Martin Brinkmann is a journalist from Germany who founded Ghacks Technology News back in 2005. Martin started his career as a tech support representative at a large German financial corporation which he used to finance his college education in English, Information Technology and History.
He quit college and his job when Ghacks began to attract a large enough readership. He made the decision to become a full time blogger and webmaster, and has not looked back since.
Martin is interested in all things tech. His primary focus is on desktop operating systems, web browsers, Internet services, and privacy related topics.
He published the book The Complete Windows 10 Privacy Guide: Windows 10 Fall Creators Update version in 2017. Martin writes a weekly column for fellow tech site Betanews as well.
You can reach Martin on Facebook or on Twitter. Please use the contact form at the bottom of the page to contact the author directly.
Martin has been quoted or mentioned in many major online and print publications, including Forbes, Lifehacker.com, ComputerWorld, LinkedIn, Reddit, Betanews.com, Bleeping Computer, TechCrunch, PC World, Tom's Hardware, Slashdot, Hacker News, The Register, and more.
Martin's articles on Ghacks
Microsoft Groupbar is a freeware application for windows xp that offers an enhanced window management capability. Groupbar does not need to be installed, just download the file and start GroupBar.exe. The tool automatically appears as a sidebar on the left of your screen but can be placed in the other three corners as well. The sidebar displays all running applications, you are free to sort them anyway you like.
Some Firefox extensions seem to cause problems when enabling them, like making firefox slower or even crash the browser. This is of course not intended behaviour but it still occurs rather frequently when new extensions are released. The problematic extensions web site lists known bugs and workaround for many firefox extensions.
Yeah this sounds crazy at first glance but a friend of mine and I thought of something similar just a few days ago. So, let us destroy some websites. My first target: Microsoft, the weapon: Muddy Footprints. After approximately one minute the complete site was full of mud. Great, now something more devastating. I placed some nasty landmines on the website of my good old friend Derryck from connectedinternet.
This topic might not look interesting at first glance but I promise it will be worth reading it. More than 900 readers subscribed to the feeds of ghacks.net using feedburner alone while many more are using different services to read my feeds. But what are feeds ? They are a short abstract of every article that gets posted here. This means whenever I write an article it will automatically appear in those peoples feed reader software. Many browsers for instance are able to read feeds or can be upgraded to read them.
Mozilla Firefox comes preinstalled with seven search engines which are Google, Yahoo, Amazon, Answers, Creative Commons, Ebay and Furl. Those are probably not the best selections, most probably missed that there are more search engines than Google preinstalled. Adding new search engines that might prove more useful can be easily added by going to the mozilla search engine page.
Chris asked me yesterday if I knew of a good freeware backup program for windows and I replied to him that Syncback would be such a tool. I discovered another one and thought it would be nice to share this one with everyone. The backup tool is called Drive Image XML, it is completely freeware and runs in windows xp and windows 2003 server only. If you are running a different version of windows use Syncback.
I have been recieving an email lately asking for a freeware utility that would be able to convert most known video formats into each other. When I saw the webpage for Super the first time I was reminded of that email and thought it was a big coincidence that I found such a converter that fast. The tool stands out for several reasons, first it is freeware which is always good, second it does not require that you install the needed codecs - it has all codecs on board.
You have uninstalled the program completly and are sure that no reference is left on your computer. What if there is still one left that you probably did not know about ? Every item that appears on the left side of the clock in the taskbar will be cached by windows which means that the icon of the program is still available on your system. Check this out by yourself by right-clicking the taskbar. Select properties from the menu and click on the customize button at the bottom of that screen. If customize is not active activated it by enabling Hide Inactive Icons.
One phenomenon can be observed every year when the summer begins. Many users report problems with their computers who behave strangely or even reboot unexpectedly. If you experienced this once you might already know what is causing this behaviour. Pc components become warmer than usual because the air is hotter which can lead to reboots and even damaged components.
Hard drives are critical components in every personal computer. They store the data that you are working with and a failure or defect could lead to data loss sometimes without the possibility of recovering the data. Backups are of course a good idea but monitoring the hard drives performance is another method to check if it is likely that your hard drives might be at the end of their life cycle.
Sometimes sites are not accessible maybe because they are moving to a new webserver, have problems with their hardware or simply get slashdotted / digged and can´t handle that many requests which leads to timeouts for the user. This happens of course most of the time when you desperately need the information on that website.
The context menu pops up when you right click an item giving you some options based on the extension of the file. You could for instance select to rename the file, open it, open it with, take a look at the properties and so on. The tip I´am explaining right now will be helpfull for instance if you perform an action over and over again while the command is not directly available from the right click menu.
