Not only private individuals, but also the self-employed and companies are increasingly exposed to the dangers of cybercrime. has developed various tools that you can use to check and improve the security of your website, your accounts and your passwords.

Password Checker
With the Password Checker you can find out how secure your password is. We calculate how long a computer needs on average to crack the password. In addition, we check whether the password has been made public in the past through a data leak or a hacker attack.

Password Generator
With the password generator you can easily create a secure password. The special thing about it is that we also check whether the password has been leaked in the past. Such a password should never be used again.

Browser Privacy Check
With the Browser Privacy Check you can determine which traces you or your browser leave while surfing. The test is intended to raise awareness of which data can be used by websites and advertisers to create a profile of you or to track your activities across multiple pages.

VPN Leak Test
A VPN is often used to hide your IP address to surf anonymously on the Internet. However, a wrong configuration by the user or the VPN software can lead to a leak of the original IP address or other sensitive information. The VPN Leak Test checks if your VPN configuration leaks sensitive information.

Internet Censorship Check
In many countries of the world, governments block critical or unwanted websites. Prominent examples are China, Russia or Turkey. With the Internet Censorship Check you can find out whether a website is blocked in one of these countries.

Other languages:
More about IT-Security
VeraCrypt Guide – Safely Encrypt Files
Encrypt Your Hard Drive - Windows, Mac & External Hard Drives
HDD and SSD - How to Safely Wipe Your Hard Drive
Darknet - What Is It and How Can I Access It?
Phishing: Recognizing the Threat
How To Remove Junk Files From Your Windows PC
FIDO2 - Secure Logins Without Passwords
VPN Leak Test - Is Your Private IP Public?
Password Generator - Generate a Secure Password
Secure Messengers - The 5 Best Alternatives to WhatsApp
Data Recovery - Restoring Deleted Files
Browser Privacy Check - Which Traces Do I Leave on the Web?
Anonymous Search Engines - 3 Alternatives to Google
Password Checker - How Secure Is My Password?
Ad Blocker - How to Protect Yourself From Annoying Ads
Browser Fingerprinting - What Is It and How Can I Protect Myself?
Internet Censorship - Site Blocked in China, Russia or Turkey?
Hide IP - How to Hide My IP Address
Do Not Track - What It Is and How It Can Protect You
Cyber Attacks - 3 Current Threats and Countermeasures
Data Theft: What Is It? How Can I Protect Myself?
Data Breaches - What Is a Data Leak? Have You Been Affected?
Anonymous Browsing - How to Surf Anonymously Online
Anonymity Online: Tor and the Tor Browser
Email hacked? How To Find Out if Your Email Has Been Hacked
Internet Pitfalls - The 7 Biggest Dangers Online
Identity Theft on The Web – How To Protect Yourself
Doxing - What It Is and How You Can Protect Yourself
How To Change Your IP Address - 3 Simple Ways
Privacy Browsers: The Best Browsers for Maximum Security
Best VPN - Review of 22 VPN Providers
Manage Passwords - Best Way to Store Passwords
Two-Factor Authentication - This is how you secure your accounts
Best Password Manager - 12 Tools Reviewed
Secure Password - What Makes a Strong Password?
Best Cloud Backup - 7 Online Backup Providers Reviewed
Best Antivirus Software - 16 Programs Reviewed