Author Archive | Martin Brinkmann

memtest 5

It´s wise to check your system components when you first start your new computer. It does not matter if you build it yourself or purchased a prebuild computer. It´s always a good idea to check if everything is working as intended. MemTest 3.4 tests your systems memory to make sure it is not damaged. It´s […]


To get Yahoo Mail Beta, just switch your content preference to Germany, Frence or UK. Then you will be asked if you want to join the beta when you log into your Yahoo Mail. Say yes, and join the beta. Then from the options menu, change your content preference what it was before. Then go […]


This little list might be helpful for some windows users. It is a detailed listing of windows keyboard shortcuts that most people don´t use because they simply don´t know about them. I´am not using many as well except maybe Ctrl+C to copy, Ctrl+V to paste the copied content and Alt+F4 to close a window. Shortcuts […]


on screen keyboard

You probably read my article about the bank heist in London where the robbers used a hardware keylogger to recieve sensitive information that allowed them to perform wireless transfers. The bank made the decision to super glue every cable to the back of the personal computer making it impossible to add the keylooger between the […]


The study "password security: what users know and what they actually do" was conducted by the department of psychology from the Wichita State University. The study investigated the common password generation practices of online users. All participiants took part in a survey querying (1) the types and number of different password protected accounts maintained; (2) […]


I found a great guide for Opera 9 which extends Opera tremendously. The guide is divided into seven sections: Menu editing, Integrating Opera with download managers, User Javascript, Buttons, Panels, Widgets and Misc. The menu editing section for instance has some great tips that enhance opera in great ways: It gives you tips how to […]


hardware keylogger

This little device has apparently been used to pull of one of the greatest bank heist in history. You attach this device to the keyboard cable at the back of the pc and it´s able to record 130000 keystrokes. The bank robbers installed this device inside the bank and got access to Sumitomo Bank's wire […]


bank secure website

I don´t know a single large bank that does not offer its customers a way to use a website to do their transactions. There is unfortunatly no single standard set for bank websites and many companies tend to misjudge the importance of a secure website. The Secure Web Bank website did take a look at […]


More and more people use their computer to record tv shows by simply installing a tv card into it and connecting the computer to the tv signal. The only problem they are now facing is that everything will be recorded and everything includedes those unnecessary commercials. The freeware application cbreak helps you to remove those […]


Flickr.com is a online photo service that allows users to upload, download, view and share pictures. One bad thing about it is that flickr itself does not offer a option to view or download more than one image at a time.


GMail Drive is a Shell Namespace Extension that creates a virtual filesystem around your Google Gmail account, allowing you to use Gmail as a storage medium.


protwall block ip addresses

Protowalls sole purpose is to run as a system friendly background task (aka using little ressources) that blocks IP addresses. You might be saying that a firewall could do this as well and you are right, of course. But, many firewalls tend to have problems and use lots of system ressources if you add many […]


You might know that I´am using True Crypt for some months now to encrypt and decrypt my entire removable hard disk that has 300 Gb capacity. All happens in realtime and I can´t see and witness any slowdowns so far. I´am able to download content to the drive with 14.2 Mbps and its working like […]


The article "Ten things every Microsoft Word user should know" is for those of you who are still using Microsoft Word (and not Open Office or similar freeware products). I think most companies still rely on the Microsoft Office productline, also many computers come preinstalled with an OEM version. You get a great explanation and […]


I found a tutorial on the techarena forum that had some nice (standard) tips on how to speed up your windows operating system. You find tips that increase boot and shutdown speed, some that increase the overall performance by disabling certain services and features like indexing service and system restore. If you never tweaked your […]


encrypt uttorent traffic

Some ISPs are beginning to throttle bittorrent traffic. There is a possibility to overcome this throttling by encrypting your bittorrent streams. Torrentfreak.com posted a guide which tells you how to encrypt your torrent streams with three popular clients: Azureus, Bitcomet and µTorrent.


netstat

Tracing a Hacker is a article aimed at beginners that want to learn the basics of finding out if there is someone connected to their system who should not be connected to it. It gives a rough introduction to some basic concepts like tcp/ip, ports and how hackers find their targets. This is a good […]