Martin Brinkmann is a journalist from Germany who founded Ghacks Technology News back in 2005. Martin started his career as a tech support representative at a large German financial corporation which he used to finance his college education in English, Information Technology and History.
He quit college and his job when Ghacks began to attract a large enough readership. He made the decision to become a full time blogger and webmaster, and has not looked back since.
Martin is interested in all things tech. His primary focus is on desktop operating systems, web browsers, Internet services, and privacy related topics.
He published the book The Complete Windows 10 Privacy Guide: Windows 10 Fall Creators Update version in 2017. Martin writes a weekly column for fellow tech site Betanews as well.
Martin has been quoted or mentioned in many major online and print publications, including Forbes, Lifehacker.com, ComputerWorld, LinkedIn, Reddit, Betanews.com, Bleeping Computer, TechCrunch, PC World, Tom's Hardware, Slashdot, Hacker News, The Register, and more.
Martin's articles on Ghacks
About eight years ago I was backing up some pretty valuable files on CD. I should add valuable to me. One Cd contained demos of me and my clan playing Unreal Tournament capture the flag and I've always seen this as a part of my history. Well, I tried to copy the CD to my hard drive a few days ago and guess what; Some files could not be read and I lost some of them during the process. At least that's what I thought until I found the freeware Copy Cat. Copy Cat uses a superior method to copy files by using a byte per byte method.
If you do own a website you probably wondered about the value of it. With value I mean the amount of money that someone would be willing to pay for it. The following information could be very helpful if you need to sell your website, want to buy one or get approached by someone who offers money for your website. It actually happens quite often that webmasters receive mails from companies or individuals who want to buy their domain. Let us examine some factors that play a role in determine the value of a domain.
When I first tried to run a command in Windows Vista i expected to find the function at the same place where it is in Windows XP. When I opened the Vista start menu I was a little bit perplexed to find the Search in the place of the run command. Sure, I was able to simply press Windows + R to open the run command but I somehow still missed that function. I soon found out that it would be possible to customize the start menu and add the run command to it again.
One of the many disadvantages of every new Windows edition is the fact that the operating system becomes more and more bloated. Microsoft adds new features to Windows which could then be used to exploit the system.Instead of concentrating on fast efficient systems they produce heavy systems that look shiny but have problems under the surface. Recently a vulnerability in Windows Animated Cursor Handling was discovered. In order for this attack to be carried out, a user must either visit a Web site that contains a Web page that is used to exploit the vulnerability or view a specially crafted e-mail message or email attachment sent to them by an attacker.
If you ever wanted to access your mp3 collection remotely the Winamp Remote Plugin which is currently in beta status might be exactly what you are looking for. Once setup you can access your music collection from any web browser using a normal Internet connection. The computer with the music collection that streams the content has to be connected to the Internet as well. Just download and install the Winamp Remote Plugin and create a new account. This is important that only you, and everyone who is having the username and password, is able to connect and listen to your music collection.
Tails Gear is one of those Japanese arcade shooters that make it pretty difficulty for average gamers to see more of the game than just a few levels. If you ever played games like Ikaruga you know what I mean, they live of extreme amounts of enemies and bullets that they send your way and you have to move the ship more than carefully to avoid death. Graphics are excellent as is the gameplay, you always see some kind of sequences when you finish a level and move on to the next. One of the interesting features of the game are the satellites of your ship that shoot on their own and can stay in a place for tactical reasons.
DM2 is a pretty interesting windows enhancements open source program for Windows 2K and XP. The application can be downloaded from Sourceforge and does not need to be installed at all and can be run from any location of your hard drive. Once installed it adds a small icon to your system tray which can be clicked to configure the functionality. It adds by default several interesting new ways to interact with open windows in the operating systems. The minimize, maximize and close buttons get new functionality when you right-click them. A right-click on minimize sends the window into the system tray even windows that can normally not be minimized to the system tray.
