Skip to content
  • Home
  • ICT INSIGHT
  • A.I.
  • LEREN & ONDERWIJS
  • Links
    • WWW.ICTTOOLS.NL
    • WWW.LOOPMEEMETICT.NL
  • Updates
  • Woordenschat uitleg
  • Contact

ICT Insight Artikelen

  • ‘Oplichters proberen simkaarten klanten KPN en Odido over te nemen’
  • [13-09-2025] ‘Overvloedig vertrouwen op ChatGPT stompt brein af en vermindert kritisch denkvermogen’
  • 10 PRIVACY TIPS
  • Amerikaanse luchtverkeersleiding werkt nog met Windows 95 en floppy’s
  • Bijna helft van organisaties betaalt losgeld bij ransomware-aanval
  • Bloomberg: Zwitsers bedrijf kan toegang krijgen tot 2FA-codes techbedrijven
  • Duitse servettenfabrikant vraagt faillissement aan na ransomware-aanval
  • European alternatives for popular services
  • Goedkope USB-C oplaadkabels zijn gevaarlijk voor je Android en iPhone
  • Google wil Gemini toegang geven tot jouw apps
  • Groot probleem met nieuwe AI-modellen: ze vertellen je meer onzin
  • Microsoft Authenticator ondersteunt binnenkort geen wachtwoorden meer
  • Microsoft gaat PowerShell 2.0 verwijderen uit Windows
  • Omstreden Europese ‘chat control’-wet staat op losse schroeven
  • Surfshark: Google Chrome verzamelt meeste data van gebruikers
  • Vaarwel C++ en C: VS zetten in op memory safe-programmeertalen
  • Voormalig Head of Security: ‘WhatsApp bevat beveiligingsproblemen die privacy van gebruikers mogelijk in gevaar brengt’
  • What are the AI privacy concerns?
  • What are the AI privacy concerns?

