Navigation - Here's how

The MPC Safe Navigation is often installed unintentionally and remains persistent in the browser. This practical tip shows you how to remove the tool successfully. Uninstall MPC Safe Navigation correctly Start by uninstalling the unwanted adware from your PC: To do this, open the control panel of your PC...

Logic errors on Facebook: Therefore you should check your privacy settings immediately

A logic error has been discovered on Facebook that makes your mobile number public. However, the problem can be quickly remedied in the privacy settings. We'll show you how it's done. Facebook: logic error in the privacy settings Many users have their own mobile phone number on Facebook. Either you made the entry yourself, Facebook Messenger added your number later or you use the number for security functions...

Change PayPal password - so it'll work

For your security, you should change passwords regularly. You can read how to replace your PayPal password in this practical tip. PayPal: How to change your password First log in to PayPal. Select the menu item "Profile" here. You will now get to your profile data. Click on "Change" under Password on the right (see picture)...

Remove Ixquick - Here's how

If the Ixquick toolbar suddenly appears in your browser, you can easily remove it. Ixquick.com is a reputable metasearch engine that disguises your IP address on the net, which is why a visit to the website has no harmful consequences for your computer. Remove Ixquick toolbar from the browser The following instructions will tell you how to delete extensions and plugins from your browser...

Remove E deals - so it'll work

If you find "eDeals" ads or pop-ups in your browser, you should remove the adware immediately. We'll show you how it works. Step 1: Uninstall eDeals EDeals is comparatively harmless adware. It nests in your browser and provides, among other things, annoying advertising. This takes the form of pop-ups or advertisements...

Remove CryptoHitman virus - so you get rid of the Trojan

If you have caught the CryptoHitman virus, you should immediately remove the Trojan from your computer. We'll show you how to do it step by step. CryptoHitman virus: what does the trojan do? In most cases, the trojan gets to your computer via mail attachments and suddenly takes over your system. Your personal data is encrypted and given the file extension ...

Remove Home24.net - Here's how

If you are greeted with the homepage "Homepage24.net" in your browser, you should remove it immediately. We'll show you how it's done. Step 1: Uninstall Homepage24.net This is not just a simple change to the homepage. The change is caused by adware, which is relatively harmless. However, it has no business on your computer...

Remove SpeedMaxPc - Here's how

If you have installed SpeedMaxPc on your computer, you should remove the program as soon as possible. We'll show you how it's done. Remove SpeedMaxPc Uninstall a program: First, you should uninstall the program like any other program using Control Panel. Look for the entry "SpeedMaxPc" in the list of installed programs...

Overview of De-Mail providers

De-Mail is becoming an increasingly important communication channel. In this practical tip we give you an overview of the De-Mail providers. De-Mail from Telekom One provider is Telekom. Telekom is accredited to the Federal Office for Information Security (BSI). You can send De-Mails free of charge until January 31, 2015...

Remove ShadowTech-Rat Trojans - Here's how

This guide shows you how to remove the ShadowTech-Rat Trojan from your PC. Remove ShadowTech advice from the PC: exclude false alarm Little is known about the ShadowTech Council and its various types. First of all: If Detekt finds this Trojan on your PC, first of all look in the program's log file...

Remove Price-Horse - Here's how

If your homepage on Price-Horse.com has changed, you should remove the adware as soon as possible. We show you how this works in this guide. Step 1: remove Price-Horse Price-Horse is comparatively harmless adware. Among other things, this changes your home page and unintentionally displays advertisements...

Hacker attacks: Detect fake iCloud mail - how it works

Since September, hacker attacks have been carried out using fake iCloud emails. We will show you how to recognize the emails. Hacker attacks via fake iCloud emails On August 31, 2014, a hacker posted numerous nude photos of celebrities on the 4chan.org website. The hacker got access to the iCloud accounts of the stars and stole the pictures...

Remove PUP.Optional.opencandy

This practical tip explains how to remove PUP.Optional.opencandy from your PC and what it is. PUP.Optional.opencandy in Malwarebytes - how to remove the "malware" PUP.Optional.opencandy is a special form of finding in the Malwarebytes Anti-Malware software. PUP comes from Potentially Unwanted Program...

Remove BlackShades-RAT trojan

If you have caught the BlackShades RAT Trojan, you should remove it immediately. Our instructions show you the exact procedure. First download the current version of Detekt. Older versions are even more prone to errors. Disconnect the WLAN and remove the network cable. Now disable the protection of your anti-virus software...

Dark Comet RAT: How to remove the Trojan

If you have caught the "Dark Comet RAT" trojan, hackers can take over your PC in the worst case. Therefore, remove the malware as quickly as possible. Remove "Dark Comet RAT": Here's how If you start a search with the free "Detekt" tool, it will often find the Dark Comet RAT trojan...

Remove Cydoor Virus - Here's how it works

If you discover the Cydoor virus in your browser, you should remove it quickly. We show you in our instructions how to proceed. Step 1: remove Cydoor Virus Cydoor is the name of an entire company that develops and sells adware. Cydoor usually gets onto your computer unintentionally by installing other programs...

Remove Lip.pack.net virus

If the start page of your browser on Lip.pack.net has changed, you should remove the virus as soon as possible. We show you the exact procedure in our instructions. Step 1: remove Lip.pack.net virus Lip.pack.net is adware that usually gets onto your computer by installing other programs. Among other things, your homepage is changed and search results are manipulated...

Avast: Deactivate voice output - how it works

In this practical tip, we will show you how to deactivate Avast's voice output. Avast !: Deactivate speech Open the Avast client on your computer. Click on "Settings" in the left bar. Under "Presentation" you will find the sub-item "Sounds". Remove the check mark from "Activate speech output"...

Tropmi Payment: Receive a reminder - what to do?

If you have received a reminder from Tropmi Payment, you should not panic immediately. In this article we show you which steps you can take. Reminder from Tropmi Payment: You can do that First of all, you should keep calm. Just because you have received a reminder does not mean that you are inevitably obliged to pay the amount requested...

Remove Websearch.youwillfind.info - Here's how

This guide shows you how to remove the "Websearch.youwillfind.info" adware from your PC. Remove Adware Websearch.youwillfind.info "Websearch.youwillfind.info" is adware that changes your homepage and default search engine. In addition, unwanted advertising may appear in the browser...

Avira Antivirus: Create automatic search request

In the Avira virus scanner, you can create a search request with which you can automatically check your computer for viruses at regular intervals. In this practical tip, we explain how to do it. Set a new search plan in Avira Antivirus Open the main Avira Antivirus window. To do this, double-click the Avira icon in the notification area of ​​your taskbar. Th...

No mail from the BSI - what does that mean?

If you haven't received an email after the BSI security test, that's good news for now. However, the BSI test results do not always reach the recipient immediately. How long does the BSI security test take? If you have been "positive" in the BSI test, the Federal Office for Information Security usually notifies you immediately, ie a corresponding email should arrive in your mailbox after a few minutes at the latest...

Change web.de password

In this practical tip we will show you how you can change the password on web.de. Incidentally, you should do this regularly for security reasons. How to change the Web.de password Make sure that your new password is as secure as possible. Here we give you tips. To change the password, go to "www...

Remove AnyProtect - Here's how

If you find the AnyProtect program on your computer, you should remove it immediately. We'll show you how it's done. Remove AnyProtect from your computer AnyProtect software is probably scareware. Although a supposedly useful function is offered, the software is usually installed unnoticed. Uninstalling programs: First open the Control Panel and look for "AnyProtect" in the list of installed programs...

Arcor: Change email password

In order to increase the security of your email account with Arcor, you should change your password regularly. We show you where to find the settings in this article. Change password at Arcor Log into your email account at Arcor.de. Go to the "Services" tab and select "My data". Here you will find the "Password management" button...

Create a secure PIN - you have to be careful

If you have to create a new secure PIN, you will quickly face a small challenge. We will show you what you have to be aware of. Create a secure PIN A PIN usually only consists of numbers, but can also contain other characters such as letters. Depending on the situation, you should pay attention to certain things: Length: If your PIN consists only of numbers, it should contain at least twelve numbers...

Remove Lpmxp2.com virus - Here's how

If your homepage on Lpmxp2.com has changed or you receive pop-ups from this website, you should remove the virus quickly. We show you how it works. Step 1: remove Lpmxp2.com virus The virus usually gets to your computer unnoticed via installed programs. Among other things, the malware calls up unwanted pop-ups, redirects you to external websites and changes the settings of your browser...

Remove Delve Virus - Here's how

If the Delve virus has taken root in your system, you should act quickly. We'll show you how to remove the malware. Step 1: remove Delve Virus The Delve virus usually goes unnoticed to your computer via share or freeware. The malware nests in the browser and causes, among other things, pop-ups and changes to various settings - such as the start page...

Remove BitGuard - so it'll work

BitGuard is not a real virus, but so-called adware. However, you should remove them quickly. She is responsible for Firefox crashes, home page changes and much more trouble. We will guide you through the complete removal of the adware. Remove BitGuard adware - this is how you proceed Open the Control Panel or the Control Panel in the Windows Start menu...

Remove Ads by CinemaPro - Here's how

If the "Ads by CinemaPro" adware has nested in your browser, you should remove it immediately. This is not a virus, but adware. However, this manipulates the search results and causes annoying advertising. Remove Ads by CinemaPro from Windows Uninstall CinemaPro: Open the Control Panel and sort the list of installed programs by the installation date...

Remove the "Your computer is not backed up" virus

A pop-up with "Reminder: Your computer is not backed up" and a backup recommendation are part of a virus that you need to remove. It slows down your computer, leads to browser crashes and causes spam emails. We give you a guide against the pest. How do you recognize the virus? You can recognize the virus by three different pop-ups: "Did you know you had a free backup on" "Reminder: Your computer is not secured" "Your computer is now ready for backup" Remove Virus - Step 1 The first thing to do is to uninstall the malware from your system...

Encrypt Google Drive - Here's how

You can encrypt Google Drive securely and easily with BoxCryptor. We show you here how the cloud service becomes secure. Encrypt Google Drive - so the cloud service is secure You can easily encrypt Google Drive using the instructions below: First download the freeware BoxCryptor and install it on the PC...

Remove Trojans - how it works

Once you've caught a trojan, removing it isn't always that easy. We'll show you how to get rid of the trojan. Free malware scanners, which also take care of the removal, help you with this. Step 1: Remove Trojan completely from Windows If you have just caught the trojan, in some cases it is worthwhile to disconnect from the Internet...

Remove flow surf - how it works

In this guide, we explain how to remove Flowsurf. Flowsurf is unwanted software that usually installs on your PC unnoticed with other tools. Remove Flowsurf from the browser Flowsurf usually saves as an add-on in your browser. Read how to uninstall the Flowsurf plugin in Firefox in the following practical tip...

Remove Zakudx - Here's how

If you notice the adware Zakudx in your browser, you should remove it immediately. We show you how this works in this guide. Remove Zakudx from Windows Zakudx is adware that is usually installed unintentionally when other software is installed. Zakudx reports in the browser that a Java update is required and redirects you directly to a download page...

Block Telekom SIM card - how it works

In this practical tip, we explain how you can block your Telekom SIM card. Block Telekom SIM card Card blocking is the first important measure if your mobile phone has been stolen or you have lost it. If you block your SIM card promptly, you cannot be held responsible for any subsequent damage. We show you how it's done: The quickest way to have your SIM card blocked by phone is to dial either the free service hotline +49 (0) 800 3 302202 or the short code 2202 on a telecom mobile phone...

Remove Astromenda.com - Here's how

In this practical tip we will show you how to remove Astromenda.com from your browser and PC. Uninstall Astromenda using Control Panel First switch to the Control Panel. Select the program item "Programs and functions". Browse the list for programs that are called Astromenda or that are new to you...

Remove KeyPlayer virus - Here's how

If the KeyPlayer virus has infected your browser, you should thoroughly remove it from your computer. In our instructions we show you the individual steps. Step 1: remove KeyPlayer virus from the system The KeyPlayer virus not only causes annoying advertisements and pop-ups, but also changes your homepage and search engine...

PC Health Advisor: Is the Cleaning Tool Worth It?

The "PC Health Advisor" promises to combine numerous tools in one program. In this practical tip, we will tell you whether you should download the program or not. PC Health Advisor: is it worth downloading? At first glance, the program appears to be free of charge, but you need a license worth around 50 euros to use all functions...

Mac: Turn off the firewall - how it works

If your firewall blocks a program on the Mac, you can temporarily switch off the security feature. However, you should only do this with secure software. Mac: Turn off the firewall - how it works Click on the apple icon in the top left of the menu bar. Choose System Preferences> Security. In the new window, click on the "Firewall" tab...

Hide Amazon wish list in Google - how it works

You have created a wish list on Amazon, but do not want to share it with the whole world via Google? Hide the wish list! We'll explain how to do it. Hide Amazon wish list in Google - how it works! Log in to Amazon. At the top right next to the "shopping cart" click on "Wishlist"...

Antivir browser protection: add exceptions

If a trusted website is blocked by your Avira AntiVir browser protection, you can add the website as an exception. We'll show you how it's done. AntiVir browser protection: add exceptions Browser protection is only available for users of the paid versions of AntiVir. In the free version of the protection program, you have no access to browser protection...

Compare files with MD5 hash generator

In this practical tip, we will show you how to compare files with an MD5 hash generator. How to compare your files with an MD5 hash generator With the freeware "HashMyFiles" you can check your files against the checksum: Once you have successfully downloaded and installed the software, you can select one or more files for review with one click...

Avast antivirus: disable protection - how it works

If Avast blocks a program that you want to run, you can simply temporarily disable virus protection. In this practical tip we will show you how. Briefly deactivate Avast protection It often happens that a virus program like Avast blocks other programs or hinders work on the PC in another way. In these cases, you can easily deactivate the antivirus for a certain time: In Windows, you will find a small Avast icon in the system tray at the bottom right...

Avast: Activate game mode - how it works

For example, Avast update messages can interfere with the full-screen mode of programs. Therefore, you should activate the game mode before starting such programs to temporarily deactivate the messages. Avast Antivirus: Activate game mode setting When game mode is activated, Avast automatically detects whether a full-screen application is open and then suppresses messages and pop-ups so as not to disturb the full-screen mode...

How do I update Kaspersky Internet Security 2013 to 2014?

Do you have Kaspersky Internet Security 2013 and want to update to the 2014 version? We'll show you how to do it so that your computer stays up to date in terms of security. Download the installation file of Kaspersky Internet Security 2014 First you need the installation file of the new version of Kaspersky: Kaspersky Internet Security 2014: Download Kaspersky Anti-Virus 2014: Download Close the 2013 version of Kaspersky The next step is to exit the already installed version of Kaspersky Internet Security 2013...

Adobe Reader: Deactivate JavaScript

JavaScript is activated by default in Adobe Reader. By deactivating the script, you close a security hole and protect yourself from Trojans and viruses. We'll show you how to change the settings. Adobe Reader: How to disable JavaScript Open Adobe Reader and then the command "Edit"> "Preferences" (shortcut Ctrl + K) Then select the "JavaScript" category on the left and switch off the "Activate Acrobat JavaScript" option...

Protect the folder on the USB stick with a password

With an additional program, you can protect folders on your USB stick with a password. That's how it's done. Set up TrueCrypt for USB stick With the program "TrueCrypt" you can protect files on your USB stick with a password. Download "TrueCrypt" and install it. Now connect your USB stick to the computer...

Remove Box Rock Virus - Here's how it works

If you find the Box Rock Virus in your browser, you should remove it immediately. Our instructions show you the exact procedure. Step 1: remove Box Rock Virus from Windows Box Rock nests in your browser and causes, among other things, unwanted advertisements and annoying pop-ups. The tool usually reaches your computer unnoticed by installing other software...

Remove GoHD - how it works

If you find the GoHD in your browser, you should remove it quickly. GoHD is not a virus, but adware - the program injects advertising into your computer. We'll show you how to get rid of the pest. Step 1: remove GoHD from Windows GoHD is adware that nests in your browser. Here she changes various settings and provides, among other things, annoying advertising and pop-ups...

Remove malware with Norman Malware Cleaner: a guide

In this guide, we explain how to remove malware using the Norman Malware Cleaner program. Find and delete malware with Norman Malware Cleaner Install the Norman Malware Cleaner. Open the program and click on the "Scan" tab. There you can choose between three different scanning methods. The quick version scans for active malware...

