Martin Brinkmann is a journalist from Germany who founded Ghacks Technology News back in 2005. Martin started his career as a tech support representative at a large German financial corporation which he used to finance his college education in English, Information Technology and History.
He quit college and his job when Ghacks began to attract a large enough readership. He made the decision to become a full time blogger and webmaster, and has not looked back since.
Martin is interested in all things tech. His primary focus is on desktop operating systems, web browsers, Internet services, and privacy related topics.
He published the book The Complete Windows 10 Privacy Guide: Windows 10 Fall Creators Update version in 2017. Martin writes a weekly column for fellow tech site Betanews as well.
Martin has been quoted or mentioned in many major online and print publications, including Forbes, Lifehacker.com, ComputerWorld, LinkedIn, Reddit, Betanews.com, Bleeping Computer, TechCrunch, PC World, Tom's Hardware, Slashdot, Hacker News, The Register, and more.
Martin's articles on Ghacks
I know that I have not been updating the proxy list for a while and I promise to do it in the near future. For now, I post a list of new […]
I don´t think a lot of my visitors are still using the Microsoft Internet Explorer but there are some that do. My first advice would be to change the browser immediatly to firefox or opera, for those who are to lazy or have other reason to keep the insecure browser the IE Proxy Changer is a nice little addition to the internet explorer.
Igowerf from the anandtech forum posted a rather large list of freeware that can replace commercial products from the same category. For example a replacement for Microsoft Office would be of course Open Office which is free to download and use. It is a great list with lots of different categories that include Office, Internet / Networking, Graphics, IDE's and editors, Audio/Mp3/CD, System tools, Video encoding/decoding/etc, 3D Modeling/Animation/etc and Misc suggestions.
Now this is an interesting analysis of password recovery speeds. It compares password length and chars used to the time different computers need to bruteforce the password, ranging from Class A (speed of a pentium 100) to Class F (supercomputers, large scale distribution) computers.
Dylan Tweney compiled a list of 101 fabulous freebies for the pcworld website. The link above leads to the category view of all freebies that dylan collected. Categories include Tune Up: Utilities and system tools, Lock It Up: Security/antispam tools, system-stabilizing utilities and Share It: File sharing and storage services. All categories include program links and a short description of the program itself. Lots of known tools but also some lesser known ones and also some services are included.
JDiskReportenables you to understand how much space the files and directories consume on your disk drives, and it helps you find obsolete files and folders. The tool analyses your disk drives and collects several statistics which you can view as overview charts and details tables. This is a great tool if you are looking for a program that analyses your hard drives content. Shows lots of useful information like which filetypes use the most space on your hard drives, file modification and folder size.
Maybe you are like me, thinking why there are so many linux distributions out there and what the differences between them are. It´s hard to make a selection, there are hundreds of distributions out there and all seem to serve a purpose. This could have been the intention of the guys who wrote the overview of the ten major linux distributions.
Well I came upon this analysis of .com domain names in this article by Dennis Forbes called Interesting Facts About Domain Names. He takes a look at .com domains only because this is the most thought after domain extension worldwide. Some interesting conclusions that he draws are that the chances of catching a two or three letter domain name are exactly zero, unless you pay a brooker for it of course and that the chances to register a short domain name start with four-letter domain names.
I´ve written about virtual computers before and found a nice way program to make the same method available for virtual software installations. Altiris Software Virtualization Solution lets you install every kind of software in a protected environment that prevents access from this software to your core system. This is great if you want to try out some new alpha / beta software or software that you are suspicious about.
It has been a long time since I wrote the first article about Disposable Email Address Services and I think it is time to update the old article with new services and get rid of dead ones. Before I start listing several websites and services that allow you to use "one-use" email addresses I will shortly explain why everyone should have at least one service at hand all the time.
I´am in a hurry because I´am moving to my new appartment today and don´t have the time to write much, because my pc of course goes with me to the new destination. I thought I post some interesting articles with a short description to keep you entertained while I´am moving.
Are you planning to purchase a new computer in the near future ? You are also someone who builds the computer on his own, someone who does not rely on retail computers that might have parts that are not the quality you demand ? The gotfrag price guide might be a good starting point if you answered both questions with yes.
UltraShredder deletes sensitive files by overwriting them with random characters, saving it to disk each time, and then bypasses the recycle bin, thus acting as your personal, portable file shredder. If the file were to be recovered by a data recovery program, they would only be able to see unintelligible characters on disk where the file used to be. The program is a great tool to destroy sensitive data, and is very small with a minute memory footprint, and makes no changes to your system whatsoever.
I know I have some freaks among my readers that like to use an usb stick to have some of their beloved applications at hand or start them from their for security reason. Wikipedia.org has a nice list of portable applications that can be run from a portable device. Every application is sorted into one of nine categories like Networking and Internet, Password management and Document editing .
XSite will load and parse any webpage into a simple structured view for displaying images, email addresses, and all links. Generate a result report that section out all the links, images, and email addresses. Easily grab all images in a web page by downloading them to a local folder. Export lists out to CSV format which makes it easy to push the information into any database.
The question that many people ask is why would someone want to surf anonymously in the first place. Why would someone who does not do something illegal want to surf anonymously at all ? I can think of lots of reasons, here are a few:
Ghacks is a technology news blog that was founded in 2005 by Martin Brinkmann. It has since then become one of the most popular tech news sites on the Internet with five authors and regular contributions from freelance writers.