Guidelines

To get started with cryptocurrencies, it is always helpful to have some guidelines. Therefore, we want to provide you with basic and advanced guidelines to help you get started.

Latest Articles related to Guidelines

Generate Passive Income Cryptocurrencies
How To Generate Passive Income with Cryptocurrencies!

Generating passive income with cryptocurrency is an effective way of making money today. There are several ways to achieve this, which merely require you to park your crypto assets and reap significant returns on them.

CAKEDEFI
CAKEDEFI – put your cryptocurrencies to work

CakeDefi is a brand-new Singapore-based crypto platform that allows users to generate new cash flow from their otherwise not very productive cryptocurrency holdings. And to make things even better, it is exceptionally user-friendly, operates with utmost transparency, and is powered by DEFICHAIN. So, let’s find out what you can do to put your cryptos to work for you!

tax aspects of airdrop and bounties
General tax aspects of airdrop and bounties

Airdrops and bounties have been a common means of marketing since the rise of public blockchains to draw existing user groups' attention to new products and reward them for doing so.

Bitpanda – An introduction to Europe’s leading crypto broker

Bitpanda has become one of the most prominent players in the realm of secure and reliable cryptocurrency exchanges. But of course, this didn’t happen overnight. It all began back in 2014 in Vienna, Austria when the company was known as Coinimal.

MyEtherWallet: A small introduction

MyEtherWallet is a free open-source project. It provides the user with an interface for the Ethereum blockchain. Through this interface to the ETH Blockchain, it is possible to gain an insight into the transactions made there.

MetaMask: A small introduction

MetaMask is a worldwide popular, secure, and free browser extension that web applications can use to interact with or even read, the Ethereum blockchain. MetaMask also includes a key deposit and an Ethereum wallet for managing ETH-based crypto assets.

How to spot a Scam
How to spot and avoid a cryptocurrency and ICO scam?

Since the last major cryptocurrency bull run in 2017, the global ICO scene exploded. And with it came a plethora of fake crypto and blockchain projects, all with the goal of getting rich while ripping off unsuspecting customers.

Types of Crypto Scams
Crypto Scams: How people want to trick you

The crypto space. A great place to make a fortune but also a way to lose everything again. That’s why you must always be vigilant. Unfortunately, many newcomers to the industry neglect their own due diligence and rely far too much on the influence of social media, and don't have a deeper look into projects.

Cryptocurrencies & Security: The Basics
Cryptocurrencies & Security: The Basics

Anyone who deals with cryptocurrencies has probably already asked themselves about security overall and how to secure their investment and protect it from scammers and hackers.

Bitcoin
Bitcoin: A peer-to-peer electronic cash system

When the world experienced one of the biggest financial crises, confidence in centralized financial organizations declined. The mistakes made by these organizations led to major consequences for which we all had to pay the price. The foundations for Bitcoin were laid.

Where are my token?
Where are my token?

All of us, who participate in crypto airdrops regularly have made this experience before. You research for a few hours and find the perfect project with a great new airdrop. You follow all their instructions and then you wait for distribution, but nothing happens…

How to Airdrop?
How to do airdrops?

During our AirdropBob Giveaway, we noticed a load of users providing the wrong social media information. Therefore, we decided to create this small tutorial

Cryptocurrency Wallets
Cryptocurrency Wallet: Safe ways to store your crypto

We are often asked the question of how to keep your cryptocurrencies safe. Therefore we have created an overview of cryptocurrency wallet types. We have graded them with the following factors: Security, Usability and Costs.