Remove Omiga Plus

If you have caught the Omiga Plus toolbar, you should remove it very quickly. Although this is not a virus, the so-called adware injects advertising into your browser and can be very annoying. Remove Omiga Plus - how to proceed Omiga Plus is adware that is usually installed unintentionally with other software...

Apple Time Machine: copy backup - how it works

If you want to copy your backup from the Time Machine, you can do it in just a few steps. Find out exactly how in this practical tip. Copy backup from Apple Time Machine - Here's how Open the "System Settings"> "Time Machine" and switch off the Time Machine. If you want to copy the backup to an external hard drive, connect it now and go to "Programs"> "Utilities"...

Revoke mobile phone contract: All information and tips

If you want to cancel your mobile phone contract, you should note a few points. In this practical tip we have summarized tips and information for you. Revoke mobile phone contract - you should note that If you have concluded your mobile phone contract in the shop, you are not entitled to withdraw your consent...

Cancel call mobile phone contract: how it works

Contrary to canceling, signing up for a cell phone contract is usually made easy for you. In this practical tip, you can read how to end your Callmobile contract anyway. How to cancel your Callmobile mobile phone contract The safest way is always to give written notice to the address callmobile GmbH, Deelbögenkamp 4c, 22297 Hamburg....

Bluetooth: how to protect yourself from a hacker attack

No connection is really secure, even with Bluetooth connections you should protect yourself from hackers. We show you where the risks are and how you can avoid them. Bluetooth connections become victims of hackers With Bluetooth, photos, text files and various other documents can be sent. The transfer is simple and fast, but also insecure...

T-Online: Change email password

In this practical tip, we will tell you how to change your email password in T-Online. You can find the option simply in the settings of the Telekom service. Find the password change function in the settings First you need to log in to the email center. You need your user name to log in. This corresponds to your email address without the ending "@ t-online...

Use the BSI security test - how it works

The BSI has set up a security test for concerned users: With this you check whether your email address has also been cracked. In April 2014, botnet hackers stole over 18 million email addresses with passwords. Already in January, a similar amount of data came into the hands of the criminals. Here we explain how you can check your email address using the website of the Federal Office for Information Security (BSI)...

hide.me - what's in it?

Surf anonymously and without leaving any traces with the VPN and privacy protection provider "Hide.me". We show you exactly how this works in this article. Hide.me - Anonymous via VPN on the Internet Hide.me offers you almost unlimited internet freedom via an anonymous VPN: With hide.me, you can again surf the Internet freely and without restrictions: The provider's virtual private network (VPN - Virtual Private Network) protects your privacy and bypasses censorship...

Deutsche Bank Email: "Please renew your PIN" - Is this spam?

Supposed customers of Deutsche Bank are currently particularly affected by spam emails. In a new variant of phishing emails, the recipient is asked to renew the PIN or Telepin. Even if you are not a Deutsche Bank customer, you will receive such emails. Phishing mail: Deutsche Bank - "Please renew your PIN" Phishing emails with "Deutsche Bank" as sender have been in circulation for a few days...

What is a password? Easily explained

With a password you protect your user account online or on your computer, smartphone or tablet. In this article we explain to you what a password is in an easy and understandable way. Password - that's behind the difficult code You use user accounts on the Internet and on the computer and have to set a password for them: The password then allows you to access your user account in combination with your user name...

Encrypt NAS - with these tools it works

With a NAS, you can set up your own cloud and save files. You should then encrypt them for security reasons. We have summarized helpful tips for you in this practical tip. Encrypt NAS - you have these options You can already encrypt each time you set up the NAS. Because the various furnishing programs offer encryption without the need for additional software...

Encrypt iPhone backups - how it works

If there is sensitive data on your iPhone, you should not only protect it, but also encrypt the backup. We'll show you how it's done. Encrypt backups of the iPhone and iPad Connect your iPhone to the computer with a USB cable and start iTunes. Wait a short moment and select the device in the top left...

Create indelible folder - Here's how

If you want to know your data in a safe place, you can create an indelible folder in Windows. We'll show you how it's done. Windows: Create an indelible folder Press the [Windows] and [R] keys simultaneously so that the "Execute" command opens. Enter "cmd" here and confirm with "OK"...

nwiz.exe - what is it?

As an Nvidia user, you will encounter the "nwiz.exe" process again and again. What this is and whether the file is dangerous, we will tell you in this article. nwiz.exe - is the Nvidia process safe? The process belongs to the "Nvidia nView Wizard". This is the wizard for configuring the Nvidia nView desktop manager...

Windows 8: Turn off the firewall

If there are problems with programs or connections, briefly switching off the firewall under Windows 8 can help. We show you how to do this. Turn off the firewall in Windows 8 Note: The firewall should only be deactivated for a short time. Your computer is then unprotected and exposed to the dangers in the network...

Microsoft Trust Center: What exactly does the service do?

In this article, we explain what the Microsoft Trust Center is. The service is intended to inform interested parties about security and data protection in Microsoft products. The Trust Center provides important resources and information for this. Microsoft Trust Center: What exactly does the service do...

Kaspersky: Add exceptions - how it works

Kaspersky's antivirus software does a good job, but it is sometimes overzealous. If you regularly create exceptions, you prevent error messages and unintentionally blocked programs. We'll show you exactly how to do it. How to create an exception in Kaspersky You can save a new exception in Kaspersky Internet Security in just a few steps...

Firefox clear: New tab - how it works

With Firefox clear for Android and iOS, a new tab can be called up to switch between different pages. This practical tip shows you how to open a new tab. How to open a new tab with Firefox clearly In order to be able to open a new tab with Firefox clearly for Android and iOS, you first need a website on which a link is available...

Check password security - here it goes

You can easily check the security of your password online and thus determine whether you are really protecting your data sufficiently. Check password security online Go to the password check page of the IT service provider PC Fire Service. Enter the password in the empty field and click on "Check password security"...

Ubuntu encryption: How to secure the system

In the past few years, data encryption has become an increasingly important topic and Ubuntu offers various options for this. In this practical tip, we will show you how you can encrypt the system in Ubuntu. Encryption for new installations Since version 12.10 Ubuntu offers the possibility to encrypt the system with a new installation...

Remove Binkiland - Here's how

If the start page of your browser on binkiland.com has changed, you should remove the search engine immediately. We'll show you how it's done. Step 1: remove Binkiland Search from Windows Binkiland is relatively harmless adware that only changes a few settings in your browser. This includes the start page and the search engine...

Remove Trovi.com - Here's how

If you discover Trovi.com in your browser, you should remove the program as soon as possible. Although the tool is not a virus, the adware injects advertising into your browser and changes the settings. We will show you how to get rid of the program. Step 1: remove Trovi.com Trovi.com is less a virus than an adware...

Recycle old CDs: 7 brilliant tricks

You shouldn't throw away your old CDs and DVDs immediately, but rather recycle them. In this practical tip, we have 7 brilliant tricks for you. Recycle old CDs - so you get the best out of it Note: Before following these tips, you should delete the old CD. Handicrafts: Cut old CDs into small pieces and stick them on a cardboard as a pattern...

Remove MyStartSearch

A wrong click during the software installation is enough to accidentally install the "MyStart Incredibar" or "MyStartSearch" on the PC. In this article we explain how to get rid of them quickly. Remove MyStartSearch from your PC - Here's how First you have to remove MyStartsearch from your PC, then from the browser settings: Incredibar malware usually has two components: the "IncrediGames Toolbar" and the inconspicuous "Web Assistant"...

EC cards with NFC: prevent data theft and protect data - how it works

Credit and debit cards with integrated NFC chips have been around for several years. This practical tip shows you how to protect your data from thieves. Debit cards with NFC: how easy is data theft? You can make contactless payments with NFC chips in credit and EC cards. PIN and signature are then no longer necessary...

Ing DiBa Mail: New tan process - beware of this fake

If you have received an email from ING-DiBa with the subject "New Tan Procedure", you should delete the message directly. We'll show you what's behind the scam. Fake mail on behalf of ING-DiBa: fraud with a new tan process A deceptively genuine spam mail is currently circulating, which focuses on ING-DiBa's customers...

How secure is online banking

How secure online banking is depends very much on how carefully you do it. You should definitely take some safety precautions. This will help you minimize the risk of unauthorized access to your account. Online banking - as secure as you do it Go to your bank's website and check the address field first...

Mail from DirectPay AG - so you react correctly

If you have received an email with an invoice from DirectPay GmbH or AG, you should be particularly careful. You can read about what to do now in this practical tip. Mail from DirectPay GmbH or AG: What is it about? DirectPay GmbH / AG emails usually refer to a direct debit that could not be carried out...

Use your EC card abroad - you have to be aware of that

If you want to withdraw money with your EC card and make cashless payments, this also works abroad. We will show you what you have to consider when using the EC card abroad. Pay abroad: Check the EC card First take your EC card on hand and check the existing logos. The symbols V-Pay and Maestro are relevant for use abroad...

Stolen laptop - what to do?

If your laptop has been stolen, we will show you in this practical tip what you should do and how you can protect yourself from the loss of your notebook or your data in the future. Precaution: Protection against theft of laptop and data Make regular backups of your most important data. External storage media such as USB sticks or free cloud services such as Dropbox or Google Drive are best suited for this...

Sofortüberweisung - a secure payment method?

It is very difficult to answer a general question as to whether the instant transfer, which you can now make in numerous online shops, is secure or not. Therefore, we have briefly summarized the main advantages and disadvantages of the payment method below. The advantages of Sofortüberweisung The payment method of Sofortüberweisung is not that new anymore and with online shopping you will find more and more shops that offer this payment method. ...

PayPal unauthorized account access - what to do?

Unauthorized access to PayPal accounts can be dangerous. In this practical tip, we will tell you what you need to consider if you suspect anything. Unauthorized PayPal account access - change password and security question If you act quickly, you will find that someone has unauthorized access to your PayPal account...

Use a credit card abroad - you have to pay attention to that

If you would like to use your credit card abroad, you should inform yourself beforehand about the fees and acceptance of the card. We will show you what you have to be aware of. Use credit card abroad: payment costs If you pay with your credit card in other EU countries, you do not have to worry about the costs...

Credit card hacked: signs and first aid

Credit cards are particularly useful for stays abroad. It is all the more annoying when the card is hacked. This practical tip shows you how to determine this and how to proceed in such a case. Credit card hacked - the signs Before initiating appropriate immediate measures, the diagnosis "hacked" must first be made...

Ryanair: hand luggage with food - is this allowed?

You can always take your hand luggage with Ryanair on the plane. In this practical tip, we will tell you whether food is allowed here and whether there are problems with the security check. Ryanair: Can I carry hand luggage? All information Ryanair offers a small selection of snacks and drinks on board the aircraft...

What is a port? Easily explained

When it comes to Internet connections, the term port is used again and again. But what is that exactly? Translated, the term stands for "port", connection or "opening". In this article we explain how to understand the whole thing in relation to the computer and the Internet. Port - what is it actually...

LastPass vs KeePass - password manager comparison

Lastpass and Keepass are both well-known password managers. They allow you to store your passwords securely and centrally in one place. We thoroughly examined both programs and compared them with each other. LastPass vs. KeePass: LastPass offers these functions LastPass is a chargeable password manager that is installed in the browser as an add-on...

What is Windows Defender? Explained in a simple and understandable way

The program "Windows Defender" is preinstalled under Windows Vista, 7, 8 and 10. In this guide, we will tell you what it is all about and what the program does on your PC. What does Windows Defender do? Windows Defender is Windows' proprietary anti-virus software. The tool wants to protect you from viruses and other pests and remove them if necessary...

Forgot OneDrive password - what to do?

This guide shows you what you can do if you forget your OneDrive password. Forgot OneDrive password: Generate new password If you have forgotten the password for your OneDrive account, you can have a so-called security code sent to your alternate email address. Visit the Microsoft login page. Click "Can't access your account...

Remove js / trojandownloader.pegel - how it works

You should immediately remove the "js / trojandownloader.pegel" virus from your system. In this practical tip we will tell you how to do this. Remove js / trojandownloader.pegel from Windows First navigate to the "Control Panel" and click on "Programs and Features". Search the list for unknown programs...

Remove cleanserp.net - Here's how

If you have Cleanserp.net on your PC, you should remove the malware immediately. In this practical tip, we show you exactly how to proceed. Step 1: Uninstall cleanserp.net from Control Panel In most cases, the adware is installed subconsciously by other software. First go to Control Panel> "Programs and Features" and take a close look at the list of installed programs...

How secure is WhatsApp?

Wondering how safe WhatsApp really is? In this article, we review WhatsApp security for you. How secure is WhatsApp? WhatsApp is a messenger that is used worldwide to send messages. It is enough to have your friends' mobile phone numbers stored in the address book, because WhatsApp automatically adds them to the WhatsApp contact list when they are used for the first time...

Quarantine viruses - what does that mean?

If your anti-virus software finds viruses or other malware, you can often quarantine the malware. We show you what that means and what you have to watch out for. Virus found: delete or quarantined? If a virus or other malicious file is detected by your anti-virus program, you can usually delete the file directly...

PUP.Optional.Legacy: what is it and how do i remove it?

If AdwCleaner finds PUP.Optional.Legacy on the PC, there is no need to worry. This CHIP practical tip shows what the find means and how you can remove it. PUP.Optional.Legacy: false alarm in AdwCleaner If AdwCleaner or an anti-virus program shows you that PUP.Optional.Legacy has been found after a scan, do not be alarmed: you have not caught a virus...

Remove hi.fo - how it works

If hi.fo appears as the start page in your browser, you have caught adware, which you should remove immediately. It is not a virus, but you should remove hi.fo as soon as possible. We will help you and show you step by step how to do this. Remove hi.fo: uninstall from Windows The hi.fo website is a search engine with an additional news area...

Remove websearch.webisawesome - Here's how it works

Websearch.webisawesome.info is a browser hijacker that you should remove quickly. The program is not a virus, but it manipulates your browser settings and accesses dubious sites from your computer. In 3 steps you are rid of the pest. Remove Websearch.webisawesome.info - step 1 First of all, you need to remove the malware from your system...

Remove Redtube trojan - how it works

A Trojan was briefly distributed via Redtube. In this practical tip, we explain how to check your PC for the Trojan and how to remove it. Do I have the Redtube Trojan? If you visited the Redtube website in mid-January, infection is quite likely. If your anti-virus software raised the alarm during the visit, the trojan has probably not made it to your system...

Remove Hello New User "- so it'll work

If pop-ups with the words "Hello New User" appear again and again in your browser, you can easily remove them. We'll show you how it's done. Step 1: Uninstall Hello New User The Hellow New User adware primarily displays annoying pop-ups in the browser and probably also analyzes your surfing behavior...

Remove Albireo - Here's how

If you are repeatedly bothered by "Ads by Albireo" ads in your browser, you should remove the adware immediately. We'll show you how it's done. Step 1: Uninstall Albireo Albireo is a fairly harmless adware. This mainly ensures that pop-ups are displayed in your browser. However, further negative effects cannot be ruled out...

Remove Nice Searches - Here's how

If the start page in your browser has changed to "Nice Searches", you should remove the adware from your computer immediately. We'll show you how it's done. Step 1: Uninstall Nice Searches Nice Searches is comparatively harmless adware. The search engine nests in your browser and spies on your surfing behavior...

Remove Work.ru - so it'll work

If you find Work.ru in your browser or you receive advertising from the site, you should remove the adware immediately. We'll show you how it's done. Step 1: Uninstall Adware from Work.ru Work.ru is a virus, just adware that is still quite harmless. This mainly provides advertising in the form of annoying pop-ups...

Firefox: Website reported as attempting fraud - this is how you proceed

If the message "Website reported as attempting fraud" appears in Firefox, Firefox blocks the page on suspicion of malware or other malware. This guide shows you how to unlock the page and continue surfing. Firefox blocks page: "Website reported as attempted fraud" Note: Only carry out the following steps if you are familiar with the website and have visited it before...

Remove Inetstat - Here's how

You should remove the Inetstat adware from your computer so that it does no harm. The program is not a virus, but the malware can change your browser settings and redirect you to unsafe sites. Remove Inetstat from the computer Inetstat was probably downloaded and installed from the Internet along with another program...

Remove Suptab - Here's how

You should remove the Suptab adware from your computer as soon as possible. While it's not a virus, the malware does change your browser settings and go to dubious sites. Remove Suptab from the PC Suptab is adware that is usually installed with a program downloaded from the Internet. Open Control Panel and click "Programs and Features" or "Uninstall a Program" if you are using Category View...

