🍋
Menu
61 guides

Guides

How-to tutorials, format comparisons, best practices, and troubleshooting tips.

How-To Beginner
Featured

How to Check if Your Password Has Been Compromised

Data breaches expose millions of passwords regularly. Learn how to check whether your credentials have been leaked without risking further exposure, using k-anonymity-based services and local hash comparison.

How-To Beginner
Featured

How to Generate Strong Random Passwords

Password generation requires cryptographic randomness and careful character selection. This guide covers the principles behind strong password generation, entropy calculation, and common generation mistakes to avoid.

Comparison Beginner

Password Managers Compared: Features That Matter

A password manager is the single most impactful security tool for most people. This comparison covers the key features to evaluate when choosing a password manager for personal or team use.

How-To Beginner

How to Create QR Codes for Wi-Fi Networks

Wi-Fi QR codes let guests connect to your network instantly by scanning with their phone camera. This guide covers the Wi-Fi QR format, security considerations, and best placement practices.

How-To Beginner

How to Strip EXIF Metadata From Photos for Privacy

Photos contain hidden metadata including GPS coordinates, device info, and timestamps. Before sharing photos online, learn how to remove this data to protect your privacy and prevent location tracking.

Best Practice Beginner

Encryption Best Practices for Personal Data

Encryption protects your data from unauthorized access, whether stored on your devices or transmitted over the internet. This guide covers practical encryption strategies for personal data protection.

Troubleshooting Beginner

Troubleshooting Random Number Generation Issues

Incorrect random number generation causes security vulnerabilities, biased results, and non-reproducible tests. This guide covers common RNG pitfalls and how to verify your random numbers are truly random.

Comparison Beginner

Hash Functions Compared: MD5, SHA-1, SHA-256, and Beyond

Hash functions are used for file integrity, password storage, and digital signatures. This comparison covers the most common algorithms, their security status, and when to use each one in modern applications.

Comparison Beginner

Two-Factor Authentication Methods: TOTP, WebAuthn, and SMS

Two-factor authentication (2FA) adds a critical layer of security beyond passwords. This guide compares TOTP apps, hardware security keys, SMS codes, and passkeys to help you choose the strongest protection.

How-To Beginner

How to Check If Your Email Has Been Breached

Data breaches expose billions of email addresses and passwords. Learn how to check if your accounts are compromised and what to do about it.

How-To Beginner

How to Generate Secure Passphrases

Passphrases are easier to remember than random passwords while being equally secure. Learn how to generate strong, memorable passphrases.

Comparison Beginner

VPN vs Tor vs Proxy: Privacy Tools Compared

VPNs, Tor, and proxies all hide your IP address but differ in security, speed, and privacy guarantees. Compare them for your threat model.

Best Practice Beginner

QR Code Security and Phishing Prevention

Protect against QR code phishing attacks and implement secure QR code practices for businesses and consumers.

Best Practice Beginner

Data Privacy Best Practices for Online Tools

Using online tools means trusting them with your data. Learn how to evaluate tool privacy and protect sensitive information.

How-To Beginner

How to Password-Protect a PDF

Learn how to encrypt PDFs with passwords to control who can open, edit, print, or copy content from your documents.

How-To Beginner

How to Audit Your Digital Privacy Settings

Review and tighten privacy settings across browsers, social media, mobile devices, and cloud services.

Best Practice Beginner

Secure File Sharing Best Practices

Share sensitive files securely using encryption, expiring links, password protection, and access controls.

Best Practice Beginner

Cookie Consent and GDPR Compliance for Websites

Implement compliant cookie consent banners and data privacy practices for GDPR, CCPA, and global regulations.

Comparison Beginner

SHA-256 vs SHA-3 vs BLAKE3: Hash Function Comparison

Hash functions are fundamental to security and data integrity. Compare the performance, security, and use cases of modern hash algorithms.

Best Practice Beginner

Browser Privacy Settings: A Comprehensive Configuration Guide

Modern browsers offer extensive privacy controls that most users never configure. Learn which settings to enable, which extensions to install, and what tradeoffs to expect.

How-To Beginner

Browser Security Features You Should Know

Understand built-in browser security features including sandboxing, HTTPS indicators, and permission controls.

How-To Beginner

EXIF Data Privacy: What Your Photos Reveal

Understand what metadata your camera stores in photos and how to strip it before sharing for privacy protection.

Comparison Beginner

Hash Generator Selection Guide

Choose the right hash algorithm for checksums, passwords, content addressing, and data integrity verification.

Best Practice Beginner

Understanding End-to-End Encryption

End-to-end encryption ensures that only the sender and recipient can read messages. Learn how it works, what it protects against, and its limitations.

Best Practice Beginner

PDF Security Best Practices for Business Documents

Business documents often contain sensitive information. Learn how to secure PDFs with encryption, redaction, and metadata removal.

Best Practice Beginner

Privacy-First Password Management Best Practices

Implement strong password hygiene using password managers, MFA, and zero-knowledge architecture.

