Skip to content
[13-09-2025] AI Agents, Clearly Explained
[13-09-2025] AI Firewalls are here! (Can your firewall do this?)
[13-09-2025] How I Use this INSANE A.I. Tool to Sound Like Morgan Freeman
[13-09-2025] Wordt ransomware nu door kunstmatige intelligentie gegenereerd?
12 Privacy & Security Tools I Use EVERY DAY
2.4 GHz vs 5 GHz WiFi: What is the difference?
3 Levels of WiFi Hacking
32 bit vs 64 bit
4 CRITICAL Places to Use a YubiKey (beyond an email account)
40 Windows Commands
5 Tips to Help You Learn Windows PowerShell
50 macOS Tips and Tricks Using Terminal (the last one is CRAZY!)
60 Linux Commands you NEED to know
A VM inside a VM inside a VM – Nested Virtualized Explained!
All Power Supply Cable Types EXPLAINED
APIPA Explained – Automatic Private IP Addressing
Are VPNs even safe now? Hacker Explains
ARP
Best Linux Distributions for 2024
BIOS VS UEFI
Bluetooth vs WiFi – What’s the difference?
Bob Ross – Eiland in het Bos (Seizoen 29 Aflevering 1)
Can a webpage be malware?
Can Hackers find you?
Can you trust Proton Mail after the logging and arrests?
CDN – Content Delivery Network – Uitgelegd
Choosing Your First Linux Distro
Chrome OS Flex: Installing Linux Apps & 4 Month Review of Google’s New PC OS
Circuit Switching vs Packet Switching
Cloud Computing Explained
Cloudbrowser – The most SECURE browser!! (testing it with malware)
Collision Domain vs Broadcast Domain
CPU Cache Explained – What is Cache Memory?
CPU, GPU…..DPU?
CSMA/CD and CSMA/CA Explained
Cyber Security: Protecting Online Accounts
Data Packets – How does the internet send data?
DDoS Attack Explained
Default Gateway
DHCP Explained – Dynamic Host Configuration Protocol
DMZ
DNS Records Explained
Docker Compose will BLOW your MIND!! (a tutorial)
Docker networking is CRAZY!! (you NEED to learn it)
Does a Fast WiFi Router make your Internet Speed Faster?
Don’t Use Google For Photo Backup!
Draadloos toegangspunt versus Wi-Fi-router
Drive Cloning & Imaging
Ethernet Cables, UTP vs STP, Straight vs Crossover, CAT 5,5e,6,7,8 Network Cables
Every CPU Architecture Explained in Detail
Explaining Audio File Formats (audioformaten)
Explaining Display Connectors: HDMI, DisplayPort, USB-C, DVI, VGA & Thunderbolt
Explaining Edge Computing
Explaining Image File Formats (afbeeldingsformaten)
Explaining Motherboard Chipsets
Explaining RAM
Explaining USB: From 1.0 to USB4 V2.0 (USB varianten uitgelegd)
Explaining Wi-Fi: 802.11 Standards & Generations (wifi uitgelegd)
FAT32 vs exFAT vs NTFS – Windows File Systems
Flipper Zero vs “Proper” Hacking Tools
GRATIS beveiligingstools die IEDEREEN zou moeten gebruiken
Half Duplex vs Full Duplex
HDMI, DisplayPort, DVI, VGA, Thunderbolt – Video Port Comparison
Host your own HelpDesk
How a DNS Server (Domain Name System) works
How Do CPUs Work?
How Email Works
How FAST is your storage? SSD speed, M.2 performance and more
How Security Keys work (2FA explained!)
How Smartphones Shrink Our Brains
How To Access the DARK WEB in 2024 (3 Levels)
How to be Invisible Online (and the hard truth about it)…
How to tell if your PC is hacked: Intro to System Forensics
Hub, switch en router uitgelegd – Wat is het verschil?
Hyper Threading Explained
I Tested 11 VPNs For 30 Days – Here Are The Best
I Tested 5 Secure Email Providers (THIS is the best Gmail alternative)
Incremental vs Differential Backup, & Full – Explained
Internet Bandwidth (speed) Explained
IP Address – IPv4 vs IPv6 Tutorial
IPCONFIG Explained – Flush DNS Cache
IPsec Explained
Je telefoon luistert niet, dit is wat er werkelijk gebeurt
Kan Meta WhatsApp lezen?
