Warenkorb-Rabatt
Enthält alle Produkte die für den Warenkorbrabatt zugelassen sein soll. Meistens alle außer Lootbox.
Computer owners and manufacturers shamelessly flaunt what's hidden inside the casing, and anyone who invests a lot of money in a new microprocessor...
View full detailsNeed some help with an everyday problem? Then summon Mr. Meeseeks! Simply teleport into a famous TV series about a scientist and his grandson, grab...
View full detailsWhen it comes to charms, we nerds usually think of powerful spells in pen-and-paper games, the counterpart to the Strange Quark or simply a certain...
View full detailsYes, we all know the stereotype: nerds don't like to party and would even spend their birthday in front of the computer instead of going out with f...
View full detailsProgrammers who use pointers should be careful because they aren't far away from hell ;) At least that's what the 2nd of the 10 commandme...
View full detailsLinux - The choice of the GNU generation
Your computer doesn't do the things you want him do to? You don't have a backup of your important files and your harddisk makes silly noises? The F...
View full detailsTrue story."Look, Mum, with the new router you don't need cables anymore! Now you can use WLAN in the whole house"."So can I wr...
View full detailsAt least in theory, we nerds should not have problems with curfews, right? After all, we usually spend the majority of our time at home in front of...
View full detailsAs a nerd, one needs to be careful. One small mishap, one mistake and the whole disguise of a friendly and harmless computer guy can come crumbling...
View full detailsDid you know that you can make a lot of money with compression? And we’re not talking about the inventors of WinRAR (who are most likely still wait...
View full detailsWhat's the trick behind all the software and where does it come from? That's what we asked ourselves and then we went on a investigation....
View full detailsSometimes a simple card game is the best pastime. You know, those times when you're forced to de-digitise, or because of those slow university or w...
View full detailsDifferent accessories for your Raspberry Pi enable new possibilities:- <b>Cases</b>Available in two versions: white, and transparent. D...
View full detailsTo understand recursion, you first have to understand recursion.
At some point, there has to be an end to the stupid "Connection reset by peer"
It's not enough for talented coders to write their own code, they try to analyze other programs and hardware too! For example, they'll wr...
View full detailsAn answer to every single newbee question... Now you do not even have to make the effort to open your mouth!For those who do not know (and are afra...
View full detailsIf one were to believe the genre legends Run DMC, hip-hop really does have one thing in common with informatics: It's tricky! While the trio of Run...
View full detailsWho remembers the good old times when you had to choose between Internet and talking on the phone? The Dial-up connection needed the modem and ever...
View full detailsWe all know it: e-mails with incorrect encoding, in which the German special characters are once again displayed incorrectly. We can only be glad t...
View full detailsIn the mid-nineties, a dream came true and, thanks to graphic boards, virtual food looks a lot better and more tasty now! But it doesn't matte...
View full detailsThe main assumption of the computer and network security principle "security by obscurity" is that a system cannot be compromised if nobody on the ...
View full detailsWithout words.
Uh Oh...Moments where you do not want to be the database admin...
To be or not to be, that is the question.2b, or not 2b, that is the question./(bb|[^b]{2})/ We knew it: coders are poets. If only Shakespeare had b...
View full detailsFor the code monkeys among you ;-)
It is surprisingly easy to hack into other computer systems, often a simple phone call does the trick: "Hello, I am your system administrator. I ne...
View full detailsThis quote from Linus hits the nail on the head :)
Nature sometimes takes strange paths: recent research has shown that homo sapiens no longer marks the end of evolution. From now on, homo geekensis...
View full detailsImagine that you’ve just created a model that allows different technical systems to communicate with each other and that features different layers ...
View full detailsThe (almost exclusively jokingly used) eighth layer of the OSI model for network protocols is a nice way of saying that the problem lies with the p...
View full detailsWith this huge mousemat, you'll be perfectly equipped for the next space battles on your PC. The Mandalorian Boba Fett XL Mousemat offers enough sp...
View full detailsBasically, programming has a lot in common with Lego: on the one hand, it's worth starting at a young age (keyword: practice makes perfect), and on...
View full detailsBasically, programming has a lot in common with Lego: on the one hand, it's worth starting at a young age (keyword: practice makes perfect), and on...
View full detailsThe back says ACK.SYN/ACK are the "commands" that the TCP/IP protocol uses to establish every connection.