Martin Brinkmann is a journalist from Germany who founded Ghacks Technology News back in 2005. Martin started his career as a tech support representative at a large German financial corporation which he used to finance his college education in English, Information Technology and History.
He quit college and his job when Ghacks began to attract a large enough readership. He made the decision to become a full time blogger and webmaster, and has not looked back since.
Martin is interested in all things tech. His primary focus is on desktop operating systems, web browsers, Internet services, and privacy related topics.
He published the book The Complete Windows 10 Privacy Guide: Windows 10 Fall Creators Update version in 2017. Martin writes a weekly column for fellow tech site Betanews as well.
Martin's articles on Ghacks
It´s wise to check your system components when you first start your new computer. It does not matter if you build it yourself or purchased a prebuild computer. It´s always a good idea to check if everything is working as intended. MemTest 3.4 tests your systems memory to make sure it is not damaged. It´s also a great way to test it when you overclock your computer / ram. This way you can ensure that it´s still reliable and does not produce errors.
To get Yahoo Mail Beta, just switch your content preference to Germany, Frence or UK. Then you will be asked if you want to join the beta when you log into your Yahoo Mail. Say yes, and join the beta. Then from the options menu, change your content preference what it was before. Then go to Yahoo Mail again. You should still see Yahoo Beta. If you don’t see it, go to options and click “Try Beta�? button. That’s all.
This little list might be helpful for some windows users. It is a detailed listing of windows keyboard shortcuts that most people don´t use because they simply don´t know about them. I´am not using many as well except maybe Ctrl+C to copy, Ctrl+V to paste the copied content and Alt+F4 to close a window. Shortcuts are a great way to work faster. The list is not complete but contains about 40 shortcuts.
You probably read my article about the bank heist in London where the robbers used a hardware keylogger to recieve sensitive information that allowed them to perform wireless transfers. The bank made the decision to super glue every cable to the back of the personal computer making it impossible to add the keylooger between the keyboard and the computer
The study "password security: what users know and what they actually do" was conducted by the department of psychology from the Wichita State University. The study investigated the common password generation practices of online users. All participiants took part in a survey querying (1) the types and number of different password protected accounts maintained; (2) actual practices used in generating, storing and using passwords; (3) practices believed they should use in generating and storing passwords; and (4) general demographic information.
This little device has apparently been used to pull of one of the greatest bank heist in history. You attach this device to the keyboard cable at the back of the pc and it´s able to record 130000 keystrokes. The bank robbers installed this device inside the bank and got access to Sumitomo Bank's wire transfer capability. With all the information at their hand they proceeded to transfer more than 400 million $ to various foreign accounts.
I don´t know a single large bank that does not offer its customers a way to use a website to do their transactions. There is unfortunatly no single standard set for bank websites and many companies tend to misjudge the importance of a secure website. The Secure Web Bank website did take a look at websites from US, Canadian and European institutes and check wether those provided a SSL Login page and Two Factor Auth for their customers.
More and more people use their computer to record tv shows by simply installing a tv card into it and connecting the computer to the tv signal. The only problem they are now facing is that everything will be recorded and everything includedes those unnecessary commercials. The freeware application cbreak helps you to remove those commercials from the recored avi files.
Flickr.com is a online photo service that allows users to upload, download, view and share pictures. One bad thing about it is that flickr itself does not offer a option to view or download more than one image at a time.
GMail Drive is a Shell Namespace Extension that creates a virtual filesystem around your Google Gmail account, allowing you to use Gmail as a storage medium.
Protowalls sole purpose is to run as a system friendly background task (aka using little ressources) that blocks IP addresses. You might be saying that a firewall could do this as well and you are right, of course. But, many firewalls tend to have problems and use lots of system ressources if you add many IP addresses to them.
You might know that I´am using True Crypt for some months now to encrypt and decrypt my entire removable hard disk that has 300 Gb capacity. All happens in realtime and I can´t see and witness any slowdowns so far. I´am able to download content to the drive with 14.2 Mbps and its working like every other hard disk. Yesterday a new True Crypt version was released and it has some amazing new features, let us take a look at some of them:
Ok this seems to be serious. If you open a webpage that contains a certain html code your windows will crash. The html is looking like this:
The article "Ten things every Microsoft Word user should know" is for those of you who are still using Microsoft Word (and not Open Office or similar freeware products). I think most companies still rely on the Microsoft Office productline, also many computers come preinstalled with an OEM version. You get a great explanation and guide for every tip that shows you how to use the feature described.
I found a tutorial on the techarena forum that had some nice (standard) tips on how to speed up your windows operating system. You find tips that increase boot and shutdown speed, some that increase the overall performance by disabling certain services and features like indexing service and system restore. If you never tweaked your system before this article is for you.
Some ISPs are beginning to throttle bittorrent traffic. There is a possibility to overcome this throttling by encrypting your bittorrent streams. Torrentfreak.com posted a guide which tells you how to encrypt your torrent streams with three popular clients: Azureus, Bitcomet and µTorrent.
Tracing a Hacker is a article aimed at beginners that want to learn the basics of finding out if there is someone connected to their system who should not be connected to it. It gives a rough introduction to some basic concepts like tcp/ip, ports and how hackers find their targets. This is a good read if you don´t know what they are about. After that Omar starts of by explaining the netstat command which lists all the sources that are connected or currently connecting to your computer. If you are running p2p software this can be a lot of connections. I suggest you start of by disabling most tools that you might be running while on the internet. So, no p2p, no messengers aso.
Ghacks is a technology news blog that was founded in 2005 by Martin Brinkmann. It has since then become one of the most popular tech news sites on the Internet with five authors and regular contributions from freelance writers.