Kdenlive 24: Free & Open Source Video Editor
LAN, WAN, SUBNET – EXPLAINED
Layer 2 vs Layer 3 Switches
Learning Docker is HARD!! (this makes it easy)
Let’s subnet your home network // You SUCK at subnetting // EP 6
LibreOffice vs Microsoft: The Document War
MAC-adres uitgelegd
Mesh Wifi Explained – Which is the best? – Google Wifi
Modem vs Router – What’s the difference?
Monitors Explained – LCD, LED, OLED, CRT, TN, IPS, VA
Most PRIVATE Cloud Storage
Motherboard Form Factors
Motherboards Explained
MU-MIMO Explained
NAS vs SAN – Network Attached Storage vs Storage Area Network
NAT Explained – Network Address Translation
Network Connectors Explained
Network Ports Explained
Network Topologies
Networking Tools – Hardware
PC BIOS Settings
PC Motherboard Evolution
PING and TRACERT (traceroute) networking commands
PING Command – Troubleshooting Networks
POP3 vs IMAP – What’s the difference?
Port Forwarding Explained
Power over Ethernet (PoE) – Explained
Powerline Ethernet Networking Explained
Private Email Showdown: Proton vs Tuta vs Fastmail
Proxy vs Reverse Proxy Explained
Public vs Private IP Address
Quantum Computing 2024 Update
RAID 5 vs RAID 6
RAM Explained – Random Access Memory
Reclaim your Privacy! Ditch Android & Apple! (CalyxOS)
Routing Tables | CCNA – Explained
Should You Use Fingerprint Unlock?
Spanning Tree Protocol | CCNA – Explained
SSD vs Hard Drive vs Hybrid Drive
SSH explained in 2 minutes!
Standaardgateway uitgelegd
Subnets vs VLANs
Sudo for Windows – How to Enable it, and How to Use it
TCP vs UDP Comparison
Telnet vs SSH Explained
The most SECURE browser!! (testing it with malware)
The New BypassNRO
The Untold Story of C++
The Untold Story of Databases
The Untold Story of JavaScript
Thermal Compound Paste, Heat Sink, Air vs Water Cooling Explained
Traceroute (tracert) Explained – Network Troubleshooting
Tri-Band WiFi Router Explained
USB 3.0 vs 3.1 vs 3.2 vs 4.0: What’s the difference?
USB-poorten, kabels en connectoren
Vang de Man-in-the-Middle-app (Norton)
Vanilla OS: New, highly secure, immutable Linux distro
Virtual Machines vs Containers
Virtual Private Cloud (VPC) Explained
Virtualization Explained
VLAN Explained
VPN (Virtual Private Network) Explained
Waarom lost herstarten alles op? Vraag het aan een Microsoft-technicus!
Wazuh – You need this FREE CyberSecurity tool
What is a Chipset?
What is a Firewall?
What is a Guest Network?
What is a Hotspot?
What is a Patch Panel? (cable management)
What is a PoE Switch?
What is a Server? Servers vs Desktops Explained
What is an eSIM and How Does it Work?
What Is Ethical Hacking? Roles, Skills, and Cybersecurity
What is RAID 0, 1, 5, & 10?
What is RAID Parity?
What is UFS 4.0?
What is Virtual Memory? MMU, Page Tables, and more!
What is VoIP?
What is x86-64-v3? Understanding the x86-64 microarchitecture levels
Why Captchas Keep Getting More Complicated | WSJ Tech Behind
Why you NEED to care about privacy
Why Your Network Is WIDE OPEN – and How to Fix It
WiFi (Wireless) Password Security – WEP, WPA, WPA2, WPA3, WPS Explained
WIFI (wireless) Standards and Generations Explained
WiFi 6 Explained
WiFi 7 Explained
Windows & Linux: Dual Drive Dual Boot
Windows Command Line Tools
Your VPN won’t protect you
Zip & Jaz Retro Storage
Zorin OS 17: Linux for Windows Users