Martin Brinkmann is a journalist from Germany who founded Ghacks Technology News back in 2005. Martin started his career as a tech support representative at a large German financial corporation which he used to finance his college education in English, Information Technology and History.
He quit college and his job when Ghacks began to attract a large enough readership. He made the decision to become a full time blogger and webmaster, and has not looked back since.
Martin is interested in all things tech. His primary focus is on desktop operating systems, web browsers, Internet services, and privacy related topics.
He published the book The Complete Windows 10 Privacy Guide: Windows 10 Fall Creators Update version in 2017. Martin writes a weekly column for fellow tech site Betanews as well.
Martin has been quoted or mentioned in many major online and print publications, including Forbes, Lifehacker.com, ComputerWorld, LinkedIn, Reddit, Betanews.com, Bleeping Computer, TechCrunch, PC World, Tom's Hardware, Slashdot, Hacker News, The Register, and more.
Martin's articles on Ghacks
This has been around for some days but its still worth an article. Myspace users have the option to hide their comments and friendlist from other users. With an easy workaround it´s possible to view them even though the user did activate the hidding feature.
A study conducted by Professor Martin Gill of the University of Leicester came to the conclusion that second hand computers pose a great risk of fraud and identity theft. They purchased six computers in the course of their study from various second hand channels. Six computers may not seem to justify the results but it can be seen as an indicator. Half of them had not been securely wiped while one had not been wiped at all. Two of the three contained enough information for identity theft.
Most people tend to use passwords that they can rememeber easily. If you take a deeper look many use the same password for most of their password protected activities which is a high security risk. Break one, get access to all.
Everton from connectedinternet.co.uk compiled a list of ten firefox extensions that don´t get glamorised that much. The list includes some extensions that I never heard before, like the Colorful Tabs Extension. Make sure you head over to his site and take a look at the compilation.
The c-64 was my first computer. I had an atari 2600 before and it seemed like a quantum leep at that time. The C-64 had many classic games that I enjoyed playing: Archon, Boulder Dash and Pirates for instance. You know have the chance to play some of the alltime classics of that era in your browser. The website c64s.com is the Eldorado for everyone who wants to play that classic games again or take a look at games of a time long forgotten.
I´am cautious when I read another article that claims to speed up your windows operating system by simply tweaking some settings in the registry. I learned the hard way that your os sometimes becomes unstable and you will have to restore it or do a fresh install. The article "Make your windows fast as never before" is one of those articles that makes this claim.
Sometimes you delete something and realize later that you still need the file(s) that you´ve deleted before. Its easy to recover them if they are still in your trashbin, but you need special tools to recover files that have been deleted permanently under windows.
Lets assume your system has been hacked. What steps would you undertake after the hacking attempt ? The article written at techtarget.com tries to answer the question and presents a checklist of things to do after being someone hacked into your system. Its more of a checklist for corporate networks than for individual computers but it would not hurt to take a look and probably get some new ideas that you did not think about.
The free ftp software Smart Ftp 2.0 has been released and is available for download at the developers website. Changes include a new graphical user interface with tabs, a new local and remote browser and support for 64 bit windows operating systems. If you are looking for a free ftp program give it a try, it might be exactly what you are looking for.
Phishing, which is a construct of the words Password and Fishing, becomes more and more common on the internet. Many people recieve daily mails from sites like ebay and paypal but also from financial sites like citibank that look authentic and direct you to a website that looks like a copy of the original site. They "phish" your login data or credit card information from that fake website.
Searchenginewatch published a rather large article about protecting your search privacy today. They provide a step-by-step guide how your search privacy gets exposed from your desktop to the sites you visit. They divided the article into six chapters beginning with Search Privacy On Your Own Computer and ending with a conclusion that gives you valuable tips on how to protect your search privacy.
When I tried to switch for the first time from windows to linux I felt left alone. The web was not what it now uses to be, tutorials and help documents were scarce and one had to have a friend who could help or try the trial and error way to get linux installed and configured. Linux is becoming more user friendly and lots of tutorials and help sites pop up that help beginners and guide them through the basic installation and configuration process.
I posted yesterday an article about tracing an hacker, today I give you one about tracing an email. The first thing you have to do is to enable email headers. The site shows you how to do so using gmail, yahoo and msn. All software products should support this feature as well. Email Headers show you additional information about the email, for example a ip is shown.
This is a nice beginners tutorial that tells you how to trace people who try to break into your computer. It covers lots of explanations to questions like "How do these people find their victim?" and "What the phrases TCP/UDP actually mean".
If this topic did not catch your attention at once then none will. Dr. Charles Gerba from the university of Arizona found out in a study that measured normal bacterial levels inside offices across America that the average desk harbors 400 times more bacteria than the average toilet seat.
Many of you told me that I should create a new list of websites that are running webproxies. Today I finally had the time to compile this new list, hope everyone is satisfied with the result.
Maybe it´s a good start to explain why someone would need a webproxy ( or a proxy ). Some countries, for example china, iran and germany, ban certain websites and you can´t view them using your normal internet connection. A proxy on the other hand could be able to display the website correctly and you recieve all the information you want to access.
Freeware: I always try to use freeware or open source software whenever its possible. 100-downloads.com lists 100 of the best on their page listed neatly in categories like audio, imaging and security. They list lots of freeware tools that I´am using and some that I did not know about and will definatly try out.
Ghacks is a technology news blog that was founded in 2005 by Martin Brinkmann. It has since then become one of the most popular tech news sites on the Internet with five authors and regular contributions from freelance writers.