ICT Insight Video's

  • [13-09-2025] AI Agents, Clearly Explained
  • [13-09-2025] AI Firewalls are here! (Can your firewall do this?)
  • [13-09-2025] How I Use this INSANE A.I. Tool to Sound Like Morgan Freeman
  • [13-09-2025] Wordt ransomware nu door kunstmatige intelligentie gegenereerd?
  • 12 Privacy & Security Tools I Use EVERY DAY
  • 2.4 GHz vs 5 GHz WiFi: What is the difference?
  • 3 Levels of WiFi Hacking
  • 32 bit vs 64 bit
  • 4 CRITICAL Places to Use a YubiKey (beyond an email account)
  • 40 Windows Commands
  • 5 Tips to Help You Learn Windows PowerShell
  • 50 macOS Tips and Tricks Using Terminal (the last one is CRAZY!)
  • 60 Linux Commands you NEED to know
  • A VM inside a VM inside a VM – Nested Virtualized Explained!
  • All Power Supply Cable Types EXPLAINED
  • APIPA Explained – Automatic Private IP Addressing
  • Are VPNs even safe now? Hacker Explains
  • ARP
  • Best Linux Distributions for 2024
  • BIOS VS UEFI
  • Bluetooth vs WiFi – What’s the difference?
  • Bob Ross – Eiland in het Bos (Seizoen 29 Aflevering 1)
  • Can a webpage be malware?
  • Can Hackers find you?
  • Can you trust Proton Mail after the logging and arrests?
  • CDN – Content Delivery Network – Uitgelegd
  • Choosing Your First Linux Distro
  • Chrome OS Flex: Installing Linux Apps & 4 Month Review of Google’s New PC OS
  • Circuit Switching vs Packet Switching
  • Cloud Computing Explained
  • Cloudbrowser – The most SECURE browser!! (testing it with malware)
  • Collision Domain vs Broadcast Domain
  • CPU Cache Explained – What is Cache Memory?
  • CPU, GPU…..DPU?
  • CSMA/CD and CSMA/CA Explained
  • Cyber Security: Protecting Online Accounts
  • Data Packets – How does the internet send data?
  • DDoS Attack Explained
  • Default Gateway
  • DHCP Explained – Dynamic Host Configuration Protocol
  • DMZ
  • DNS Records Explained
  • Docker Compose will BLOW your MIND!! (a tutorial)
  • Docker networking is CRAZY!! (you NEED to learn it)
  • Does a Fast WiFi Router make your Internet Speed Faster?
  • Don’t Use Google For Photo Backup!
  • Draadloos toegangspunt versus Wi-Fi-router
  • Drive Cloning & Imaging
  • Ethernet Cables, UTP vs STP, Straight vs Crossover, CAT 5,5e,6,7,8 Network Cables
  • Every CPU Architecture Explained in Detail
  • Explaining Audio File Formats (audioformaten)
  • Explaining Display Connectors: HDMI, DisplayPort, USB-C, DVI, VGA & Thunderbolt
  • Explaining Edge Computing
  • Explaining Image File Formats (afbeeldingsformaten)
  • Explaining Motherboard Chipsets
  • Explaining RAM
  • Explaining USB: From 1.0 to USB4 V2.0 (USB varianten uitgelegd)
  • Explaining Wi-Fi: 802.11 Standards & Generations (wifi uitgelegd)
  • FAT32 vs exFAT vs NTFS – Windows File Systems
  • Flipper Zero vs “Proper” Hacking Tools
  • GRATIS beveiligingstools die IEDEREEN zou moeten gebruiken
  • Half Duplex vs Full Duplex
  • HDMI, DisplayPort, DVI, VGA, Thunderbolt – Video Port Comparison
  • Host your own HelpDesk
  • How a DNS Server (Domain Name System) works
  • How Do CPUs Work?
  • How Email Works
  • How FAST is your storage? SSD speed, M.2 performance and more
  • How Security Keys work (2FA explained!)
  • How Smartphones Shrink Our Brains
  • How To Access the DARK WEB in 2024 (3 Levels)
  • How to be Invisible Online (and the hard truth about it)…
  • How to tell if your PC is hacked: Intro to System Forensics
  • Hub, switch en router uitgelegd – Wat is het verschil?
  • Hyper Threading Explained
  • I Tested 11 VPNs For 30 Days – Here Are The Best
  • I Tested 5 Secure Email Providers (THIS is the best Gmail alternative)
  • Incremental vs Differential Backup, & Full – Explained
  • Internet Bandwidth (speed) Explained
  • IP Address – IPv4 vs IPv6 Tutorial
  • IPCONFIG Explained – Flush DNS Cache
  • IPsec Explained
  • Je telefoon luistert niet, dit is wat er werkelijk gebeurt
  • Kan Meta WhatsApp lezen?
  • Kdenlive 24: Free & Open Source Video Editor
  • LAN, WAN, SUBNET – EXPLAINED
  • Layer 2 vs Layer 3 Switches
  • Learning Docker is HARD!! (this makes it easy)
  • Let’s subnet your home network // You SUCK at subnetting // EP 6
  • LibreOffice vs Microsoft: The Document War
  • MAC-adres uitgelegd
  • Mesh Wifi Explained – Which is the best? – Google Wifi
  • Modem vs Router – What’s the difference?
  • Monitors Explained – LCD, LED, OLED, CRT, TN, IPS, VA
  • Most PRIVATE Cloud Storage
  • Motherboard Form Factors
  • Motherboards Explained
  • MU-MIMO Explained
  • NAS vs SAN – Network Attached Storage vs Storage Area Network
  • NAT Explained – Network Address Translation
  • Network Connectors Explained
  • Network Ports Explained
  • Network Topologies
  • Networking Tools – Hardware
  • PC BIOS Settings
  • PC Motherboard Evolution
  • PING and TRACERT (traceroute) networking commands
  • PING Command – Troubleshooting Networks
  • POP3 vs IMAP – What’s the difference?
  • Port Forwarding Explained
  • Power over Ethernet (PoE) – Explained
  • Powerline Ethernet Networking Explained
  • Private Email Showdown: Proton vs Tuta vs Fastmail
  • Proxy vs Reverse Proxy Explained
  • Public vs Private IP Address
  • Quantum Computing 2024 Update
  • RAID 5 vs RAID 6
  • RAM Explained – Random Access Memory
  • Reclaim your Privacy! Ditch Android & Apple! (CalyxOS)
  • Routing Tables | CCNA – Explained
  • Should You Use Fingerprint Unlock?
  • Spanning Tree Protocol | CCNA – Explained
  • SSD vs Hard Drive vs Hybrid Drive
  • SSH explained in 2 minutes!
  • Standaardgateway uitgelegd
  • Subnets vs VLANs
  • Sudo for Windows – How to Enable it, and How to Use it
  • TCP vs UDP Comparison
  • Telnet vs SSH Explained
  • The most SECURE browser!! (testing it with malware)
  • The New BypassNRO
  • The Untold Story of C++
  • The Untold Story of Databases
  • The Untold Story of JavaScript
  • Thermal Compound Paste, Heat Sink, Air vs Water Cooling Explained
  • Traceroute (tracert) Explained – Network Troubleshooting
  • Tri-Band WiFi Router Explained
  • USB 3.0 vs 3.1 vs 3.2 vs 4.0: What’s the difference?
  • USB-poorten, kabels en connectoren
  • Vang de Man-in-the-Middle-app (Norton)
  • Vanilla OS: New, highly secure, immutable Linux distro
  • Virtual Machines vs Containers
  • Virtual Private Cloud (VPC) Explained
  • Virtualization Explained
  • VLAN Explained
  • VPN (Virtual Private Network) Explained
  • Waarom lost herstarten alles op? Vraag het aan een Microsoft-technicus!
  • Wazuh – You need this FREE CyberSecurity tool
  • What is a Chipset?
  • What is a Firewall?
  • What is a Guest Network?
  • What is a Hotspot?
  • What is a Patch Panel? (cable management)
  • What is a PoE Switch?
  • What is a Server? Servers vs Desktops Explained
  • What is an eSIM and How Does it Work?
  • What Is Ethical Hacking? Roles, Skills, and Cybersecurity
  • What is RAID 0, 1, 5, & 10?
  • What is RAID Parity?
  • What is UFS 4.0?
  • What is Virtual Memory? MMU, Page Tables, and more!
  • What is VoIP?
  • What is x86-64-v3? Understanding the x86-64 microarchitecture levels
  • Why Captchas Keep Getting More Complicated | WSJ Tech Behind
  • Why you NEED to care about privacy
  • Why Your Network Is WIDE OPEN – and How to Fix It
  • WiFi (Wireless) Password Security – WEP, WPA, WPA2, WPA3, WPS Explained
  • WIFI (wireless) Standards and Generations Explained
  • WiFi 6 Explained
  • WiFi 7 Explained
  • Windows & Linux: Dual Drive Dual Boot
  • Windows Command Line Tools
  • Your VPN won’t protect you
  • Zip & Jaz Retro Storage
  • Zorin OS 17: Linux for Windows Users

