Most people tend to use passwords that they can rememeber easily. If you take a deeper look many use the same password for most of their password protected activities which is a high security risk. Break one, get access to all.
Author Archive | Martin Brinkmann
Everton from connectedinternet.co.uk compiled a list of ten firefox extensions that don´t get glamorised that much. The list includes some extensions that I never heard before, like the Colorful Tabs Extension. Make sure you head over to his site and take a look at the compilation.
The c-64 was my first computer. I had an atari 2600 before and it seemed like a quantum leep at that time. The C-64 had many classic games that I enjoyed playing: Archon, Boulder Dash and Pirates for instance. You know have the chance to play some of the alltime classics of that era in […]
I´am cautious when I read another article that claims to speed up your windows operating system by simply tweaking some settings in the registry. I learned the hard way that your os sometimes becomes unstable and you will have to restore it or do a fresh install. The article "Make your windows fast as never […]
Sometimes you delete something and realize later that you still need the file(s) that you´ve deleted before. Its easy to recover them if they are still in your trashbin, but you need special tools to recover files that have been deleted permanently under windows.
Lets assume your system has been hacked. What steps would you undertake after the hacking attempt ? The article written at techtarget.com tries to answer the question and presents a checklist of things to do after being someone hacked into your system. Its more of a checklist for corporate networks than for individual computers but […]
The free ftp software Smart Ftp 2.0 has been released and is available for download at the developers website. Changes include a new graphical user interface with tabs, a new local and remote browser and support for 64 bit windows operating systems. If you are looking for a free ftp program give it a try, […]
Phishing, which is a construct of the words Password and Fishing, becomes more and more common on the internet. Many people recieve daily mails from sites like ebay and paypal but also from financial sites like citibank that look authentic and direct you to a website that looks like a copy of the original site. […]
Searchenginewatch published a rather large article about protecting your search privacy today. They provide a step-by-step guide how your search privacy gets exposed from your desktop to the sites you visit. They divided the article into six chapters beginning with Search Privacy On Your Own Computer and ending with a conclusion that gives you valuable […]
When I tried to switch for the first time from windows to linux I felt left alone. The web was not what it now uses to be, tutorials and help documents were scarce and one had to have a friend who could help or try the trial and error way to get linux installed and […]
I posted yesterday an article about tracing an hacker, today I give you one about tracing an email. The first thing you have to do is to enable email headers. The site shows you how to do so using gmail, yahoo and msn. All software products should support this feature as well. Email Headers show […]
This is a nice beginners tutorial that tells you how to trace people who try to break into your computer. It covers lots of explanations to questions like "How do these people find their victim?" and "What the phrases TCP/UDP actually mean".
If this topic did not catch your attention at once then none will. Dr. Charles Gerba from the university of Arizona found out in a study that measured normal bacterial levels inside offices across America that the average desk harbors 400 times more bacteria than the average toilet seat.
Many of you told me that I should create a new list of websites that are running webproxies. Today I finally had the time to compile this new list, hope everyone is satisfied with the result. Maybe it´s a good start to explain why someone would need a webproxy ( or a proxy ). Some […]