This poll results did not came unexpected: 41% of all voters stated that they feared the death of net neutrality the most, followed by trojans and virii (17%), spyware, hackers and nothing (10% each), phishing (5%), spam (4%) and finally Worms with 3%.
This is an overwhelming result and I thought I explain the net(work) neutrality concept for the ones who do not know what it is. Internet providers do one thing, they provide access to the internet and make sure that you recieve all the data that you request. It does not matter if you surf to the website of a big company like ebay (amazon, microsoft) or to my blog (hehe, or even smaller websites). All data get the same treatment, none is preferred over the other.
Sometimes it´s the small changes that make a big difference. I´am writing a lot of articles as you all know and I find it sometimes hard to locate the cursor in my articles, especially when it is late in the evening and I´am tired. Vippy is a small utility that does only one thing: It changes the color of the cursor to red. Take a look at the image to see the difference. The great thing about vippy is that it should work in nearly all windows applications including Microsoft Word and Open Office.
I can see the first question coming up pretty quickly. Special shortcuts, what´s that ? I had some trouble finding a heading that describes tooler and I decided to stick with the description that the author of this nice little tool used. Tooler is able to create shortcuts in three locations: desktop, startmenu, programs menu. You can create eleven different shortcuts with it that might speed up things a little bit.
IceSword is a new contender for the title of the best rootkit revealing and removing program out there at the moment. It is rather hard to find a working download of IceSword but as always I provide a fast way to download the latest version of Icesword named IceSword1.18.rar. Click the link to download the rootkit scanner from rapidshare. In contrast to other rootkit scanners like Blacklight Icesword can not be run automatically. Icesword only provides perhaps the most powerful utilities to scan your system for rootkits and other information.
You might have read about the google translate proxy that makes it possible for some to access blocked websites because the administrator did not think of blocking the translate function of google as well. What most people don´t know is that Google offers at least two additional services that can be used as a webproxy to bypass restrictions imposed upon you by your system administrator.
You have thirty days to activate a new installation of Microsoft Windows XP before it stops working until you finally activated the installation. Activation works this way that you have to provide an installation number to Microsoft either by internet or by phone. If you change hardware or install the operating system again you will have to activate the product again as well. This does not make sense in my opinion but hey, they surely have an important reason for this procedure.
Are you looking for a free lightweight alternative to Microsoft Word and Open Office ? Are you sick of endless loading times and office suits that occupy hundreds of megabytes of space on your hard drive ? AbiWord might be worth a closer look if you answered those questions with yes. What´s so different about AbiWord that I would recommend it ? There are several reasons, first it is only about five megabytes in size which is a good prerequisite for a fast loading application.
I´ve written a large article about Coral CDN just a few days ago. Here is a short introduction for those who might have missed this article. Coral CDN caches websites, basically every website that one of its users opens for the first time. After caching this website is available for all other users of the network and is accessible by appending nyud.net:8080 to the url. Now, in this article I mentioned a firefox extension which appends the nyud.net:8080 extension automatically to your links but what about the people who may not use firefox ?
P2P is in the news, every day. You see organizations like the RIAA hunting down fileshares, you read about trojans and virii that are spread through P2P networks. Everything seems rather risky at the moment. A new player is emerging from the shadows which is using a very old communication system, the Usenet. You might know a part of the usenet if you ever read something from google groups. Google Groups is an archive of the part of the usenet that looks similar to bulletin boards.
If you are looking for a fast lightweight alternative to Adobes heavyweight pdf reader you might want to try foxit reader. A new version of foxit reader has been released a month ago and I decided to give it a try. Mainly because of the positive comments about it whenever I wrote an article about the Adobe Reader. So, why would someone want to use foxit reader 2.0 instead of the "official" pdf reader by Adobe ?
I´am not sure if most of you will like this article or not. My second computer was an Amiga 500 which I used almost 100% for gaming. I loved many of the games that came out for that incredible machine and still yearn for some of them. I always wanted to play those games again but did not want to buy an Amiga because of several reasons. I don´t want to get into to much detail but it´s mainly a storage problem and a problem of availabilty. Sure, you can buy some cheap amigas on ebay and probably buy some games there as well, but most of the games are hard to come by this days.
AntiVir is probably the best free antivirus software. It´s free for non commercial use and updates its virus definitions regulary just like in the professional version. The free version however has the habit to display a advertisment popup after each update, which normally means that you see this ad every single day. It is always the same ad and I don´t see a reason for this at all, once is fine but everyday ?
When I bought my first mp3 player years ago I had to somehow transfer the music from my cd collection to my computer. I was lucky enough to find CDex pretty fast and I stick with it since then. It offers everything that I demand from an CD ripper, it´s fast, it checks CDDB for album and title information and is able to save the music in many formats including mp3 and wav. All you need is the program itself and the dll lame_enc.dll which you can download from rarewares.