Youtube Kanalen

  • All Things Secured
  • Bright
  • Dave’s Garage
  • David Bombal
  • Eric Parker (Hacking & Security)
  • ExplainingComputers
  • Gary Explains
  • Linus Tech Tips
  • Loi Liang Yang (Hacking & Security)
  • Naomi Brockwell TV (Security & Privacy)
  • NetworkChuck
  • PowerCert Animated Videos
  • Rob Braxman Tech (Security & Privacy)
  • Roger Keijers
  • ScottiesTech.Info
  • Seytonic (Hacking & Security)
  • Sumsub (Hacking & Security)
  • TechAltar
  • TechLinked
  • Techquickie
  • The Linux Experiment
  • The PC Security Channel
  • Wie-wie-wie
  • XDA
  • ZONEofTECH
Categorieën bekijken

ICT Insight Artikelen

  • ‘Oplichters proberen simkaarten klanten KPN en Odido over te nemen’
  • [13-09-2025] ‘Overvloedig vertrouwen op ChatGPT stompt brein af en vermindert kritisch denkvermogen’
  • 10 PRIVACY TIPS
  • Amerikaanse luchtverkeersleiding werkt nog met Windows 95 en floppy’s
  • Bijna helft van organisaties betaalt losgeld bij ransomware-aanval
  • Bloomberg: Zwitsers bedrijf kan toegang krijgen tot 2FA-codes techbedrijven
  • Duitse servettenfabrikant vraagt faillissement aan na ransomware-aanval
  • European alternatives for popular services
  • Goedkope USB-C oplaadkabels zijn gevaarlijk voor je Android en iPhone
  • Google wil Gemini toegang geven tot jouw apps
  • Groot probleem met nieuwe AI-modellen: ze vertellen je meer onzin
  • Microsoft Authenticator ondersteunt binnenkort geen wachtwoorden meer
  • Microsoft gaat PowerShell 2.0 verwijderen uit Windows
  • Omstreden Europese ‘chat control’-wet staat op losse schroeven
  • Surfshark: Google Chrome verzamelt meeste data van gebruikers
  • Vaarwel C++ en C: VS zetten in op memory safe-programmeertalen
  • Voormalig Head of Security: ‘WhatsApp bevat beveiligingsproblemen die privacy van gebruikers mogelijk in gevaar brengt’
  • What are the AI privacy concerns?
  • What are the AI privacy concerns?

Idea, design & content by Arno Dorst

Simplified Setup - Ict Symbol @clipartmax.com

Powered by WordPress Theme: Azuma