Remove Chrome redirect virus - how to proceed

If you are directed to dubious websites with Google search results, Chrome redirect virus is often to blame. We'll show you how to get rid of the malware. Find and remove Chrome redirect virus Uninstalling programs: Open the list of installed programs in the Control Panel and sort them according to the installation date...

Remove V-Bates Shopper - Here's how

Once you have captured the V-Bates Shopper, you should remove the adware from your browser and system as soon as possible. We'll show you step by step how this works. Step 1: remove V-Bates Shopper from Windows The V-Bates shopper is relatively harmless adware. The software usually gets unnoticed by the installation of other free programs on your computer and nests in your browser...

Remove yellow adblocker - so it'll work

If you have caught the "Ads by Yellow Adblocker" adware, you can remove it in a few steps. It is not a virus, but the malware secretly changes the settings. We'll show you how to get rid of the unwanted guest. Step 1: Remove Yellow Adblocker from Windows The Yellow Adblocker is adware. The software is often installed on your computer unnoticed by other free software...

Remove addthis.com

If you discover the Addthis.com adware on your computer, you should remove it quickly. It is not a virus, but the adware brings unwanted advertisements to your computer. With our instructions, you can remove Addthis.com in a few minutes. Remove addthis.com The Addthis.com service promises to be secure and reputable, but installs an unwanted toolbar and changes numerous settings on your browser...

Remove CouponFactor - so it'll work

If you find CouponFactor adware in your browser, you should remove it immediately. It is not a virus, but the malware causes plenty of resentment among users. We'll show you how to completely delete CouponFactor from your system. Step 1: Remove CouponFactor from Windows CouponFactor adware is usually installed unnoticed by free programs...

Remove Vosteran Search - Here's how

Vosteran Search is a hijacker that changes the search settings of your browser. We'll show you how to remove the "virus". Strictly speaking, this is not a virus, but adware. But it can still take your nerve off. Uninstall Vosteran Search First you have to uninstall the Vosteran Search program: To do this, open the Control Panel and click on "Programs and Features" in the "Programs" category...

Remove Interpol virus - Here's how

Once captured, the PC is locked and a fine is requested. The Interpol virus is persistent, but can be removed - you can find out how in this practical tip. Information about the Interpol virus The Interpol virus is also called "BKA trojan" or "Ukash virus" and mainly gets to your PC via downloads and infected attachments to spam mails...

Remove MySearchDial

If you discover MySearchDial on your system, you should remove the program immediately, even if it is not a virus. We'll show you how it's done. Step 1: remove MySearchDial from Windows The so-called adware usually gets to your system via free or shareware and is installed unnoticed. Not only is your homepage changed: the search results are also manipulated...

Remove Atomic Savings - Here's how

If the Atomic Savings appears in your browser, you should remove it as soon as possible. Strictly speaking, it is not a virus, but the program can inject unwanted advertisements into your system. We'll show you how to remove the "virus". Step 1: remove Atomic Savings The adware is usually installed unintentionally via share and freeware...

Remove the sweet page

If you see Sweet Page in your browser as homepage, you should remove the adware immediately. The tool is not a virus, but changes settings in your browser. With our instructions you will get rid of the "virus" in a few minutes. Step 1: Uninstall Sweet Page as software Sweet Page usually gets onto your computer unintentionally via share or freeware...

Remove Rocket Find

If the start page of your browser on Rocket-Find.com has changed, you should remove the adware immediately. It is not a virus, but the adware unwantedly injects advertising into your system. We show you how to do it. Step 1: remove Rocket-Find Rocket-Find is adware that is usually installed unintentionally via other programs...

End-to-end encryption: what is it? Easily explained

In WhatsApp, end-to-end encryption is used to protect the data. We explain to you exactly what this is in this practical tip. End-to-end encryption - that's the reason Various types of encryption can be used to ensure the security of messages in chats. The messenger service WhatsApp uses the so-called end-to-end encryption...

New tab opens advertising - what to do?

If a new tab opens advertisements, you have probably caught adware and / or a virus. Fortunately, this admittedly annoying problem is easy to fix. New tab opens advertising: How to solve the problem The easiest way to fix this problem is with the free tool AdwCleaner. First of all you have to download the AdwCleaner program...

Remove Nationzoom - Here's how

You should remove "Nationzoom" from your computer immediately: the program is not a virus, but it slows down your browser and often redirects to websites infected with viruses. We show you how to proceed to delete the adware. Important: Please follow all of the steps below! This is the only way to get rid of "Nation Zoom" completely...

Remove AllCheapPrice - Here's how

If you discover AllCheapPrice in your browser, you should remove the adware immediately. It is not a virus, but the adware manipulates your computer. Step 1: remove AllCheapPrice from Windows AllCheapPrice is adware that usually gets to your PC unnoticed by installing other software. The adware is annoying with annoying pop-ups and advertisements...

Remove Ilivid - so it'll work

If "Ilivid" has nested in your system, you should remove the adware quickly. "Ilivid" disturbs you while surfing and the tool changes your browser settings. This tip shows you how to get rid of the adware and protect yourself in the future. Remove Ilivid from the system "Ilivid" often gets onto the computer by installing various software...

Remove Trovigo - Here's how

If the start page of your browser on Trovigo.com has changed, you should act as quickly as possible and remove the adware. We'll show you how it's done. Step 1: remove Trovigo virus Trovigo nests among other things as an add-on in your browser and changes numerous settings. The tool is not a virus, but adware...

Remove 22find

If "22find" has nested in your system, you should remove this adware quickly. We show you how you can remove the annoying program from your PC and protect yourself in the future. Step 1: remove 22find from the system 22find is not a virus, but an adware. You should still remove the annoying program: Since "22find" can get to your computer from infected websites as well as from installed programs, you should remove all recently installed software...

Remove Ads by Positive Finds - Here's how it works

Ads by Positive Finds is an adware that displays advertising banners, pop-up windows and hyperlinks in your browser. It is not a virus, but the tool is similarly persistent. It was probably installed together with another program that you downloaded from the Internet. We'll show you how to get rid of annoying ads...

Remove Omniboxes - so uninstall it completely

If you find the adware from Omniboxes in your browser, you should remove it immediately. It is not a virus, but the adware changes various settings on your computer. We help you get rid of omniboxes. Step 1: Remove Omniboxes from Windows Omniboxes often gets unnoticed by installing free and shareware on your computer...

Remove Safefinder - Here's how

Users often install the software "Safefinder.net" unintentionally with other programs. We explain how to remove the unwanted tool in this practical tip. Remove Safefinder via the control panel Safefinder is often referred to as a browser hijaker on the Internet. The program is usually downloaded with free downloads...

Remove white screen virus - how it works

If your computer has become infected with the White Screen Virus, you should remove the persistent pest immediately. We'll show you how. Remove White Screen Virus from Windows As soon as the malware becomes active, your screen will only show a white area with a message. Most of the time this comes from an alleged government organization that requests money to release the computer...

Remove v9.com - get rid of the toolbar

In this guide, we show you how to remove the v9.com toolbar from your PC. Remove Toolbar v9.com from Chrome To remove the v9.com toolbar from Chrome, open the settings using the menu icon at the top right. Click "Extensions" in the left margin. Next to "v9.com", select the trash can icon on the right to remove the toolbar...

Remove BingProtect - so it'll work

If you have caught the BingProtect adware, you should remove it immediately. Although it is not a virus, this adware annoys us with unnecessary advertising and makes surfing more difficult. Step 1: remove BingProtect from Windows BingProtect is adware that has nothing to do with the Bing search engine...

Remove Searchnu - Here's how

If your homepage on Searchnu.com has changed, you should remove the adware quickly. Our instructions show you this in individual steps. Step 1: remove Searchnu Searchnu is relatively harmless adware that usually gets onto your computer by installing other programs. Both the start page and the standard search engine are changed...

Remove Trojan.adh - Here's how it works

Trojan.adh is mostly spyware. However, many anti-virus programs cannot successfully remove the file. We show you how it works anyway. Remove Trojan.adh from Windows Malwarebytes Anti-Malware: This is an extremely reliable and comparatively fast virus scanner. Install the program and run it to check your entire system...

Remove DealPly - Here's how

DealPly is a toolbar that is often installed unintentionally with other programs. This practical tip shows you how to remove the toolbar. Uninstall DealPly The toolbar promises to help you shop online so you never miss an attractive deal again. DealPly advertises dubious offers and spies on you through the toolbar...

Remove Ubm.votercatterymegillah.com virus

If you discover the Ubm.votercatterymegillah.com virus in your browser, you should remove it immediately. We'll show you how it's done. Step 1: remove Ubm.votercatterymegillah.com virus This is actually harmless adware, which can still doom you. The adware nests in your browser and mainly provides constant pop-ups...

Recognize fake invoices by email: how it works

Fraudsters send thousands of fake invoices by email every day. In this practical tip, we show you certain criteria with which you can immediately recognize a fake invoice. Fake invoice by email: 5 criteria with which you can recognize fake invoices Attention: You can drag hidden viruses onto your PC when you download the invoice...

Gamma radiation simply explained: you have to know that

When it comes to radioactivity, the so-called gamma radiation often occurs. We explain this phenomenon to you in this practical tip. Gamma radiation - what is it? Gamma radiation is generated when atomic nuclei of radioactive nuclides decay. Like the alpha and beta radiation, the gamma radiation belongs to the ionizing radiation...

Change email password: This is how it works with all providers

If you want to change the password for your email access, this works in a different way depending on the provider. We will show you how to change the password for all well-known email providers. GMX, Hotmail & Co .: Change email password To change the password for your mail access, you must first log in to the website of the provider...

Remove RegClean Pro - Here's how

We will show you how to remove the "RegClean Pro" EXE file from your computer if you have accidentally installed the program. Step 1: remove RegClean Pro from Windows RegClean Pro is a registry cleaner. The program usually lands unnoticed on your computer via share or freeware. First you should remove the program using Control Panel...

Adware: what is it?

In this practical tip, we explain what adware is and how it affects your computer. How adware works: The word "adware" is a combination of the words "advertising" and "software". "Adware" is software that is used for advertising purposes. Adware usually reaches your computer via downloaded programs...

Remove Keyfind - Here's how

Keyfind is a browser hijacker that you should remove as soon as possible. While it's not a malicious virus, the malware changes your browser settings and redirects you to dubious sites. Our practical tip shows you how to get rid of the pest in three steps. Step 1: Uninstall Keyfind The browser hijacker was probably installed together with software that you downloaded free of charge from the Internet...

Remove Ourluckysites - Here's how

If the start page in your browser on Ourluckysites.com has changed, you should remove it quickly. It is not a virus, but annoying adware. We'll show you step by step how to get rid of Ourluckysites. Step 1: Remove Ourluckysites from Windows Ourluckysites are ordinary adware that usually gets installed on your computer by installing free programs...

Remove initialpage123 - Here's how

If the start page has been changed to Initialpage123 in your browser, you should remove it quickly. It is not a virus, but annoying adware. We show you step by step how to remove Initialpage123 in this practical tip. Step 1: Remove Initialpage123 from Windows Initialpage123 is not a virus, but rather harmless adware by comparison...

Skype sends Baidu link - what is it?

If Skype acts independently, sends links to the Baidu website via your account, or if you receive these links, you should act quickly. We'll show you what to do now. Baidu links via Skype: is this dangerous? If a Skype account sends links to the Baidu website, you should not open them. Baidu is a Chinese version of Google...

Remove Related Searches - Here's how

Related Searches is an annoying pop-up. We'll tell you how to remove it from your PC. Remove Related Searches manually or automatically - Here's how To automatically remove Related Searches from your PC, it is best to use an anti-malware program such as Malwarebytes or Spyware Terminator. You can also remove the adware manually...

Remove VideoSaver: How to get rid of it

"VideoSaver" is adware. Since this can pose a threat to your PC, you should remove it quickly. In this practical tip, we will show you how to do this. To do this, download the free AdwCleaner and run a full scan after starting. Wait for it to finish successfully. Then delete all finds. Finally, restart the PC for the changes to take effect...

Remove Shopperz: Instructions for Firefox, Chrome and Co.

The adware "Shopperz" is often installed with just one click during an installation. However, since it can be harmful, it is best to remove the adware immediately. This practical tip shows you how to proceed to get rid of Shopperz. Shopperz: Remove the adware First of all, you have to remove the adware from your PC so that it cannot do any further damage...

Remove LifeSaver: Complete guide

LifeSaver is not a virus, but adware or malware - but you should remove it quickly. In our practical tip, we will show you how to get rid of annoying ads from your browser. Remove LifeSaver from PC with tool First of all, you should start to remove the adware from your PC completely: The free tool AdwCleaner will help you with this...

Remove Reimage and Reimageplus - Here's how

This practical tip shows you how to remove Reimageplus or Reimage repair from your PC. How to remove the Reimage / Reimageplus adware Reimage is not a virus directly, but rather unwanted adware. To remove them, follow the steps below. Open the Control Panel and click on "Uninstall a program"...

Remove MindSpark: How to delete it completely from PC

MindSpark is not a virus, but annoying adware or malware. You should therefore remove them anyway. In this practical tip, we show you how to do this. AdwCleaner: Remove Mindspark First, start removing the adware from your PC: To do this, go to "Control Panel"> "Programs and Features" and search the list for the publisher "MindSpark Interactive Network"...

Delete Roll Around: How to remove it from PC

In this practical tip, we explain how to remove the adware roll around. Roll Around provides, among other things, unwanted website redirects and annoying pop-up ads. Delete toolbar "Roll Around Ads" First of all, remove all roll-around tools in the programs. Go to "Control Panel" and there via "Programs" to "Uninstall Programs"...

Remove La Superba: How to delete it completely

You can find out how to remove La Superba in this practical tip. La Sperba is an adware. We give you instructions on how to delete the malware completely. You can uninstall the program and also delete all the remains in your browser. Remove La Superba from Windows 7 On Windows 7, remove La Superba in the following ways: Go to "Control Panel" via Start...

Remove s.piesearch - Here's how

If the start page in your browser on s.piesearch.com has changed, you should remove the unwanted adware immediately. We'll show you how it's done. Step 1: Uninstall s.piesearch It is adware that often sneaks onto your computer unnoticed by installing other software. Not only is the home page changed in your browser, but other data is also manipulated and possibly spied on...

Remove Java-tips.net - Here's how

If the start page of your browser on Java-Tips.net has changed, you should remove the associated software as soon as possible. It is not a dangerous virus, but "only" annoying adware. Nevertheless, you should get rid of the pest. In our instructions we show you the procedure. Step 1: Remove Java-Tips...

Uninstall IQIYI - Here's how

If you have caught the IQIYI adware, you should uninstall the program as soon as possible. We will show you step by step how to get rid of IQIYI. Step 1: uninstall IQIYI and unwanted software Open the Control Panel and select the "Uninstall a program" option under the "Programs" category...

Remove Ads by UniSales - Here's how

If you find the "Ads by UniSales" adware in your browser, you should remove it immediately. Although this is not a virus, you should banish the malware from the PC. Ads by UniSales: Remove adware Ads by UniSales is a browser hijacker that usually gets onto your computer unnoticed when other software is installed...

Remove Raving Reyven - Here's how it works

This guide shows you how to remove the Adware Raving Reyven from your PC. Raving Reyven: How to remove the adware Raving Reyven not only displays unwanted advertising, but also changes the start page and the search engine of your browser. You should therefore remove the associated add-on first. In our instructions for Chrome, Firefox and Internet Explorer we show you how this works...

Remove Conduit Search

In this practical tip, we will show you how to remove the program and the associated toolbar from Search Conduit. Step 1: Remove Conduit Search from the computer The toolbar is often not deselected when installing freeware and thus gets onto your computer. While it's not harmful, the program can hold unexpected risks, even if you don't use it directly...

Remove Cridex Trojan

If you have discovered the Cridex Trojan on your computer, you should remove it as soon as possible. He steals passwords as well as login data from social networks and many online banking sites. Remove Cridex Trojan The malicious file is always titled according to the same pattern: KB12345678.exe, only the eight-digit number varies...

Beamrise: Remove malware completely

If Beamrise has landed on your system, you should remove the malware as soon as possible. We show you how to do it in the system and with the most common browsers. Step 1: Remove Beamrise from the system Beamrise is actually not a virus, but a so-called browser hijacker. This nests in Internet Explorer, Firefox and Chrome and changes your home page and standard search engine...

Remove PriceGong - Here's how

PriceGong is a toolbar that often gets onto your system unintentionally. In this practical tip, we explain how to remove it. Step 1: Uninstall PriceGong The toolbar is designed to show you the best deals when shopping online. Unfortunately, the truth is a little different: PriceGong saves your data and bombards you with numerous pop-ups of sometimes dubious offers...