Best Practice Beginner

URL Encoding Best Practices for Web Developers

Proper URL encoding prevents broken links and security vulnerabilities. Learn which characters must be encoded and how to handle international URLs.

Comparison Beginner

Privacy-First Analytics: Alternatives to Google Analytics

Google Analytics collects extensive user data and requires cookie consent banners in the EU. Learn about privacy-respecting alternatives that provide useful insights without tracking individuals.

Best Practice Beginner

Secure Random Number Generation: When Math.random() Isn't Enough

Math.random() is fine for shuffling a playlist but dangerous for passwords, tokens, and cryptographic applications. Learn when and how to use cryptographically secure random generators.

Comparison Beginner

VPN vs Proxy vs Tor: Privacy Tool Comparison

Compare VPNs, proxy servers, and the Tor network for different privacy and security needs.

How-To Beginner

Browser Privacy Settings: Essential Configuration Guide

Configure your browser for maximum privacy while maintaining website compatibility.

Best Practice Beginner

HTTP Header Security Best Practices

Configure security headers including CSP, HSTS, X-Frame-Options, and permissions policy for web applications.

How-To Beginner
Featured

Password Strength Analysis: How Strong Is Your Password Really?

Learn the science behind password strength meters and entropy calculations. Understand what makes a password truly secure, how attackers crack weak passwords, and practical strategies for creating memorable yet unbreakable credentials.

Comparison Beginner
Featured

Two-Factor Authentication Methods Compared: TOTP, SMS, and Hardware Keys

Compare the security, convenience, and cost of major 2FA methods including authenticator apps, SMS codes, hardware security keys, and biometrics. Find the right balance between protection and usability for your accounts.

Comparison Beginner
Featured

Encryption Algorithms Compared: AES, ChaCha20, and RSA Explained

Understand the differences between symmetric and asymmetric encryption, when to use AES-256 vs ChaCha20-Poly1305, and how RSA fits into modern cryptographic systems. A practical guide for non-cryptographers making security decisions.

How-To Beginner

How to Generate Secure Random Passwords

Weak passwords remain the leading cause of account compromises. This guide explains the principles behind cryptographically secure password generation and how to create strong, memorable passwords for different use cases.

How-To Beginner

How to Share Files Securely: A Complete Privacy Guide

Step-by-step guide to sharing sensitive files without exposing your data to third parties. Covers client-side encryption, secure link generation, expiring downloads, and zero-knowledge file transfer services.

Best Practice Beginner

Digital Privacy Checklist: 15 Steps to Protect Your Online Identity

A comprehensive checklist covering browser settings, account security, device configuration, and data hygiene practices. Prioritized by impact — start with the highest-value actions and work through systematically.

How-To Beginner

WiFi QR Codes: Connecting Guests Without Sharing Passwords

WiFi QR codes let guests connect to a network with a single scan, eliminating the need to dictate complex passwords. The encoding format is standardized and supported natively by iOS and Android camera apps.

Best Practice Beginner

Event Ticket QR Codes: Generation, Validation, and Security

QR codes on event tickets must balance ease of scanning with resistance to duplication and fraud. A well-designed ticket QR system validates entry in under one second while preventing unauthorized copies.

Comparison Beginner

VPN vs Proxy vs Tor: Which Privacy Tool Should You Use?

Compare VPNs, proxy servers, and the Tor network across speed, anonymity, cost, and use cases. Understand the threat models each tool addresses and when to combine them for maximum privacy.

Best Practice Beginner

Secure Password Generation: Algorithms and Best Practices

Explore the cryptographic random number generators behind secure password creation. Learn why Math.random() is never sufficient, how CSPRNG works, and the best practices for generating passwords in the browser.

How-To Beginner

Archive Format Guide: ZIP, TAR, 7z, and RAR Compared

Compare archive formats for compression ratio, speed, encryption, and cross-platform compatibility. Understand the difference between archiving and compression, and when each format excels.

Troubleshooting Beginner

How to Block Cookies and Trackers Without Breaking Websites

Practical guide to configuring cookie and tracker blocking that protects your privacy without causing website breakage. Covers browser settings, extension configuration, and troubleshooting common issues.

How-To Beginner

End-to-End Encryption: How It Works and Why It Matters

A clear explanation of end-to-end encryption for non-technical users. Understand key exchange, the Signal protocol, and why E2EE prevents service providers from reading your messages.

Best Practice Beginner

Secure Messaging Apps Compared: Signal, WhatsApp, Telegram, and More

An objective comparison of popular messaging apps focusing on encryption protocols, metadata handling, open-source status, and jurisdiction. Understand the real-world security differences beyond marketing claims.

Best Practice Beginner
Featured

Password Strength and Generation: A Security Guide

Weak passwords remain the leading cause of account breaches. This guide covers password entropy calculation, generation strategies, and storage best practices.

How-To Beginner

Privacy-Focused Browser Settings: A Configuration Guide

Detailed configuration guides for Firefox, Chrome, Safari, and Brave with specific settings to maximize privacy while maintaining usability. Includes about:config tweaks and extension recommendations.