Firefox, and all other browsers as well, offers two methods to display pdf documents. The first displays the pdf file in firefox itself and uses the Adobe Reader plugin to do so. The second method would start the Adobe Reader itself and display the pdf file there. The first method might be convenient but has some disadvantages that I would like to address.
If you are using firefox on more than one computer you might want to take a look at the password exporter extension. What if you want to login into your favorite website and can´t remember the login details ? Would not it be great to synchronise all saved passwords between those computers ?
Most people use easy to remember passwords that are as easy to brute force. The name of your wife, your birthday, a combination of personal data or simple words like password or god. This might be convinient and nice as long as no one tries to break into your account. When this is happening you will quickly realize that insecure passwords are a big security thread.
Phishing is a popular method to capture personal data such as passwords, transaction numbers and credit card details. The company I´am working with locks several user accounts each day to prevent harm done to them due to phishing. It normaly starts with an email asking you to update your profile, to download a security update or a email that reveals that you are the highest bidder of an ebay auction (that you do not know about).
Nonsense. That was my thought when I first read the articles " Music industry demands the right to sue ISPs" from the Independent Online Edition and "Indie Labels want copyright shift" from the BBC Online. Several trade organisations including the Association of Independent Music (AIM), the Musicians' Union and the MCPS-PRS Alliance proposed that Internet Service Providers (ISPs) should be liable for illegal filesharing by their users. (which means that it would be possible to sue ISPs because of this liability)
You are leaving traces on the computer you are working with unless you are using a live cd or software that runs from an usb stick. Traces are everywhere and it´s rather hard to clean every possible trace by hand. Disk Cleaner is a nice little freeware application that helps you in this task.
Yes I do own an iPod Nano with four gigabyte space. Was using iTunes for a long time until I wanted to copy some songs from the iPod to a computer and realised that iTunes did not offer that function at all. I decided to look for alternatives and found the freeware Yamipod which is really great and has all the functions that I need.
Coral CDN (content distribution network) might be the solution if you can´t reach a website because it is either blocked by an administrator, slow or even completly unreachable. Filters and restrictions become more common on the internet. Schools and workplaces blocking access to unwanted sites and networks is a prime example. I can understand that a company does not want you to surf at websites like Ebay during worktime but what about breaks ? What if you are in school and some class did not take place and you would like to check your mail accounts ?
You might have stumbled upon this site if you ever had a computer related question that you could not answer. First step, ask google. Second step, find websites that force you to login or even pay to see the answer. Big thanks to eonestudio for making this little trick public. The above link displays a video which shows how you can take a look at the answers for free.
You probably already tried the new firefox 2.0 and think it adds some great value that you would like to use immediately. Anti-Phishing enhancements, a built in spell checker, the ability to restore sessions and to undo closed tabs are great additions. If only those damn extensions would work with the new firefox 2.0 as well.
Shame on me that I did not discover this firefox extension earlier. Selenium IDE is a firefox extension that is able to automate, record and playback tasks in firefox. It has therefor more than one purposes but here is a great one that you will like. Many people do the same tasks when they start their browsers, check their webmail accounts, log into a forum they visit and check for the latest items on ebay for example.
Don´t you hate that boring Windows XP boot screen ? Would not it be nice to have a great skin for that screen ? If you answered the questions with yes bootskin might be exactly what you are looking for. The freeware makes only temporary changes which means that after uninstallation all settings are back to default value.
I´ve written an article about disposable email services in march and I suggest you go there if you are looking for a list of one-way email addresses. The system is pretty easy to understand. Many services on the internet demand an email address for verification purposes. Sometimes you just know that they will sell your email and you will recieve lots of spam afterwards.
Well well well. The industry tried their best to make the new competing high definition formats blue-ray and hd-dvd as secure as possible so that no one would be able to view them with insecure hardware or would be able to copy the movies. The files themselves are protected by AACS which stands for Advanced Access Content System. HDCP (High-Bandwidth Digital Content Protection) makes sure that high definition playback is only available if the output device (television, monitor) is HDCP capable, if not the movie will be downsampled to 960x540p.
Most mobile phones are locked and can only be used with sim cards from the provider that sold you the mobile in the first place. The operator is able to unlock your mobile for you so that it is working with other operators as well, but you will have to pay for it most of the times. Would not it be great if you could unlock the phone by yourself without paying money for it ?
Please click on the following link to open the newsletter signup page: Ghacks Newsletter Sign up
Ghacks is a technology news blog that was founded in 2005 by Martin Brinkmann. It has since then become one of the most popular tech news sites on the Internet with five authors and regular contributions from freelance writers.