Remove Whilokii - Here's how

Whilokii is not a real virus, but you should remove it from your computer. The small tool is usually installed unnoticed on your computer with another program. Although it does not do any direct damage, it makes your system unsafe because it can redirect you to contaminated websites. We show you how to delete Whilokii completely...

Remove Awesomehp - Here's how

"Awesomehp" is an annoying browser adware that manipulates software and PC settings. You should remove them quickly, even if it is not actually a dangerous virus. We show you how to do this. 1. Remove Awesomehp with AdwCleaner AdwCleaner is a free deletion software that searches your computer for adware and file remnants after a short installation...

Remove Yontoo Toolbar - Here's how

The Yontoo Toolbar is often installed unnoticed via share or freeware. We'll show you how to remove the toolbar. Uninstall Yontoo Toolbar The toolbar not only changes your search engine and homepage in the browser, but also switches its own advertising and unwantedly redirects you to dubious and potentially dangerous websites...

Remove IMinent Toolbar

The IMinent Toolbar usually reaches your computer via share or freeware. We'll show you how to remove the program. Uninstall IMinent Toolbar The toolbar is not dangerous per se, but in many cases it is installed unintentionally. In addition, the search engine in the browser is changed to the IMinent service during installation...

Encrypt WD My Cloud - Here's how

If you want to encrypt your WD My Cloud and your data on the server, only a few steps are necessary. This practical tip shows you exactly how to do this. Make WD My Cloud secure - that's how encryption works You do not need any special software to encrypt your WD My Cloud. Because your data is in good condition on the server and, above all, is safe...

Skype email: "Important - new Microsoft service contract" - spam?

Many users received an email from Skype in the early morning of June 10th, 2015. The subject: "Important - new Microsoft service contract". For many recipients, the message looks like spam. You can read whether the Skype emails are real in this practical tip. "Important - new Microsoft service contract" - this is what the right Skype email looks like Most German users received the mail in the early morning of June 10th, 2015...

Gmail: Optimize security - the best tips

You can make your Gmail mailbox more secure with various tricks. We will show you step by step how to optimize security on this page. Protect your Gmail mailbox in the best possible way After the hacking attack on Hillary Clinton's mailbox, Google has improved and set up more extensive security standards for its mail service Gmail...

Block the E-Plus SIM card - how it works

If you want to block your E-Plus SIM card, you can do so via the official E-Plus website. In this practical tip, we explain the individual steps in detail. Have the E-Plus SIM card blocked - Instructions To have the SIM card blocked, you must contact E-Plus by phone: First go to the official E-Plus contact page and scroll down to "E-Plus hotlines" with your mouse wheel...

Adobe Flash security patch - here is the update

In February 2014, Adobe patched a critical vulnerability in the Flash player with a security patch. This practical tip will tell you whether you are affected by the problem and how to solve it. Is my Flash version affected? The vulnerability affects only certain versions of Adobe Flash Player. You should therefore first check your version...

Sky: Crack pay TV channels - you should be aware of that

At Sky you experience entertainment at the push of a button, just the way you like it. If you want to crack the pay TV channel, you should pay attention to a few things. We have all the information in this practical tip for you. Sky: Crack pay TV channels - all information You can only receive Sky if you have subscribed to the Pay TV channel...

C: \ $ recycle.bin \ - is this a virus?

The folder $ recycle.bin looks strange in name. We explain what "C: \ $ recycle.bin" is and whether it is a virus. Is C: \ $ recycle.bin \ a virus? C: \ $ recycle.bin \ is not a virus - it is the trash. Since Windows Vista, each drive has its own trash folder called "$ recycle.bin"...

Remove Ads by Cloudscout - Here's how

Ads by Cloudscout is not a virus, but a browser hijacker, but you should remove the malware as soon as possible. You probably caught the hijacker when you downloaded and installed a program from the Internet. In our practical tip, we will show you how to get rid of the annoying adware. Step 1: remove Ads by Cloudscout from the system First, you should remove the browser hijacker from your computer: Start the Control Panel and click on "Programs and Features"...

Remove PrivDog - How to get rid of the adware

If you find the "PrivDog" adware on your computer or in your browser, you should remove the tool immediately. We show you how and why. PrivDog: Why should I remove the adware? PrivDog is actually adware that is completely harmless to your computer. The tool promises to make surfing the web safer...

Google Assistant: delete history and voice commands - how it works

If you use the Google Assistant, all voice commands are saved in a history. You can delete this at any time. We explain how this works in this practical tip. Clear history and voice commands from the Google Assistant If you use the Google Assistant via Google Home or your smartphone, all voice commands are recorded, transmitted to the Google servers, evaluated and saved...

Hacked iCloud - what to do?

Many iCloud users are affected by hacker attacks. If your account has also been hacked, you will find everything you need to do to protect your data here. iCloud: Change password Your password was spied on during the hack attack. You should change it immediately: Go to the apple.appleid.com website and click Manage My Apple ID...

Thunderbird: Check emails for viruses

With Thunderbird you can check your emails for viruses and take various security precautions. Thunderbird: Activate phishing protection and check emails for suspicious features The phishing protection integrated in Thunderbird checks all incoming e-mails for suspicious properties and warns you if necessary...

Deleting the micro SD card securely - how it works

Micro-SD cards often contain sensitive photos and data that you should better delete safely. Only then can you sell or pass on the SD card. We show you how to do it. Safely delete micro SD card: How to format the card With non-magnetic data carriers such as a micro SD card, secure deletion is not as expensive as with normal hard drives: In practice, it would be enough if you overwrite the data carrier with zeros once...

Torrent - what is it?

Hear or read about torrents, it rarely becomes clear without an explanation of what that is. We clarify it. What are torrents? Torrents are a specific type of file. Often torrents are very small files and just the download information for larger files. For example, if you download an illegal torrent for the movie "Titanic", this file is usually smaller than 1 MB...

Remove update-player.net - Here's how

If the start page of your browser has changed to update-player.net, you have caught adware, which you should remove quickly. In our step-by-step instructions and in the practical tips video, we show you how to do this. Remove Update-player.net from the system The adware probably made it into your system unnoticed when you installed a program...

Change Gmail password

In this practical tip, we explain how to change the password of your Gmail account. How to change your Gmail password In order to make it as difficult as possible for hackers and net crooks, you should regularly renew the password in your mail account. Google has set up a separate area for this: Click on this link and log in with your Google access data...

Android: Activate SSL encryption

For security reasons, you should also activate SSL encryption on Android when you check your emails. Most major email providers offer this encryption automatically. We will show you how to check the settings and change them if necessary. Enable email SSL encryption The procedure depends on which Android app you use on your smartphone for email traffic...

T-Online: Email is not working - what to do?

If your T-Online email service is not working, it may be that Telekom is currently converting to SSL encryption in this area. Therefore you have to take action. We'll show you what to do. Configure T-Online POP3 inbox correctly To receive your mails securely via SSL in the future, you only need to change a few addresses and ports...

How does Truecrypt work? Easily explained

When it comes to encryption, Truecrypt software is very popular. In this practical tip, we explain how the tool works and how you use it. Truecrypt - How does it actually work? With Truecrypt you have the possibility to encrypt important files and folders. You choose which file is to be encrypted. You can also encrypt entire drives and hard drives...

QNAP: encrypt data - how it works

If you want to encrypt your data on the QNAP-NAS, you must first create a new partition. This practical tip shows you exactly how to do this. QNAP: How to encrypt your data on the NAS On the NAS, go to "Control Panel"> "Storage Manager"> "Storage Space". Click on the "New Volume" button at the top right to set up a new hard drive...

Debian: Enable port in firewall - how it works

To enable a port in the firewall in Linux Debian, only a few clicks are required. We'll tell you exactly how this works in this practical tip. Release port in Debian firewall - so it'll work First open the console as an administrator in Debian Linux. To enable ports in the firewall, use the "iptables -A" command...

Turn off Bitdefender - how it works

If you want to turn off Bitdefender virus protection, you should only do so for a short time. Your computer is unprotected during this period. Bitdefender: turn off virus protection Note: The following instructions refer to Bitdefender Total Security 2015. The functions may be arranged differently under other versions of Bitdefender...

Kaspersky: "Recovery after infection" - what does that mean?

In Kaspersky virus protection you will find the "Recovery after infection" function. In this practical tip, we will tell you what exactly is behind it. Kaspersky: "Recovery after infection" - that is behind it This wizard will help you clean up your system after a virus infection...

Eset: Win32 / DownloadSponsor.C - so you react correctly

Eset's warning "Win32 / DownloadSponsor.C was blocked" appears during software installations as soon as Eset classifies the tool as virus or unwanted program. However, the warning is a false alarm. Eset reports "Win32 / DownloadSponsor.C" - this is behind the false alarm Eset tries to protect you as best as possible and has tightened its filters for potentially unwanted programs...

HEUR: Trojan message - this is how you proceed

If you receive a message from your anti-virus software with the terms "HEUR" and "Trojan", that sounds very threatening. But you still don't know what's behind it. We'll tell you on this page. Trojan horse: Virus report with "HEUR" - what is it? The abbreviation "HEUR" stands for heuristic...

Google security tip: that's behind the 2-minute security check

When searching in the browser, the Google security tip often opens with a short check. In this practical tip, we will tell you what exactly is behind it. Google security tip: that's behind the security check If you get the Google Security Check when you search, there's no need to worry. After you have logged in with your Google password, your account will be checked for security...

Remove MapsGalaxy - Here's how

If you have captured the MapsGalaxy toolbar, you should remove it immediately. Our instructions show you the individual steps. Remove MapsGalaxy from Windows and browser MapsGalaxy is a relatively harmless toolbar with senseless tools. This is usually installed unnoticed when other software is installed...

Remove Search Protect by Conduit permanently - here's how

In this practical tip, we will show you how to permanently remove Search Protect by Conduit from your system. Step 1: Uninstall Search Protect by Conduit Search Conduit is a program that integrates a toolbar into your browser. The exact dimensions and risks cannot be foreseen, but criminal intentions can be assumed...

Remove muvic toolbar - how it works

If the Muvic toolbar has sneaked into your browser, you should remove it immediately. We show you how to do this. Remove Muvic Toolbar from Windows The Muvic toolbar is completely harmless, but it bothers you when you surf and has no advantages. In most cases, it is installed with other free software...

Remove Jollywallet - Here's how

"Jollywallet" is actually not a dangerous virus, but adware that you should remove quickly. Instructions for this can be found in this article. 1. Remove the adware Jollywallet from the system You should first remove "Jollywallet" from your Windows system: Open the Windows Control Panel using the Windows button...

Remove Cinema-Plus - Here's how

If you find the adware Cinema-Plus on your computer, you should remove it immediately. Our instructions show you the individual steps. Uninstall Cinema-Plus: Open the Control Panel and sort the list of installed programs by the installation date. Look for the entry "Cinem-Plus" and any other unknown additions and remove them...

Remove PortaldoSites.com

If the internet search is redirected via "PortaldoSites.com", your PC has been infected by a browser hijacker. Remove the adware from your browser in order to be able to use the usual homepage or search engine again. To do this, first delete the add-on from Google Chrome, Internet Explorer or Firefox and then free your computer from the virus residues...

KeePass: A tutorial for the password manager

The password manager KeePass helps you to securely collect and manage all your passwords. In this tutorial we will introduce you to the program and show you how KeePass works. Tutorial step 1: Install KeePass in German KeePass is available in versions 1.X and 2.X. Both programs are always supplied with updates, but KeePass 1 is somewhat poorer in functions compared to KeePass 2...

Check apps for viruses - how it works

This practical tip shows you how to check your Android apps for viruses. Prevent installation of malicious apps There are some free apps that take care that no malicious software gets on your smartphone. Install eg Avast Mobile Security & Antivirus. The software checks newly installed apps for malware when they are started for the first time...

Samsung Galaxy S6: set up fingerprint - how it works

Setting up the fingerprint is a little different on the Samsung Galaxy S6 than on the previous smartphone. Fortunately, it's not complicated, you just have to bring some time. Set up fingerprint on the Galaxy S6 First open the "Settings" and select the "Security" option. Then tap "Fingerprint scanner" and then "Add Fingerprint"...

Snow3rd jailbreak - is that a fake?

The Snow3rd Jailbreak is finally supposed to jailbreak the Apple TV 3. We will tell you whether this is a fake or whether the jailbreak actually works. Snow3rd Jailbreak for Apple TV 3 - is it safe? The Snow3rd jailbreak has already been tested by reputable websites, but it was also not possible to determine whether it was malware or not...

Vulkaninfo 32: What is it?

Veiel users wonder what is behind the "Vulkaninfo 32" file. This practical tip tells you what you need the file for. Vulkaninfo 32 - that is behind it The file "Vulkaninfo 32" is a driver of your Nvidia graphics card. Vulkan is a programming interface that, among other things, should reduce the CPU load and improve overall performance in complex games...

How Safe Is Tor Really?

In this article, we asked you how secure Tor really is. Tor (acronym for The Onion Routing) is a project that promises its users anonymous surfing and protection from traffic analysis. However, cases have recently become known in which "anonymous" users of the network have been investigated and arrested by investigative authorities...

Protect Linux from viruses and malware - how it works

In this practical tip, you will learn how to protect your Linux operating system from viruses and malware. How to protect your Linux system from viruses and malware Anyone familiar with Windows anti-virus programs and firewalls will be happy to switch to Linux. Almost all viruses are designed for Windows because the majority of users use this system...

How secure is Apple Pay?

With the launch of the new payment service Apple Pay in the USA, the question arises how secure this service is at all. We will show you how Apple Pay works and whether the payment service is really secure. This is how the Apple Pay payment service works Apple Pay is a new payment service from Apple, with which you should be able to pay quickly and easily...

Paying with ClickandBuy - is it safe?

ClickandBuy is an online payment system for online shopping. In this practical tip, we clarify how secure ClickandBuy is. Update: Telekom closes ClickandBuy Telekom closed its ClickandBuy online payment service at the end of April 2016. Customers have to switch to alternatives such as PayPal. As a ClickandBuy user, you have no longer been able to access any credit since April 30...

Block EC card - how it works

If you have lost your EC card, you should have it blocked immediately. We'll show you how it's done. Have the EC card blocked You can call the free blocking emergency number 116 116. If you call from abroad, you need the German area code, i.e. +49 116 116. Then charges may apply. The blocked emergency call represents pretty much every German bank...

Block your credit card - how it works

If you lose your credit card, every second counts. We'll show you how to block your card to prevent abuse. Have your credit card blocked You can call the free blocked emergency number on 116 116. If you have lost your credit card abroad, you need the German area code, +49 116 116. Roaming charges may apply...

Remove Clearthink - Here's how

In this practical tip, we will show you how to remove the Clearthink program from your PC. The software is not a virus, but is often referred to as adware on the Internet. You may have accidentally installed it with free software. Remove Clearthink using Control Panel First open the Control Panel and switch to the "Programs and Features" setting...

Remove SaferWeb - Here's how it works

If you have caught SaferWeb, you should remove the adware immediately. We'll show you how to do it. Remove Adware SaferWeb SaferWeb is not a dangerous virus, but adware. This nests in your browser and changes some settings. Therefore, you should still get rid of them quickly: Uninstall a program: Open the Control Panel and sort the list of installed programs by the installation date...

Remove SpeedItUp Free - Here's how

Discover SpeedItUp Free in your browser, you should act as soon as possible. We'll show you how to remove the adware. Step 1: remove SpeedItUp Free SpeedItUp Free is not a virus in the strict sense, but adware. Among other things, it provides pop-ups and redirects you to dangerous websites, which is why you should still remove them quickly: Uninstall SpeedItUp: First open the Control Panel and sort the list of installed programs by the installation date...

Remove Lasaoren - Here's how

If your homepage on Lasaoren.com has changed, you have caught adware that you should quickly remove. We'll show you exactly what you need to do. Step 1: remove Lasaoren Lasaoren is adware that usually gets onto your computer by installing other software. You are primarily offered a search engine, but a dubious browser extension is also installed...

Remove Special Offers "- Here's how

If you discover special offers in your browser, you should remove the adware immediately. We show you the exact procedure in our step-by-step instructions and in the practical tip video. Step 1: remove special offers Special offers are not directly a virus, but adware that has nested in your browser...

