Martin Brinkmann is a journalist from Germany who founded Ghacks Technology News back in 2005. Martin started his career as a tech support representative at a large German financial corporation which he used to finance his college education in English, Information Technology and History.
He quit college and his job when Ghacks began to attract a large enough readership. He made the decision to become a full time blogger and webmaster, and has not looked back since.
Martin is interested in all things tech. His primary focus is on desktop operating systems, web browsers, Internet services, and privacy related topics.
He published the book The Complete Windows 10 Privacy Guide: Windows 10 Fall Creators Update version in 2017. Martin writes a weekly column for fellow tech site Betanews as well.
Martin has been quoted or mentioned in many major online and print publications, including Forbes, Lifehacker.com, ComputerWorld, LinkedIn, Reddit, Betanews.com, Bleeping Computer, TechCrunch, PC World, Tom's Hardware, Slashdot, Hacker News, The Register, and more.
Martin's articles on Ghacks
Yesterday IÂ´ve written a short tutorial about streamripping and one of the questions that occured was if its possible to rip real audio music as well. Today i present a guide on how to rip the real audio format.
Rapid leech is a fine server script that is able to download files from sites like rapidshare using a server instead of your home connection which speeds up the download process. You need of course a server to install the script and run it from there.
Streamripping means saving mp3 files from internet radio streams to your hard drive. All you need is the right tool that does the work for you and your favorite radio station that broadcasts on the internet and uses a format supported.
This article will give you a tutorial on how to start streamripping and legally download all the latest mp3 files to your computer. I canÂ´t speak for all countries though so you better check out if recording music from radio is legal in your country.
Picostick is only 6K in size, making it one of the smallest windows applications ever. It is a small post-it-note utility in your Windows(tm) taskbar icon tray. It is easy to use, come with striking color, and will not clutter your computer screen at all.
This one is pretty useful, its called SilentNight Micro CD/DVD/ISO/AUDIO Burner. The tool is just above 1 Mb in size and fits easily on and can be run from a single floppy disk. There is no installation required, just unpack and run the tool, makes it ideal for mobile usage as well.
It has come to our attention that World of Warcraft Hackers already are using Sonys Rootkit Software to hide their hacking from Blizzards Warden Client.
We reported earlier this week that some Music Cds by Sony labeled "Content enhanced & protected" would bring up an installation program when the music cd was put into a personal computer.
If you ever had the problem that you needed a good graphics suite and always thought the Adobe Photoshop line of products was far to expensive then GIMP might be the right software for your. The biggest advantage, its completely free, you donÂ´t pay a dime for it.
And another player joins the rangs of the companies that might install spyware with their Music Cds when you put them into your pc drives. "Fontana Distribution, part of Universal Music Group and distributors for Upstairs Records Inc., are encouraging the independent records labels they distribute to use content protection on their CDs. "Twelve Eighteen", featuring the hit song "Summer Nights", carries the same content protection currently being used by Sony BMG.
John Lopez of Upstairs Records commented: "we are very pleased with the seamless production of the album. The media player on the CD has a good user experience and we intend using the technology on more new releases."
Most banks in Europe offer a new service on their internet pages. When a user has to enter his login data he has the option to enter the password using a keypad that is displayed on the screen using a java applet. The user then clicks on the numbers and they appear in the password field. This is done to prevent the keylogging of the password.
The Anti-Keylogger does the same thing, only difference is, that its a tool that is started like every other windows program. After the tool is started you simply use the displayed keys to enter your passwords or other data on websites or even local programs.
The great advantage of Poxy is that the site itself has no ads, no popups and all those other nasty stuff that most online proxies seem to have these days.
A few minutes ago I read a news article written by Brian Krebs who described how some Sony Music Cds try to install a software on pcs that could be labeled as spyware.
It seems that we have reached a new level in the fight between the record companies and its consumers. If you put a music cd in question into your drive a installer will popup. If you agree to install the software you wonÂ´t find a uninstall feature anywhere on your pc.
Apparently all Music Cds labeled "Content enhanced & protected" have the installer on the CD, make sure you check this before you buy a cd you would want to hear using your pc.
The guys at neowin.net posted an article on how to find out if a recovery cd is in fact a normal windows xp version labeled recovery version.
The process involves a total of eleven steps, starting with the creation of the cd structure and the movement of the files needed to later burn them to a new cd.
I found a website that tests the ability of your pc to run a certain game. They have most newly released and soon to be released games in their list, e.g. Age of Empires III and Civilization IV.
The National Security Agency offers Operating System Guides on their websites. These guides are currently being used throughout the government and by numerous entities as a security baseline their systems.
Everything you do on the net transmitts your Ip Address. If you chat with someone he could easily find it out, if you write an email the information will be transmitted with the email.
The article describes what the IP reveals about the user behind.
I thought this would be of interest to some of you. Watchfilms.com are offering more than 300 movies on their website that you can watch for free.
The movies are divided into six categories: Movies, Cartoons, Documentaries, Newsreels, Commercials and Short Films. Most films are black and white movies from 1930-1950.
This article describes how search engines work, how the data is processed, how search results are generated. It also describes most of the advanced search operators available today.
Process Patrol allows you to manage the Windows processes on your computer. You can set stop lists for spyware, adware, and virus programs that will be automatically killed. Program files are renamed to prevent restarts.
Ghacks is a technology news blog that was founded in 2005 by Martin Brinkmann. It has since then become one of the most popular tech news sites on the Internet with five authors and regular contributions from freelance writers.