Author Archive | Martin Brinkmann

hardware keylogger

This little device has apparently been used to pull of one of the greatest bank heist in history. You attach this device to the keyboard cable at the back of the pc and it´s able to record 130000 keystrokes. The bank robbers installed this device inside the bank and got access to Sumitomo Bank's wire […]


bank secure website

I don´t know a single large bank that does not offer its customers a way to use a website to do their transactions. There is unfortunatly no single standard set for bank websites and many companies tend to misjudge the importance of a secure website. The Secure Web Bank website did take a look at […]


More and more people use their computer to record tv shows by simply installing a tv card into it and connecting the computer to the tv signal. The only problem they are now facing is that everything will be recorded and everything includedes those unnecessary commercials. The freeware application cbreak helps you to remove those […]


Flickr.com is a online photo service that allows users to upload, download, view and share pictures. One bad thing about it is that flickr itself does not offer a option to view or download more than one image at a time.


GMail Drive is a Shell Namespace Extension that creates a virtual filesystem around your Google Gmail account, allowing you to use Gmail as a storage medium.


protwall block ip addresses

Protowalls sole purpose is to run as a system friendly background task (aka using little ressources) that blocks IP addresses. You might be saying that a firewall could do this as well and you are right, of course. But, many firewalls tend to have problems and use lots of system ressources if you add many […]


You might know that I´am using True Crypt for some months now to encrypt and decrypt my entire removable hard disk that has 300 Gb capacity. All happens in realtime and I can´t see and witness any slowdowns so far. I´am able to download content to the drive with 14.2 Mbps and its working like […]


The article "Ten things every Microsoft Word user should know" is for those of you who are still using Microsoft Word (and not Open Office or similar freeware products). I think most companies still rely on the Microsoft Office productline, also many computers come preinstalled with an OEM version. You get a great explanation and […]


I found a tutorial on the techarena forum that had some nice (standard) tips on how to speed up your windows operating system. You find tips that increase boot and shutdown speed, some that increase the overall performance by disabling certain services and features like indexing service and system restore. If you never tweaked your […]


encrypt uttorent traffic

Some ISPs are beginning to throttle bittorrent traffic. There is a possibility to overcome this throttling by encrypting your bittorrent streams. Torrentfreak.com posted a guide which tells you how to encrypt your torrent streams with three popular clients: Azureus, Bitcomet and µTorrent.


netstat

Tracing a Hacker is a article aimed at beginners that want to learn the basics of finding out if there is someone connected to their system who should not be connected to it. It gives a rough introduction to some basic concepts like tcp/ip, ports and how hackers find their targets. This is a good […]


The article essential utilities at laptoplogic.com lists several freeware utilities that should be useful to everyone who owns a notebook (with an intel cpu that is, a guide for amd will follow). All tools mentioned can be desribed as system tools that either show system information, test hardware or tweak it. For example tools to […]


charon by rhino proxy checker

This is the follow up to the proxy filtering program Calamity. It provides a fully customisable way of filtering out unwanted proxies via control files, a proxy tester to check anonymity - and a fully functional search engine crawler to find lists of posted proxies. Included within the kit is a php checker which can […]