Remove Savingsbull - Here's how

If the adware Savingsbull has nested in your browser, you should remove it as soon as possible - even if it is not a dangerous virus in the strict sense. We'll show you how it's done. Step 1: remove Savingsbull The adware Savingsbull usually reaches your computer via share and freeware and then settles in the browser...

Download and read the Google search log

To find out what Google knows about you, you can download the History search history from Google. With the help of the Google search log you will not find out everything that Google has saved about you, but at least you will get an overview of your saved search queries. Download the Google search history It is relatively easy to get the history search protocol...

Energy-saving lamps emit electrosmog - is that dangerous?

Energy-saving lamps are repeatedly criticized for electrosmog. Headaches and sleep disorders are often the result of electrosmog. We explain how dangerous electrosmog really is. Energy-saving lamps and electrosmog: the possible consequences The main problem with electrosmog was the introduction of energy-saving lamps...

Facebook: detect virus - how it works

Viruses are repeatedly distributed via Facebook. In this practical tip, we explain how you can recognize a virus there. Facebook viruses: news and links From strangers: If you receive a message from a stranger with a link or a file as an attachment, you can assume that it is a virus. Just delete the message...

Facebook: Hide & turn off Ray-Ban spam - Here's how

In this practical tip, we will show you how to hide and turn off Ray-Ban spam on Facebook. Hide and turn off Ray Ban spam on Facebook Be careful with fake offers on Facebook - the images of allegedly reduced Ray-Ban sunglasses usually hide scammers. If someone has been marked on such a picture in your friend list and you do not want to see it in your news, you can hide it...

Facebook: The worst security mistakes - and how criminals use them

Facebook is a good place to go for cybercriminals. Numerous Facebook users subconsciously commit security errors and thus offer a large target. In this practical tip, we show you the worst security errors and explain how you can avoid them. Facebook: security bugs and cybercrime Facebook has now established itself as a "big data pool" for online and offline criminals, as many users recklessly publish private information on Facebook...

Aldi Talk: have your SIM card blocked - how it works

This practical tip shows how you can block your Aldi Talk SIM card. If you have lost your smartphone or it has been stolen, you should do so immediately. Aldi Talk: How to lock your SIM card in the event of theft or loss The blocking can be initiated by calling the Aldi Talk service. There you only need the PUK 1 number that was sent to you with the SIM card...

Remove Palikan - Here's how

If you have caught the Palikan adware, you should remove it directly from your computer. It is not a virus, but Palikan makes many changes to your PC. Remove Palikan software from Windows Palikan is typical adware. The software wants to help you surf the Internet, but you usually have not installed the tool yourself...

Remove trojan.agent - how it works

If you have caught the "trojan.agent" malware, you should remove it immediately. We'll show you how it's done. Practical tip video: Remove malware and adware Remove malware: trojan.agent Download and install the free Malwarebytes Anti-Malware software. Run a virus scan and remove any finds...

JDownloader - is this legal?

Movies, files, music - with jDownloader you can download a wide range of content from the Internet. In this article, we will tell you whether this is legal. Downloads via jDownloader: legal or illegal? JDownloader is primarily designed for downloading larger files from one-click hosters. With the appropriate plug-ins, you can even expand the range of functions...

Terminate contract online: You have to be aware of this

If you want to cancel an online contract, there are a few things you should consider. We will tell you how you can end contracts concluded on the Internet. Click here for the website of the lawyer Christian Solmecke. Online contracts can now be canceled online Contracts concluded online from October 1, 2016 can also be terminated online, according to the law...

Sparkassen-App: Send money with Kwitt

With Kwitt, the savings banks have developed a way of simply sending or receiving money. Similar to PayPal, you can send money to everyone. In this practical tip, we will show you step by step how this works. This is how the new Sparkasse service Kwitt works Sending money via app is no longer a problem...

Hack WPA2-WLAN - is that possible?

WPA2 is currently touted as the most secure WiFi standard on the market. This practical tip tells you whether a WPA2 WLAN can be hacked. Hack WPA2-WLAN - as you should know Again and again one hears that WLAN networks are hacked. But how do the hackers do this and what can you do about it? A common method is to hack a WLAN network via a fake access point ("FakeAP")...

Awd-Cleaner: Remove adware

The popular "AdwCleaner" is often incorrectly associated with the acronym "awd". The free tool owes its name to the reliable cleanup of adware. You can download the freeware from chip.de. Awd-Cleaner is actually called AdwCleaner With AdwCleaner you can safely remove adware, toolbars, browser hijackers and other unwanted spyware...

Temper Temper Receive warning - what to do?

The law firm Waldorf Frommer sends warnings again. This time it's about the music album "Temper Temper" by the band "Bullet For My Valentine". If you have also received a warning, we will show you here how you can react to it. Temper Temper warning: Everything is just hot air When it comes to warning waves, the law firm Waldorf Frommer is often involved...

Remove Stamplive.com - Here's how

If you have caught the Stamplive.com pest on your system, you should remove it as soon as possible. You can read how to do this in this practical tip. What is Stamplive.com? Stamplive.com is a so-called browser hijacker that nestles in your web browser and imports advertising. Not only is this annoying, but in the worst case it can also endanger the security of your system...

Windows Live: Change password - how it works

If you forgot the password for your Windows Live ID or your account was hacked, you can simply change the password. We'll show you how it's done. Windows Live: Change password for security reasons These instructions assume that you can still register. If you forgot your password or your account was hacked, read on in the second paragraph...

Hack cell phone: How to protect yourself from attacks

Criminals can hack not only your computer, but also your cell phone. We show you how to protect your smartphone from hacker attacks. iOS or Android: which is safer against hacks? If you have an iPhone, iPad, or iPod touch, you don't have to worry much about hackers. The system is built very closed, so a hack is currently not realistic...

Make WLAN secure: This is how you can secure your network

Many hackers have specialized in attacking WLAN networks. In this practical tip, we will show you how to make your WLAN secure using simple means. Make WiFi secure: Use secure encryption and a strong password The first step to secure WiFi is to choose secure encryption and a strong password for your network: To do this, log in to the configuration page of your router...

Virus scanner for Windows Phone - is that really necessary?

Windows computers and Android smartphones always need a virus scanner. A smartphone with Windows Phone, however, is well protected. We'll tell you why you don't need an anti-virus app and how you can protect yourself from potential dangers. Windows Phone: Do you need a virus scanner? Apps run in a kind of sandbox on the Windows Phone...

Kaspersky: Add a trusted website

You can enter trustworthy websites under Kaspersky. These are then not checked for viruses and malware. We will show you how to do this here. Kaspersky: Create a list of trusted sites - how to do it Open the settings in Kaspersky and then go to the "Protection" tab. Select "Web Anti-Virus" on the left and then click on "Settings" in the "Security level" area...

Remove Websteroid adware - Here's how

Websteroid is not a virus, but an unwanted browser extension. This practical tip shows you how to remove the adware. Step 1: remove Websteroid adware from PC Call the "system control" of your PC. In Windows 7, click on the blue Windows icon at the bottom left and enter "Control Panel" in the search field...

WLAN abroad: This is how it's free on the Internet

If you also want to use WiFi abroad to surf the Internet, you have several options. In this practical tip, we will show you how you can surf on vacation as free as possible. WLAN abroad - these are the options Hotel: Most hotels abroad now have free WiFi. Contact the reception desk for all information...

Telecom letter "security warning" - what's behind it?

Many Telekom customers receive a letter with a security warning. Security warnings via email are also not uncommon. In this way, Telekom is trying to warn victims of cyber crime at an early stage. We will explain what this Telekom Post is all about and what to do if you are affected. What does the security warning letter from Telekom mean...

Avira Searchfree Toolbar - what is it needed for?

With the Avira Searchfree Toolbar you can extend the free Avira AntiVirus with the Webguard, which is actually only available in the paid version. This practical tip will tell you what the service can do and whether it makes sense for you. What is the Avira Searchfree Toolbar? The Avira Searchfree Toolbar is an add-on for Internet Explorer and Firefox browsers...

Box: Activate two-factor authentication

This guide shows you how to activate two-factor authentication for the Cloud Service Box. Activate two-factor authentication at Box To activate two-factor authentication at Box, log in to "Box.com" with your user data. Click the Settings icon at the top right and choose "Account Settings"...

Team Viewer: Activate two-factor authentication

With this practical tip, you can activate two-factor authentication for the Team Viewer and benefit from increased security of your account. How to enable two-factor authentication in the Team Viewer Follow the steps below to enable two-factor authentication in the Team Viewer: First log in with your Team Viewer account...

WordPress: Activate two-factor authentication

With WordPress, you can activate two-factor authentication using a plugin. With this practical tip, we will show you how it works. How to enable two-factor authentication on WordPress Follow the steps below to take advantage of WordPress's two-factor authentication and make your website more secure...

Google Drive: Enable two-factor authentication

You should think about two-factor authentication if you use Google Drive intensively and store sensitive data in your cloud. With this form of encryption you secure your data better. An additional level of security for Google Drive Important: Before you start activating the two-factor authentication, you should consider the telephone number on which you would later like to receive the additional security code...

You should therefore not charge your smartphone in the café

Almost every smartphone is plugged in every day, also in the café and other public places. In this practical tip, we will tell you why charging is problematic here. Charging your mobile phone in public places: is there a danger? Only electricity flows through a socket, and data can also flow through USB connections....

House surveillance via doorbell: Ring streams directly to the cell phone

The doorbell ring enables smart home surveillance because it streams the images directly to the cell phone. This way, when you ring the bell, you know at a glance who is at the door and whether you should open it. Door bell with camera and live stream: Ring monitors the house At the Mobile World Congress (MWC), the doorbell ring was presented, which is equipped with all kinds of monitoring technology...

Virus on PS4 - is there?

If you use your PS4 to surf the Internet, it is unlikely that you will infect it with a virus. This practical tip will tell you whether you can still catch a virus on the PS4. Virus on PS4 - is there? Sony's Playstation 4 connects to the Internet, for example to download updates or use the browser...

Apply online banking - how it works

Thanks to online banking, you always have your finances in view. In this practical tip, we will tell you how to apply for this at your bank. Apply for online banking - this is how you proceed Switch to the website of your bank or savings bank where you are already a customer. Search for "online banking" on the website...

House emergency call from the German Red Cross: costs at a glance

Many old or sick people rely on help around the clock. The house emergency call from the German Red Cross relieves relatives and gives those affected a secure feeling. You have to expect these costs for the service. The basic rate of the German Red Cross: costs for the house emergency call The basic tariff for home emergency calls includes certain services that can be supplemented by additional offers...

Windows Warning: Infection ID: 13496587525 - what is it?

If you get a Windows warning with infection ID 13496587525 on your computer, you shouldn't act too hastily. The message is a fictitious error message with a criminal background. In this practical tip, we will show you what it is all about and how you can react best. Windows warning with infection ID 13496587525 - what is it...

Change user password in Linux - how it works

You can find out how to change your user password in Linux in the following practical tip. How to change password in Linux As an alternative to the conventional variant via System Settings> User> Password, you can change your password using the console. Open a new terminal with [Ctrl] + [Alt] + [T] or with the search bar and "Terminal"...

Remove Mega Browse - Here's how it works

If Mega Browse has settled on your computer, you should remove the adware as soon as possible. We'll show you how. Step 1: remove Mega Browse Mega Browse is adware that not only changes search results in your browser, but also causes unwanted pop-ups and website redirects. Uninstall programs: First remove all unwanted programs using the Control Panel...

Remove Findright - Here's how

If you find Findright in your browser, you should remove the malware from your system immediately. We'll show you how it's done. Step 1: remove Findright virus Findright is adware that nests in your browser. Advertisements, pop-up windows and unwanted website redirects are typical. Uninstall: First of all you should try to uninstall the program using the Control Panel...

Remove DVDVideoSoft Toolbar

Once the DVDVideoSoft Toolbar has been integrated into your browser, you can remove it again without any major detours. We'll show you how it's done. Is the DVDVideoSoft Toolbar harmful? The DVDVideoSoft Toolbar is accidentally installed when installing Free Studio from DVDVideoSoft or a single program such as the YouTube downloader...

Mail: Security request from the German banking community - you should do that now

If you have received a security request from the Deutsche Bankengemeinschaft by email, you should simply ignore this message. You can find out more about this in this article. Phishing mail: Security request from the German banking community The email informs you that you may be affected by serious security gaps in online banking and that you need to have your security status checked...

Electrosmog shielding: the best methods for at home

If you want to carry out electrosmog shielding at home, there are various techniques and options available to you. In this practical tip we will tell you what you can do about the radiation. Electrosmog - what is it actually? Electrosmog can be harmful to health and accompanies us in everyday life. But what exactly is that...

Typo3: Change password - how it works

If you have forgotten your password or you are too unsure, you can change the password for the login to Typo3 at any time. In this practical tip, we will show you how to do it. Change password at Typo3 - how it works Note: If you have forgotten your password, follow this practical tip. In this guide, we show you how to change the password when you are logged in...

Remove Solution Real: How to delete it from the computer

In this practical tip, we explain how to remove Solution Real from your computer. The malware sneaks onto your PC as a free application and causes unwanted advertisements in your browser. Remove Solution Real using Control Panel First of all, you should remove the Solution Real tool: Go to "Control Panel" and there under "Programs" to "Uninstall a program"...

Nuclear accident: what to do in an emergency?

In the event of a nuclear accident, you need to know exactly what to do. Because you can neither see nor taste the danger from radioactive radiation. Here you can find out what scientists and the authorities advise in an emergency. What to do in the event of a nuclear accident? This is how you react correctly As soon as you have heard of a nuclear accident with leaked radioactive radiation, go immediately to the nearest building...

Remove Browser Safeguard

The AVG Safeguard virus is also installed via freeware programs. We'll show you how to remove it from your browser. 1. Remove Safeguard Toolbar via Control Panel Toolbars are often installed unnoticed by freeware programs. The persistent browser malware not only advertise itself, but also redirect you to potentially dangerous sites...

Change AOL password

To increase the security of your AOL account, you should change your password regularly. We show you how it works. How to change your password at AOL First log in to AOL-Mail with your access data. Navigate to "Options" in the top right. In the drop-down menu, click "Account information"...

Remove Ads by Keep Now - Here's how

You should remove "Ads by Keep Now" quickly because this browser virus manipulates your search results and bombards you with advertisements. Here we show you how to delete the annoying malware from your computer. 1. Remove Keep Now from the system You should first remove the malware from your Windows system: Open the control panel and look for the menu item "Uninstall a program"...

Remove Bizzybolt - Here's how

You should quickly remove the "Bizzybolt" browser virus: the adware not only manipulates your search results, but also displays annoying advertisements. Instructions for this can be found in this article. 1. Remove adware "Bizzybolt" from the system First of all, you should remove the browser virus from your system: In the Control Panel ("Windows Button"> "Control Panel") open the menu item "Uninstall Programs"...

Remove bed surf - how it works

You should quickly remove the "Bettersurf" virus from your system. You can find out how to do this and what you need for this in this practical tip 1. Remove the software from Windows 8 In order to prevent your browser from being infected, you should first delete "Bettersurf" from your system: Open the Windows 8 Control Panel and click on "Uninstall a program"...

Curl.exe - what is it? Easily explained

In this practical tip, we will tell you what is behind the Curl.exe file on your PC. Curl.exe - what is it? The abbreviation "exe" stands for "executable file". This means "executable file". Curl.exe is not a Windows system file. However, some programs, such as Tivo Desktop, require this and install the file if necessary...

Change Hotmail password

In this practical tip, we will show you how to change your Hotmail password. Hotmail requires a special security level If you use Windows 8, your "Hotmail" address is usually identical to your Windows account and you only use one password. Since you can link your Windows account with other apps, such as "Skype", this password should be particularly secure...

Remove lpcloudsvr302.com

"ipcloudsvr302.com" is an annoying browser virus that you should remove as soon as possible. In this practical tip, we will show you how to do this. 1. Delete "lpcloudsvr302.com" under "Programs" First, you should remove the adware from your system: Call up the Control Panel via the Windows button and click on the menu item "Uninstall Programs"...

Remove FBI Moneypak virus - Here's how

The FBI Moneypak virus is one of the particularly malicious variants of ransomware. Virus removal is not easy. We'll show you what you can do if your PC is infected with the ransomware. Remove FBI Moneypak virus using Bitdefender To remove the FBI Moneypak virus using a virus scanner like Bitdefender, you need to run the program in safe mode: Download Bitdefender on another computer and copy the program to a USB stick or burn it to a CD...

Remove Ads by CouponDropDown - Here's how it works

In this practical tip, we will show you how to remove the annoying pop-ups from "Ads by Coupondropdown". Remove coupon dropdown from Google Chrome Click on the options at the top right and move the mouse over the item "Tools". In the menu that opens, click on "Extensions"...

FinFisher FinSpy: How to remove the Trojan

In this guide, we explain how to remove the FinFisher-FinSpy Trojan from your PC. Remove FinFisher FinSpy FinFisher FinSpy is a professional espionage software that is used by various countries worldwide to fight crime. The following steps are for experienced users. To check whether FinFisher FinSpy has sneaked into your computer, you need the free Detect tool...

Remove Gh0st RAT - Here's how

In this guide, we will show you how to remove the Gh0st RAT Trojan from your PC. Instructions: Remove Gh0st RAT from the PC Little is known about Rat Gh0st and its various types. First of all: If Detekt finds this Trojan on your PC, first of all look in the Detekt log file. It is often a false alarm...

Ubuntu: Install Avast - so it'll work

With Avast, you can also protect yourself on Ubuntu. We'll show you how to install the anti-virus software. Step 1: install Avast on Ubuntu Note: Avast has not been developed for Ubuntu since mid-2014. However, the program can currently still be installed and supplied with updates for virus detection...

Remove websearch.searc-hall.info - Here's how

If you find the websearch.searc-hall.info search engine in your browser, you can remove it yourself. We show you how this works in this guide. Step 1: remove websearch.searc-hall.info If your homepage changes to websearch.searc-hall.info, you have caught relatively harmless adware. Known consequences include changing the homepage, search engine and search results...

Disable router firewall - how it works

You can deactivate the router firewall if, for example, a console cannot connect to the Internet. However, you should be aware that deactivation poses a security risk for all PCs connected to the router. Disable router firewall Call up the router menu in any browser. To do this, enter the IP address of your router in the address bar and confirm with [Enter]...

Smartphone on the beach - the best hiding places

Many don't want to do without a smartphone on the beach either. This practical tip shows you how to protect yourself against theft and how to hide your cell phone properly. 1. Hide your smartphone in the sand on the beach Simply leaving your smartphone in your pocket is dangerous and almost an invitation for thieves...

PayPal: cancel debit - is that possible?

In this practical tip, we clarify whether and under what circumstances you can cancel a PayPal debit and show you exactly what you have to do for it. Under what circumstances can a PayPal debit be revoked? Basically, you can only cancel the debit if there is a dispute. This is the case, for example, if you do not receive an item purchased on eBay, it is faulty or is a deception and the seller does not respond to your emails...

Avast: Disable automatic updates

You can deactivate this function so that Avast does not automatically install updates in the background. Our instructions will help you with this. Avast: Disable automatic updates You should only deactivate the updates if you regularly carry them out manually. Thousands of new viruses are spread every day, from which you are only protected with the latest updates...

Remove Web.fun-prize.com virus

If the homepage on web.fun-prize.com has changed in the browser, you should remove the virus as soon as possible. We'll show you how it's done. Remove Web.fun-prize.com virus This is adware that nests in your browser. Among other things, it causes annoying pop-ups and changes to browser settings...

Remove AnyDVD from the PC - Here's how

The use of AnyDVD is illegal according to the current legal situation. If the test phase has expired, you should remove the software. How to remove AnyDVD completely from your PC Open the Control Panel and select the "Uninstall a program" option under the "Programs" category. You will now see a list of all installed programs...

BestUsefulDownloads.com Virus Removal

If your homepage on BestUsefulDownloads.com has changed, you have caught a virus that you should quickly remove. Remove BestUsefulDownloads.com virus It is an adware that mainly settles in your browser. Among other things, it can lead to pop-ups, website redirects and changes in settings. Uninstalling programs: Most of the time, the adware is installed unintentionally via other programs...

Create Fake Virus - Instructions and Downloads

For example, to shock a friend or colleague, you can cheer him on a fake virus. You can either download such a fun program or create it yourself with little programming knowledge. We have put together everything you need to do this in this practical tip. Create fake virus with batch You can easily program a simple fake virus yourself with Batch...

Windows Firewall cannot be activated - this may be the reason

To protect your PC, you should activate the Windows firewall. However, if this cannot be activated, you should act quickly. You can find out why in this practical tip here. Windows Firewall cannot be activated - so you can fix the error If the activation of the Windows Firewall does not work, there can be many reasons: Make sure you are logged in as an administrator before trying to start the Windows Firewall...

Remove eDellRoot - Here's how

Dell warns all users of Dell computers about an installed certificate called eDellRoot. You can find out how to remove the vulnerability in our practical tip. Automatically remove eDellRoot with this Dell tool Dell has released a tool for its customers that can be used to remove the potentially harmful eDellRoot certificate...

Foggy car windows: the best tricks

Especially in the cold seasons, the moisture in the car rises quickly - fogged up car windows are the result. In this article, we will show you how to do this. Foggy car windows: remove moisture quickly There are a few helpful tricks to help you get a clear view again quickly. If you have to wipe the misted up window, it is best to use a suitable cleaning sponge...

This page cannot be displayed - what to do?

There are many reasons for the message "This page cannot be displayed". We have summarized for you how this message is generated and when you can do something about it in this practical tip. "This page cannot be displayed" - possible causes There are several reasons why a page cannot be displayed: There is a problem with the server the website is on...

Remove PrivitizeVPN virus

If you have caught the PrivitizeVPN virus, you should remove it as soon as possible. We'll show you how it's done. Remove PrivitizeVPN virus The PrivitizeVPN virus is often installed undesirably via share or freeware. Among other things, the virus nests in your browser. Junkware Removal Tool: First download this free program and start the EXE file...

Remove Virus Adlock.exe - Here's how

If your anti-virus program reports the Adlock.exe virus, but cannot remove it, you must take action yourself. We show you how to do it. Remove Adlock.exe virus It is not yet clear what the Adlock.exe file is, but several anti-virus programs list the file as a virus. First try: Download the free Malwarebytes Anti-Malware program from us and run it...

Remove Zeus / Zbot trojans

If your computer is infected with the Zeus Trojan, you should act quickly and remove the malware. We give you the associated step-by-step instructions. Remove Zeus / Zbot trojans The Zeus / Zbot trojan is a very adaptable malware that spies on private data such as account numbers and passwords and can also do almost anything with your computer...

Paypal: Attention Your account has been blocked - what to do?

If you receive an email from PayPal with the subject "Attention, your account has been blocked", you should under no circumstances react to it. In this practical tip, we will show you what mail is all about. Warning Your account has been blocked - spam mail on behalf of PayPal The said mail is a spam mail...

Remove SwagBucks Virus

If the SwagBucks virus spreads on your computer, you should remove it immediately. We'll show you how it's done. Step 1: remove SwagBucks virus The SwagBucks Virus not only changes the start page of your browser and its search engine, but also causes unwanted redirects and annoying pop-ups. Download the free Junkware Removal Tool from us...

Dell: Forgot / reset master password - how it works

For used Dell notebooks, buyers have to enter a master password after a while. But what is that? We'll show you how to reset the password if you forget it or the previous owner can't tell you. Dell Master Password: What Is It? The master password is used to protect Dell notebooks from unlawful owners...

Freenet: Change email password - how it works

If you regularly change the password of your email account at Freenet, you can increase the security of your account. We show you how to do this. Change password at Freenet First log into your Freenet webmail account here. Then click on "Settings" in the top right corner. You can select "Password" in the "Personal data" tab...

Alpha radiation & beta radiation simply explained: You need to know that

When it comes to radioactivity, the terms alpha radiation and beta radiation often appear. You can find out exactly what this is in this practical tip. Alpha radiation - what is it? Alpha radiation is a relatively harmless radiation that occurs when alpha decays. In alpha decay, two protons and two neutrons are rejected by the nucleus...

BSI security test positive - what to do?

If the BSI security test is positive for you, there are some basic security tips in addition to immediate measures. We present both. Positive BSI test: the immediate measures The BSI itself gives the most important tips that you should take into account as a victim of a botnet hack - in the email you receive when the BSI security test strikes you (see screenshot): Check your computer with a virus protection program to track down the malware that the botnet used to spy on your mail data...

Uninstall Lollipop virus - so it'll work

The Lollipop virus is a pest of unknown dimensions. We show you how to uninstall it in this article. Uninstall Lollipop virus Uninstalling via the control panel like other viruses does not work in most cases. Even if that succeeds, the rest of the files are still on the hard drive. Therefore you have to use special software...

Remove rvzr-a.akamaihd.net

The fairly harmless-looking malware rvzr-a.akamaihd.net should be removed from your computer quickly. This way you will avoid some bad surprises. We show you how to do this. Step 1: remove rvzr-a.akamaihd.net First uninstall the program using Control Panel. You can find detailed instructions on how to do this in this practical tip...

Remove Yawtix - Here's how

Yawtix is ​​a virus, but an unwanted browser extension. However, you should remove them as soon as possible. This practical tip shows you how to safely delete the adware. Step 1: uninstall Yawtix Note: The uninstallation removes the program itself, but Yawtix also writes new keys to the registry. Th...

Firefox: Check website for viruses - how it works

You would best like to check a website for viruses online in the Firefox browser: Find out how this works easily and free of charge. How to check websites for viruses with your Firefox browser: To check websites for viruses while surfing, all you need as a Firefox user is the Vtzilla plug-in. With VirusTotal-Check you are immediately shown whether a download is secure or contaminated...

G Data: Update doesn't work - you can do that

G Data Antivirus protects your PC from viruses and other unwanted programs. If the update does not work, you should act quickly. In this practical tip, we will show you what you can then do. G Data update does not work - How to solve the error Go to Control Panel> Administrative Tools> Services and wait for the list of services to start...

Remove Xtreme Rat - so go ahead

Detect and remove Xtreme Rat with the freeware detector on your PC. The antivirus tool looks for a total of eight hidden Trojans on your PC. Our instructions show you how to find Xtreme advice and ban it from your system. Detect finds Xtreme advice on your PC - the next steps Little is known about the Trojan Xtreme Rat and its various types...

PSN: Vulnerability - you should pay attention to this

A privacy vulnerability in the PlayStation Network allows every hacker to access the SQL database. This practical tip shows you how to protect yourself and what you should pay attention to. PSN vulnerability: what can happen? In mid-October 2014, a security expert had already found the PSN vulnerability and informed Sony about it...

Remove Tapsnake virus - Here's how

The app "Tapsnake" is up to mischief in the Google Play Store and can infect smartphones. You should definitely remove them. The program disguised as a game sends GPS data to a server in the background. We'll show you how to get rid of the spyware. Tapsnake virus: delete app First open the settings and switch to the installed apps...

VDU Work Ordinance: Key points explained clearly

For safety and health protection there is the so-called VDU work regulation, which is mainly used in offices. In this practical tip you will find out what is hidden behind it and what the VDU regulation prescribes. Key points of the VDU regulation This regulation is aimed at all workplaces where a screen is used in any form...

Remove Globososo - how it works

You should quickly remove the Globososo adware from your PC, as it changes your search results and you can land on dubious websites with the wrong click. Here we show you how to free your system from Globososo. Step 1: uninstall Globososo Although Globososo is not really a virus, but annoying adware, you should uninstall the software: "Globososo" may have gotten to your system either from infected websites or installed software...

Remove FBI Moneypak virus - Here's how

The FBI Moneypak virus is one of the particularly malicious variants of ransomware. Virus removal is not easy. We'll show you what you can do if your PC is infected with the ransomware. Remove FBI Moneypak virus using Bitdefender To remove the FBI Moneypak virus using a virus scanner like Bitdefender, you need to run the program in safe mode: Download Bitdefender on another computer and copy the program to a USB stick or burn it to a CD...

Remove Dosearches - Here's how

If DoSearches.com appears in your browser as the start page, it is a browser hijacker that you should remove. The program itself does not harm your computer. However, you shouldn't trust the search engine. Unwanted website redirects and a slowdown of the computer can result from the use. We'll show you how to delete the tool...

Remove Cryptowall Virus - Here's how

In this practical tip, we will show you how to remove the Cryptowall virus from your PC. Remove Cryptowall virus from PC Cryptowall virus is an aggressive ransomware that encrypts your files and wants to blackmail you to pay a sum of between $ 500 and $ 1, 000: Don't pay under any circumstances. You may not be able to decrypt your files even after paying...

Virus: "Your browser has locked" - what to do?

"Your browser has blocked" is a virus that spreads to an open website and tries to blackmail you into paying a release ransom. Here you can find out how you can get rid of the annoying torment without tapping. How to remove "Your browser has locked" virus The virus settles on an open website and prevents you from closing the browser...

Remove Vuupc - Here's how

In this guide, we explain how you can remove the adware Vuupc from your PC. Vuupc: Remove adware from the PC Vuupc is not really a virus, but more specifically, adware that you can remove from your PC using the following steps: Install the AdwCleaner and let it check your system. You should then do the same with Malwarebytes Anti-Malware...

BlackEnergy - how to remove the malware

BlackEnergy Virus is a special form of malware that you should remove from your computer as soon as possible. We will show you how to delete the malware. Remove BlackEnergy-Bot Once you've caught the BlackEnery virus, you're part of an ever-growing botnet. The BlackEnergy creator can contact your computer at any time and take any action...

Google account: Secure login via USB stick

You can now also log in to your Google account with a USB security key. With the USB stick, Google wants to take another step towards a secure account. More security for your Google account with a USB stick Google's new security process uses the Universal 2nd Factor (U2F) protocol. It is supposed to protect against pishing attacks more effectively, since authentication should only be possible via the respective original pages - in the case of Google...

Avast - for whom is the Pro version worthwhile?

With Avast Pro, you can extend your free protection with Avast. We'll show you who the update is worth. Avast: The Pro version can In addition to the usual features of the free version, the Pro version gives you the following features: Sandbox: You can use the sandbox to run critical files in a shielded area...

Remove Ads by OnlineBrowserAdvertising - Here's how

If you discover the Ads by OnlineBrowserAdvertising in your browser, you should remove the adware immediately. Our instructions will help you and show you the individual steps. Step 1: Remove Ads by OnlineBrowserAdvertising This is not a classic virus, but rather adware. This usually gets onto your PC unintentionally by installing other software...

Remove Supra Savings - how it works

If you have caught the Supra Savings adware, you should remove it as soon as possible. You can find detailed instructions in our article. Step 1: Remove Supra Savings Supra Savings is not a virus, but adware, which usually gets onto your PC via share or freeware. Among other things, this ensures changes to the search engine and manipulation of the search results...

Avira - for whom is the Pro version worthwhile?

In addition to the free version, you can also use the Pro version of Avira. For whom the paid virus scanner is worthwhile and what it can do, we explain to you in this practical tip. Avira Antivirus: What can the Pro version do? In general, the free version of Avira Antivirus is completely sufficient for most users...

Remove Mobogenie adware - Here's how

Remove the "Mobogenie" adware from your computer as soon as possible, otherwise there may be nasty surprises. With our instructions, this works easily in a few minutes. 1. Remove Mobogenie from the "Programs" "Mobogenie" is not a virus in the strict sense. Nevertheless, you should delete the adware from your Windows system...

Secure cloud storage with Boxcryptor - how it works

In this practical tip, we will show you how you can secure your cloud storage with Boxcryptor. How to secure your cloud storage with Boxcrypter The freeware Boxcryptor works with the cloud services Dropbox, Google Drive, OneDrive (formerly SkyDrive) and SugarSync: The tool creates a virtual drive that is linked to your cloud account...

Remove Webconnect - Here's how

If you discover Webconnect in your browser or a virus of the same name is reported, you should remove it immediately. With our guide, you can completely clean your computer of the malware. Step 1: remove Webconnect Webconnect not only changes your homepage and search engine, but also provides website redirects, annoying pop-ups...

Remove Buzzdock Ads - Here's how

In this practical tip, we explain how to remove Buzzdock Ads from the computer. Reset Firefox Reset Chrome Reset Internet Explorer In the next practical tip, read how you can best configure AntiVir....

Children's passport expired: extension and all information

Before you go on a trip, you should make sure that the children's passport has not expired. You can find out what you should do in this case in this practical tip. Children's passport expired - all information To be able to fly on holiday with the family, children up to the age of 12 need a valid passport...

LastPass: Change password

If you are asked to change your password at LastPass for security reasons, you should do so immediately. Of course, you can also change your password for other reasons. In any case, we will show you how to proceed. Hack attack on LastPass: Quickly change the password LastPass was hacked on June 15, 2015...

Remove BoBrowser - Here's how

The BoBrowser search engine comes across quite simply and looks harmless. However, you should remove them from your browser. We'll show you how it's done. Remove BoBrowser from Windows BoBrowser is relatively harmless adware that often gets onto your system by installing other software. The homepage is not only changed on isearch...

Chrome: Allow only certain pages - how it works

You can only allow certain pages in Google Chrome, for example if you want your children to use the computer too. We'll show you how to set this up. Allow only certain web pages in Chrome Download and install the free Whitelist for Chrome extension. To do this, simply click the "Add" button...

Saturn: This is what cell phone insurance promises

With the Saturn mobile phone insurance you protect yourself against high costs in the event of damage to your smartphone. In this practical tip, we will show you what else the insurance promises. Mobile phone insurance from Saturn - what is it? Saturn Handyversicherung in cooperation with Domestic & General provides you with various services for a 24-month contract, which you can use if your item is damaged...

Remove Omiga Plus

If you have caught the Omiga Plus toolbar, you should remove it very quickly. Although this is not a virus, the so-called adware injects advertising into your browser and can be very annoying. Remove Omiga Plus - how to proceed Omiga Plus is adware that is usually installed unintentionally with other software...

Make VoIP secure: tips and tricks

It is convenient when you make calls via VoIP, but there are also dangers. This practical tip will tell you how to make VoIP telephony secure. Make safe calls over the Internet with VoIP - you should note that VoIP telephony is the inexpensive and convenient alternative to a landline phone. However, you should keep the following tips and tricks in mind when making calls to protect yourself...

Remove EpicScale.exe - Here's how

If you discover the process EpicScale.exe, you probably have a Bitcoin miner on your PC and should remove it immediately. Remove EpicScale.exe from Windows EpicScale is an allegedly scientific project. The tool usually gets to your computer unnoticed by free software such as uTorrent. If your PC is not currently under heavy load, the tool starts up and uses your computer in the background to calculate various tasks...

Remove wajam

Wajam is adware and not a virus, but you should remove it as soon as possible. We will show you the exact procedure. Step 1: remove wajam Wajam is usually found as an add-on in the browser. There it can not only change the start page, but also be responsible for pop-ups and other unwanted actions. Uninstall a program: First open the Control Panel and sort the list of installed programs by the installation date...

Remove SuperFish.com - Here's how

If you find SuperFish.com adware in your browser, you should remove it immediately. We show you how to do this. Update: Delete SuperFish.com using the Lenovo tool SuperFish has been preinstalled on some Lenovo notebooks, but the adware can also get to your computer in other ways. SuperFish actually only shows advertisements, but why this adware is so dangerous can be found in this CHIP article...

Remove Ads by UniDeals - Here's how

Ads by UniDeals is a browser hijacker that you should remove as soon as possible. It is not a virus that manipulates malware, but it manipulates your browser settings and redirects you to dubious websites. We'll show you how to get rid of the annoying adware. Step 1: Remove Ads by UniDeals from the computer You probably installed the hijacker together with a program that you downloaded from the Internet...

Remove Sweetplayer - Here's how

If you discover the SweetPlayer in your browser, you should remove it immediately. We show you how to do this. Step 1: Remove SweetPlayer from Windows SweetPlayer is comparatively harmless adware. Among other things, your home page and the search engine change. In addition, the adware interferes with annoying advertisements and pop-ups...

PayPal: "Strange transaction detected" - Beware of this phishing email

Pishing emails with the subject "Strange transaction detected" are currently circulating, in which PayPal users are warned that third parties have made a purchase using your PayPal account. This mail is fake and aims to steal your data. PayPal-Pishing: Strange transaction found Pishing mails with PayPal as the alleged sender are currently in circulation...

Zalando: Change password - how it works

For security reasons alone, you should change your Zalando password regularly. We'll show you where to find the relevant settings and how to get a new Zalando password. Change the password of the Zalando account Open the Zalando website and first log in with your user account. Now click on "My user account" and select the "Change user data" tab in the left column...

PS4 - How to set up parental controls

This guide shows you how to set up parental controls or restrictions for your children on PlayStation 4. Set up parental controls on PlayStation 4 There are several ways to set up and configure parental controls on your PlayStation 4. We present the options in the following points. To set up cross-account parental controls, open the "Parental controls" item on your PS4 in the settings...

Forgot Dropbox password - what to do?

If you forget your Dropbox password and no longer have access to the cloud platform, there is no need to worry. We'll show you how to reset the password. Recover password for Dropbox Open the Dropbox website and click on the "Register" button under the "Register" button. In the newly opened window click on "Forgot password"...

Remove play-toolbar.org - so it'll work

If you have caught the play-toolbar.org adware, you should remove it immediately. Our instructions show you the individual steps. Uninstall a program: Open the Control Panel and sort the list of installed programs by the installation date. Remove all unknown new entries here. Detailed instructions on how to remove the programs can be found in the practical tip Uninstalling Windows programs...

Remove Advanced System Protector virus - Here's how

If you have caught the "Advanced System Protector" virus, you should remove the pest quickly. We'll show you how to delete the stubborn malware. Step 1: Uninstall Advanced System Protector Similar to the SpyHunter, the program pretends to be a full-fledged virus scanner. It keeps reporting infections, but requires a paid upgrade to remove the fictitious viruses...

Install Avast on USB stick

In order to fix serious virus problems with Avast, you should copy a current Avast version on a USB stick. We show you how to do it. Install Avast on the USB stick First open Avast by clicking on the yellow Avast icon under "Hidden symbols" in the task bar. Then navigate to "Tools" in Avast and select "Rescue Medium"...

My email account sends spam - what to do?

If you suspect that your email account is sending spam messages, you should act quickly. You can read which steps you should take immediately in this practical tip. This is how you notice whether your email account sends spam If your email account has been cracked by hackers, this can go unnoticed for a long time...

Avast: Scan USB stick for viruses

With Avast you can scan a USB stick completely for viruses. This is how you determine whether you can open the foreign files without hesitation. Check the USB stick for viruses with Avast First open Avast as usual using the "Hidden Icons" in the task bar (yellow Avast icon). Then switch to the "Review" tab...

Remove Windows Security Alert - Here's how

If you have captured the Windows Security Alert software or you receive such a message, you should remove it. We'll show you how it works. Virus threat: Remove Windows Security Alert Uninstall programs: First search for new, unknown programs in the Control Panel and remove them. Pay particular attention to the name "Security Alert"...

Remove Savingsbull - Here's how

If the adware Savingsbull has nested in your browser, you should remove it as soon as possible - even if it is not a dangerous virus in the strict sense. We'll show you how it's done. Step 1: remove Savingsbull The adware Savingsbull usually reaches your computer via share and freeware and then settles in the browser...

Lexbces.exe - what is it?

In this practical tip, we explain what the lexbces.exe process is about. lexbces.exe is required for Lexmark printers The lexbces.exe process is a part of Lexmark's MarkVision software. The software is required to configure the internal network card installed on certain Lexmark printers. This software allows you to directly access the Lexmark printer over the network...

Remove only search - how it works

If you only discover the search engine Only-Search in your browser, you should remove the adware immediately. We'll show you how it's done. Step 1: Remove Only-Search Virus from Windows Only-Search is primarily a search engine, but the adware also makes other changes. Among other things, dangerous website redirects and pop-ups can also occur...

Remove PriceSparrow - Here's how

PriceSparrow is annoying adware that you should remove immediately. The malware manipulates your search results, displays advertisements and opens unwanted pop-ups. Our guide will show you how to remove PriceSparrow. ADW-Cleaner: This tool has specialized in adware and finds all remnants of PriceSparrow...

Remove FBDownloader - Here's how

If you find the FBDownloader search engine on the start page of your browser, you can quickly remove it. We'll show you how it's done. Step 1: remove FBDownloader In most cases, the FBDownloader gets onto your computer through careless installation of other software. Not only does the start page on search...

Words double underlined on websites

If a conspicuous number of words on Internet pages are underlined twice in your browser, this is mostly due to unwanted adware. We'll show you how to solve the problem. Words double underlined on websites Double-underlined words show advertising when you move the mouse over the mostly blue or green markings...

Mail: Microsoft account security confirmation - is this spam?

If you receive an email from "Microsoft account security confirmation", it often looks deceptively real. Many users are unsure whether this mail is genuine or just spam. You will find the answer in this practical tip. Email: "Microsoft account security confirmation" - spam or not...

Ryanair: laptop and tablet in hand luggage - what to consider?

Laptops and tablets are often taboo or even forbidden in Ryanair's hand luggage. We'll get rid of all rumors here and tell you if you can use your laptop / tablet on your next flight. Laptops and tablets at Ryanair - allowed in hand luggage? Although there is always discussion about a ban on electronic devices in hand luggage, there is not (yet) one...

Mobile phone bill too high: How to react correctly

If your cell phone bill is too high, you should remain calm despite the shock. In this practical tip, we will tell you how to react correctly in this case. Mobile phone bill too high - what to do? First of all, take a close look at the invoice and pay particular attention to the items that will be invoiced to you...

Safe.tv - is it legal?

On the Safe.tv website you can watch German TV programs at any time and without advertising. We'll tell you if that's legal at all. Safe.tv - legal or illegal streaming service? The Safe.tv website stores numerous films and series from German TV stations and removes the advertising. However, it has not yet been clarified in the current court proceedings whether this is really illegal...

Browser infected with Delta-Homes - so you can remove the malware

If you have caught the malware from Delta-Homes, you should immediately remove it from your browser. We'll show you how it's done. Practical tip video: How to remove malware and adware Step 1: remove Delta-Homes from Windows Delta-Homes usually gets onto your computer unnoticed when other software is installed...

Yet Another Cleaner (YAC): How to remove the malware

The Yet Another Cleaner (YAC) tool is designed to clean up your PC and remove unnecessary files. Instead, it downloads malware to your computer in the background. We will therefore show you how to remove the tool. Remove Yet Another Cleaner (YAC) - how it works Start the Control Panel on your PC. Under the point "Programs" you will find the point "Uninstall Programs"...

Plus-HD-3.8c: Remove adware

If you are dealing with Plus-HD-3.8c, it is very troublesome. Here's how to remove the virus-like adware. Getting started: How to remove the Adware Plus-HD-3.8c Plus-HD-3.8c is not really a virus and not a dangerous Trojan, but since it clogs up your browser with annoying advertisements, it is annoying enough...

Remove Fedpol virus - Here's how

The Fedpol virus usually gets to your computer through emails or installed programs. You should remove it as soon as possible. We'll show you how. What does the Fedpol virus want? The Fedpol virus is ransomware. She pretends that the Swiss police have taken over your PC. You will be asked to transfer a certain amount of money via ukash or paysafecard to buy your PC free...

Remove Registry Helper - Here's how

If you find the registry helper in your browser, you should remove the adware immediately. We will help you with our instructions. Step 1: remove registry helper The registry helper is adware that nests in your browser - not a virus in the strict sense. The registry helper provides, among other things, for advertisements and annoying pop-ups...

Remove TermTutor - Here's how

TermTutor is not a real virus, but annoying adware. However, you should remove them immediately. In this guide, we will show you how this works. Step 1: remove TermTutor adware TermTutor is more of an adware than a real virus. The tool nests in your browser and changes various settings. Uninstall TermTutor: Open the Control Panel and sort the list of installed programs according to the installation date...

Remove Advance Elite - Here's how

"Ads by Advance Elite" is annoying adware that you should remove as soon as possible. It causes unwanted advertisements so that your screen is clogged with advertising despite the ad blocker. We show you how to get rid of the pest. Remove Ads by Advance Elite completely from the system The Adware Advance Elite is often installed unnoticed in the background when programs are installed...

Remove PepperZip - Here's how

You should remove the PepperZip virus immediately as it starts automatic downloads, changes your browser settings and is annoying with pop-ups. Our guide shows how to get rid of the adware. Remove PepperZip completely - so proceed The adware PepperZip is usually installed unintentionally via other software...

Remove Salus adware - Here's how

If you have caught the adware Salus (Ads by SalsuSalus), you should remove it as soon as possible. Our instructions will help you with this. Step 1: Remove Salus adware The "Ads by Salus" adware is usually installed unintentionally via freeware. Salus is not a virus in the strict sense, but can change various settings on your browser and thus become a security risk...

Hack Facebook account - is that possible?

There are many programs on the Internet with which you are supposed to hack Facebook accounts. We explain what you should think about it and how you can protect yourself. Hacking Facebook accounts - is that possible? If you come across tools that you can use to crack external Facebook accounts, you should first of all be careful...

Remove HDVidCodec - Here's how

If you have caught the HDVidCodec tool, you should remove it immediately. We show you how to do this. Remove HDVidCodec safely Uninstall HDVidCodec: Open the list of installed programs in the Control Panel and sort them according to the installation date. Remove the entry "HDVidCodec", as well as all other unknown new entries...

Remove ShopDrop - Here's how

ShopDrop is not a dangerous virus. Nevertheless, you should remove the adware. You can find out how this works in this practical tip. Remove the adware ShopDrop from the Windows PC First, you should banish ShopDrop from your system: Open the Control Panel and click on "Uninstall a program"...

Remove Vi-View - Here's how

If the start page of your browser has changed to the Vi-View search engine, you should remove the adware immediately. We'll show you how it's done. Step 1: remove Vi-View adware from Windows Vi-View uses the websites vi-view.com, myhome.vi-view.com and searches.vi-view.com. This is relatively harmless adware that has mostly sneaked into your PC by installing other software...

Remove Amazon Smart Search - Here's how

This guide shows you how to remove the unwanted extension Amazon Smart Search. Amazon Smart Search: Remove browser hijackers Amazon Smart Search is a browser hijacker that integrates unwanted extensions into your browser. To remove Amazon Smart Search, first open the Control Panel and select "Uninstall a program"...

Mac OS X Yosemite: Disable Spotlight suggestions

The new function of the Spotlight suggestions under MacOS X Yosemite sends user data to Apple's server without being asked. If you do not want this, you can deactivate the function. Yosemite: Disable Spotlight suggestions To prevent your data from being sent to Apple, just turn off the Spotlight suggestions...

Dropbox hacked - what to do?

If your Dropbox account has been hacked, you should take measures to protect your data as soon as possible. We'll tell you exactly what to do here. Has my Dropbox account been hacked? If you are not sure whether an unauthorized person has or has had access to your Dropbox account, you can view all the activities of your account on an overview page: Log in to your Dropbox account...

MacOS: Remove Wirelurker malware

In this practical tip, we explain what the malware Wirelurker does and how you can remove it. Wirelurker: What he does and where he comes from The Wirelurker malware arrives on your Mac via downloads from the Chinese download portal "Maiyadi App Store", presumably via the OS X security vulnerability "Rootpipe"...

VoIP and security - how secure is it?

If you use a VoIP phone or an app for VoIP telephony, you should always pay attention to security. We show you how secure VoIP really is. VoIP: How Secure Is Internet Telephony? VoIP (Voice over IP) is not really more secure or insecure than normal telephony. However, since VoIP devices act similarly to computers in a network, they can also be attacked...

Remove PennyBee - Here's how

If the PennyBee adware has reached your system, you should remove it as soon as possible. The troublemaker does no damage to the system, but it ensures that additional advertising is displayed in your web browser. In this article, we show you how to do this. Remove PennyBee by uninstalling it In most cases, PennyBee gets onto the PC unnoticed during the installation of programs...

Remove HQ Video Pro - Here's how

If the adware HQ Video Pro has reached your PC, you should remove it as soon as possible. Although it is not a virus, the troublemaker changes browser settings and displays additional advertising, for example. 1. Remove HQ Video Pro from the PC The first step is to uninstall the HQ Video Pro adware from your computer...

PUA / DownloadSponsor.gen - what is it?

The Avira warning "PUA / DownloadSponsor.gen has been blocked" appears during software installations because Avira classifies the software as a virus or unwanted program. However, the warning is a false alarm. Avira message "PUA / DownloadSponsor.gen" Since the Avira quality offensive, you will be notified of unwanted programs during installation much more often...

KFW: Forgot password - what to do?

If you have forgotten your password for the KFW credit portal, you can request a new one via your email address or your business partner number. KFW: Forgot password for the online credit portal - you can do that If you have forgotten your PIN for the KFW online portal, you can request a new PIN by post...

BGH judgment on loan fees - you can find the form here

We'll show you where you can find the BGH judgment form on loan fees. In its ruling, the Federal Court of Justice had ruled that bank customers can claim wrongly charged processing fees for consumer loans. How to get your money back. BGH judgment: Claim the credit fees back using the form The Federal Court of Justice, BGH for short, has decided: Bank customers can get back illegally charged fees for loans...

Is Kinokiste.to legal?

Watching films and series for free at Kinokiste.to sounds good at first. This practical tip will tell you whether this is really legal or whether you are already in the criminally relevant area. Is Kinokiste.to legal? - Solmecke, the lawyer, explains The legality of VoD providers like Kinokiste.to It is relatively easy to answer whether sites like Kintokiste...

Neteller: Forgot security ID - what to do?

If you forget your Neteller security ID, you will no longer be able to make transactions. We'll show you how to get and reset the "Secure ID". Forgot forgotten security ID at Neteller Open the Neteller website and log in to your account. Go to the "Account" category on the left and find your "Secure ID" under "Details"...

Remove COM Surrogate Virus - Here's how

Com Surrogate is not a virus, but a system file. Therefore, you must not remove them. If problems arise with this, we will show you in this practical tip what you can do about it. Remove COM Surrogate Virus - you have to do that If you get the message that the Com Surrogate file is a virus, you should act quickly...

Remove PerformerSoft

Remove PerformerSoft from your computer quickly. It is not a virus, but the adware slows down your browser and spies on your data. We'll show you how to remove the pest. Remove PerformerSoft The adware Adware PerformerSoft infiltrates unnecessary software on your computer and affects your browser...

Remove Comodo Internet Security - how it works

Comodo Internet Security consists of several components. To remove the software and all of its programs, you must remove three different programs and remove an entry in the registry. How to delete Comodo Internet Security Open the Control Panel and go to "Programs and Features". First of all mark the "Comodo Internet Security" and click on "Uninstall"...

Remove Buenosearch

If you have caught the Buenosearch virus, it can quickly take over the browser. You can find out how to remove it in this practical tip. Remove Buenosearch: Uninstall using Control Panel Open the Control Panel and navigate to "Programs & Features". Here, look for programs with the name "Buenosearch" and uninstall them...

Remove offers by context - so it'll work

Offers by Context is a hijacker that displays unwanted advertising banners and pop-up windows in your browser. This practical tip shows you how to remove the program. Remove Offers by Context from the computer Most likely, you brought the browser hijacker to your PC along with a program that you downloaded from the Internet...

Remove MyPC Backup - Here's how

If the malware "MyPc Backup" has taken root, you should remove the program as soon as possible. We'll show you how. Remove MyPc Backup safely If you get messages that you should backup your PC as soon as possible and also online, you have caught MyPc Backup via an infected website or a download...

Remove WebPorpoise

WebPorpoise is adware that contaminates your PC. In this guide, we show you how to remove the "Virus" from your PC. WebPorpoise - how to remove the adware WebPorpoise is adware that plays annoying advertisements on your PC. We will show you how to remove WebPorpoise from your system in the following steps...

Remove block surf - how it works

If you find the blockware adware in your browser, you should remove it immediately. We'll show you how it's done. Step 1: remove block surf from Windows Blockandsurf is relatively harmless adware. Among other things, unwanted advertising appears in the form of pop-ups, search results are also changed...

Remove aMuleC - Here's how

If you can find aMuleC on your PC, you should remove the tool immediately. While it is not a virus, this tool is potentially undesirable and can download malware. In this practical tip, we will show you how to remove aMuleC. Step 1: Remove aMuleC from the Control Panel This adware is often installed subconsciously by other programs...

Remove Shopping Helper Smartbar

This guide shows you how to remove the "Shopping Helper Smartbar" from your computer. The program is not a virus, but so-called adware. Shopping Helper Smartbar: How to remove the adware "Shopping Helper Smartbar" is a browser hijacker that changes various browser settings and displays unwanted advertisements on your PC...

Remove Save Clicker

In this practical tip, we will show you how to remove Save Clicker. Strictly speaking, it is not a virus, but adware that contaminates your PC with advertising. Save Klicker: This is how you can remove it With the following steps you can remove the Adware Save Klicker from your PC. Look for a program called "saveclicker" in the Control Panel and uninstall the tool from your PC...

Remove Open Candy - Here's how

If you discover Open Candy on your computer, you should remove the tool. The adware changes your browser settings. Our guide will help you get rid of the tool. Step 1: remove open candy Open Candy is comparatively harmless adware. This is usually installed unnoticed via free software. Among other things, Open Candy slows down your system and nests in your browser...

Remove GoHD - how it works

If you find the GoHD in your browser, you should remove it quickly. GoHD is not a virus, but adware - the program injects advertising into your computer. We'll show you how to get rid of the pest. Step 1: remove GoHD from Windows GoHD is adware that nests in your browser. Here she changes various settings and provides, among other things, annoying advertising and pop-ups...

Remove adware-gen

Adware-gen is not a virus, but you should remove the tool. It feeds advertising into your browser and changes its settings. We show you how it's done: Step 1: remove adware-gen Adware-gen can get onto your computer in many ways. Most of the time the adware in the form of toolbars is accidentally installed...

Remove Seedabutor on Trojan alarm - how it works

If your anti-virus software detects the Seedabutor Trojan, you should remove it as soon as possible. We'll show you how it's done. Delete Malware & Trojans: Remove Seedabutor The malware probably came to your system through dubious software or a download. What exactly the pest does is unclear...

Remove Malware TowerTilt - Here's how

If your homepage on TowerTilt.com has changed, you should remove the adware immediately. Our instructions show you how to remove the "Virus". Step 1: remove TowerTilt TowerTilt is adware that is mostly installed unintentionally via share or freeware. Among other things, PowerTilt provides pop-ups and manipulates the search results...

Remove Sirefef trojan

If you discover Sirefef trojan adware or malware on your computer, you should remove it as soon as possible. We'll show you how to do it. Trojan Alert: Remove Sirefef adware The Sirefef Trojans have many different forms and can get into your system in a variety of ways. Website redirects, such as adware, are harmless consequences of the malware, but it also has the potential to destroy your entire system...

Remove Content Accelerator - Here's how

The content accelerator is not a virus, but you should remove the adware as soon as possible. In this guide, we will show you how this works. Step 1: remove the content accelerator The content accelerator is adware that nests in your browser. It usually gets onto your PC unintentionally via downloaded programs...

Remove coupon addon

If you discover coupon addon in your browser, you should remove the adware. Although this is not a virus, the tool is annoying. In this practical tip, we will show you how to get rid of the addon. Step 1: remove coupon addon "Coupon Addon" is actually harmless adware. Among other things, it provides pop-ups and other advertisements...

Remove Clearthink - Here's how

In this practical tip, we will show you how to remove the Clearthink program from your PC. The software is not a virus, but is often referred to as adware on the Internet. You may have accidentally installed it with free software. Remove Clearthink using Control Panel First open the Control Panel and switch to the "Programs and Features" setting...

Remove Flashbeat - Here's how

You should remove the FlashBeat software from your system as soon as possible because it displays unwanted advertisements and can reduce system performance. In the worst case, the security of your data is even at risk. Read how to uninstall FlashBeat below. Windows: Uninstall FlashBeat For example, FlashBeat can get onto your system while installing other programs...

Remove Results Alpha Virus

This guide shows you how to remove Results Alpha Virus from your PC. Results Alpha: How to remove the virus Results Alpha is a browser hijacker that changes your settings unnoticed. We will show you how to remove the malware from your system in the following steps. Open the Control Panel and click the "Uninstall a program" option...

Remove Quick Start NewTab

If the adware Quick Start NewTab appears in your browser, you should remove it immediately. It is not a virus, but it is annoying adware. We'll show you how to get rid of them. Uninstall a program: Open the Control Panel and sort the list of installed programs by the installation date. Remove all unknown new entries here...

Remove Trojan Gen.2 Virus - Here's how

If your anti-virus software shows the Trojan Gen.2 virus, you should remove it from your system immediately. We'll show you how it's done. Remove Trojan Gen.2 virus Since the virus has already been reported to you, you should now remove the virus using your anti-virus program. This usually happens directly via the message that appears...

Remove the sweet page

If you see Sweet Page in your browser as homepage, you should remove the adware immediately. The tool is not a virus, but changes settings in your browser. With our instructions you will get rid of the "virus" in a few minutes. Step 1: Uninstall Sweet Page as software Sweet Page usually gets onto your computer unintentionally via share or freeware...

Remove Xnxx adware - how it works

If you have caught adware via the website Xnxx.com, you should remove it as soon as possible. We will show you the exact procedure. Step 1: remove Xnxx adware Xnxx.com is a website with pornographic content. Even if you are only redirected to this website by a pop-up, you can get infected with adware...

Remove hot deals - how it works

If you find more advertising or a toolbar with the words "Hot Deals" in your browser, you should remove the adware immediately. In this guide, we will show you how this works. Step 1: remove the adware hot deals Hot deals are adware, which usually manifests itself in the form of a toolbar or unwanted pop-ups...

Remove OffersWizard - Here's how

In this guide, we show you how to remove the Adware OffersWizard from your PC. OffersWizard: How to remove the adware More specifically, OffersWizard is not a virus in the traditional sense, but rather adware that plays unwanted advertisements on your PC. Use the following steps to remove OffersWizard...

Remove MyWebSearch - Here's how

If MyWebSearch appears in your browser, you should remove the adware as soon as possible. You will find the exact procedure in our instructions. Step 1: remove MyWebSearch MyWebSearch not only installs a toolbar in your browsers, but also ensures unwanted website redirects. Even if this appears to be the case at first, it is not a virus...

Remove Deal Finder - Here's how

The Deal Finder appears both as an add-on in the browser and as software. We'll show you how to remove the adware. Step 1: remove deal finder The Deal Finder is not a virus, but rather harmless adware. The Deal Finder exists as an independent program and as a browser add-on. In the browser, the Deal Finder displays annoying advertisements as soon as you move the mouse over items that can be bought...

Juke: Change password - how it works

You should change your password for the music and video streaming service Juke regularly. This is the only way to achieve the best possible security for your account. We explain how this works in this practical tip. Music: Change password at Juke - that's how you proceed Open the Juke homepage and log in to your user account...

Remove coupon addon

If you discover coupon addon in your browser, you should remove the adware. Although this is not a virus, the tool is annoying. In this practical tip, we will show you how to get rid of the addon. Step 1: remove coupon addon "Coupon Addon" is actually harmless adware. Among other things, it provides pop-ups and other advertisements...

Windows 7/10: Protect folder with password - how it works

If you share your PC with other people, it is safer to password-protect certain data. In this guide we show you how to secure entire folders in Windows 7 and Windows 10 with a password. Windows 7 and Windows 10: Protect folders with a password In the following instructions we use the WinRAR tool. This works for Windows 7 as well as Windows 8 and Windows 10...

Report theft - how it works

You can report any theft, but you don't have to. Unless you insured the stolen items. If you want to report the theft, the nearest police station is a good place to place the complaint. Reporting theft - you should be aware of that Even if you can basically report any theft to the police, it is not always worth it...

Remove Nationzoom - Here's how

You should remove "Nationzoom" from your computer immediately: the program is not a virus, but it slows down your browser and often redirects to websites infected with viruses. We show you how to proceed to delete the adware. Important: Please follow all of the steps below! This is the only way to get rid of "Nation Zoom" completely...

Remove Awesomehp - Here's how

"Awesomehp" is an annoying browser adware that manipulates software and PC settings. You should remove them quickly, even if it is not actually a dangerous virus. We show you how to do this. 1. Remove Awesomehp with AdwCleaner AdwCleaner is a free deletion software that searches your computer for adware and file remnants after a short installation...

Remove ShopGlider - Here's how

ShopGlider is a browser hijacker that you should remove from your PC as soon as possible. Although this is not a virus, the adware changes your browser settings and redirects you to dubious websites. Remove ShopGlider from the PC The first thing to do is to uninstall the hijacker from your PC. You can find out exactly what a browser hijacker is here...

Remove ShopDrop - Here's how

ShopDrop is not a dangerous virus. Nevertheless, you should remove the adware. You can find out how this works in this practical tip. Remove the adware ShopDrop from the Windows PC First, you should banish ShopDrop from your system: Open the Control Panel and click on "Uninstall a program"...

Remove MyWebSearch - Here's how

If MyWebSearch appears in your browser, you should remove the adware as soon as possible. You will find the exact procedure in our instructions. Step 1: remove MyWebSearch MyWebSearch not only installs a toolbar in your browsers, but also ensures unwanted website redirects. Even if this appears to be the case at first, it is not a virus...

Provide account number for contest calls - is this safe?

For many contest calls, you should provide your account number in order to receive a prize. Here we explain in which cases this is safe and when you should hang up. Contest Calls: Specify Account Number or Not? If you suddenly hear the phone ring and you receive the message about a win, you should be careful...

Avira AntiVir: cancel license - how it works

You can easily cancel your Avira Antivir license. This practical tip shows you exactly how to do this. Avira license: the termination is successful First switch to the Avira website and log in with your data. Click on the "Payment history" option on the left. Here you can see when you made which payments...

Windows: file write protection cannot be removed - what to do?

If the write protection of a file cannot be removed under Windows, this is due to missing rights, for example. We'll show you how to solve the problem. Windows: This is why the file write protection cannot be removed Latest videos Windows: Write protection cannot be removed - First open the properties of the file Now remove the check mark next to "Read-only" If the write protection cannot be removed in Windows, there are a number of steps you can take...

Kaspersky: cancel subscription - how it works

If you no longer need the Kaspersky service, you can cancel your subscription online with just a few clicks. We'll show you how it works. Cancel your Kaspersky subscription online Log in to the Kaspersky Account Information page. For this you need your password and the order number of your subscription, which you can find in the confirmation email or the order confirmation page...

Does anyone use my WiFi? Here's how to find out

If you are afraid that someone else is using your WLAN, you can access all connected devices via your router. We'll show you how to detect such WLAN parasites with your telecom router, your Fritz! Box or a simple tool. Find out connected WLAN devices - this is how it works with Telekom routers Open the router configuration in your browser...

Popcorn time: get a warning - what to do?

The Waldorf Frommer law firm is currently sending warnings for illegal streaming at Popcorn Time. If you have received such a warning, there are several strategies how you can react to it. Popcorn time warning: is the use illegal? Popcorn Time is software that allows you to stream films and series via PC software or Android app...

National identity number: where can I find it?

If you want to enter the USA without a visa, you must first provide your national identity number. We'll show you where to find the number. Where does the national identity number stand? German citizens do not have a national identification number, as required when entering the United States. Nevertheless, it is a mandatory field in the form...

TAN generator: change batteries - how it works

You need a TAN generator for secure online banking. We show you how you can change the batteries on the device. Changing the batteries of the TAN generator - How to proceed If your TAN generator shows that the batteries are almost empty or can no longer be switched on, you should change the batteries...

Mailbox.org: The advantages of the email provider

Data protection and protecting your privacy are just two advantages that the email provider Mailbox.org promises to its customers. We took a look at what else Mailbox.org has to offer you. This is how Mailbox.org can score After a spying scandal has been lined up seamlessly with the next, the need for guaranteed data protection is growing...

Additional address: what is it?

If you would like to send a letter or parcel, an additional address can be helpful. We'll tell you what it actually is and when an additional address really makes sense. Additional address: areas of application and necessity The same addressing is used for letters and parcels almost worldwide. In Germany, name, street, postcode and city each have their own line...

Cancel ADAC membership

If you no longer wish to use the ADAC membership, you can cancel the subscription at any time. We'll show you how it's done. Unsubscribe from ADAC: You need to know that The period of notice for ADAC membership is 3 months for each tariff. If you do not cancel at least 3 months before the subscription expires, your membership will be extended for another 12 months...

Cancel McAfee subscription - Here's how

If you no longer wish to use your McAfee anti-virus software, you can cancel the subscription. We'll show you how it's done. Unsubscribe from McAfee First, go to the McAfee website below to cancel the subscription. Click on "My Account" in the top right corner and log in to your account...

Norton: cancel subscription - how it works

If you no longer wish to pay for Norton's paid subscription, you can cancel it online at any time. We'll show you how it's done. Unsubscribe from Norton Open the following Norton website in your browser and log in with your account data. Go to the "My Norton" category above and select the "Automatic renewal and subscriptions" entry...

Deactivate Avira AntiVir Guard - how it works

The Avira AntiVir Guard keeps blocking benign programs. In such cases, deactivate the security tool so that there are no problems. Avira AntiVir: Briefly switch off the real-time guard Latest videos Click "Real Time Protection" Disable real-time protection Open Windows Explorer and display hidden files...