Microsoft advertises its Anti Spam program Windows Defender with the slogan spyware protection for free but is it really a good alternative to other anti spam and spyware programs like ad-aware and spybot search and destroy. It is only fair to compare Microsoft's anti spyware software which is available free to other free solutions that can be used and downloaded for free as well. Microsoft's Windows Defender came under heavy fire recently as two competitors released studies that were supposed to prove that Windows Defender had - by far - the weakest spyware and spam detection rate.
Opera is already a very fast browser, but if you would have the choice between fast and faster than fast, what would you choose ? I took the liberty to compile a list of 10 great tips that speed up Opera in several unique ways. Many of the settings can be changed by simply going to Tools > Preferences in Opera but some can only be used by accessing not so obvious ways like ini files.
Please note that everything that I'm describing here worked fine on my computer. It speed up Opera and increased my browsing experience with it tremendously. While most tips will work for any users no matter their connection to the Internet some tips might only increase performance for broadband users.
This article explains how to disable Balloon Tips in Windows Vista. I thought it would be a nice follow up article on the one that described how to make the balloon tips transparent. I personally think that Balloon Tips have no right to be there at all, they look awful and most do not contain information that are important in any way. I disabled them the first day I started using Windows XP and I did the same on my Windows Vista notebook. Balloon Tips are a waste of time in my opinion. Let me explain how you can disable balloon tips in Windows Vista.
The Balloon Tips in Windows Vista look like the ones in Windows XP. While it was not a problem in XP Vista comes with a nicer more shiny interface that makes the balloon tips look out of place. Longhorn had transparent balloon tips for a while but Microsoft removed it for unknown reasons and the feature did not make it into Windows Vista. Glass Toast is a little freeware application that steps in and makes transparent balloon tips available again under Windows Vista. The application does not need to be installed at all and can be run from any location on your hard drive.
It seems that the big three, that is Google, Yahoo and Microsoft, always have to compete against each other. When someone introduces a new feature the others are surely going to announce a similar feature that is just a tad better than the feature of the other company. We are witnessing the race for Email storage at the moment. Microsoft has a storage limit of 2 Gigabytes for their users while Google has currently a limit of 2,8 Gigabytes. Yahoo decided to accept the challenge and give the others something to choke on, they announced today that they will offer unlimited Email storage to all of its users in the near future.
This article is going to show everyone, even the inexperienced, how to create a data safe that can store as much personal information and files as you want using the open source program True Crypt. True Crypt makes it very easy to encrypt almost every piece of hardware including partitions, hard drives, usb keys and other storage devices. Once everything is setup you would mount the True Crypt container using the password that you have selected while creating the encrypted container. This is actually the only password that you have to remember, everything else can be kept in the encrypted container for safety reasons.
The free social music networking site Jamendo announced today that they have distributed more than one million downloads of albums that are freely available using bittorrent technology. Only albums that have been fully distributed have been counted or as they put it: "this figure is the minimum indicative number of the total of complete albums we have distributed so far". This is a huge success for sites that believe that drm free music sites can and will succeed in the long run. Jamendo has an incredible download rate of more than 200000 albums every month and the figure is increasing with each passing month.
Jabbits is a interesting new interactive website that is supposed to be the worlds first interactive video website. It could be described as some type of video answers website where one user posts a question and all others reply to it. The major difference to normal written conversations is that everything is recorded on video and can be accessed through Jabbits. There are actually three types of questions on Jabbits: Public, Research and Private questions. Public questions come from normal visitors who would like an answer to a question whereas research questions are added by companies who pay the users that answer the question that they ask. Private questions can only be answered by users who have been invited by the creator of the question to answer it.
I came upon the article "How I would hack your weak passwords" yesterday and pondered if I should write an article about it. I decided that it would be worth it. The author of the article details how he would try and find out your passwords and get access to all of your accounts in the end. His first approach would be to use the most common used passwords by users on the net. He needs information about your personal life for some passwords but those information can be obtained pretty fast through social engineering. Trying those "top 10" passwords would already cover a large percentage of online users, statistically speaking that is.
You might know that Youtube held a video awards voting on their site for the last five days were everyone was able to vote for their favorite videos that Youtube preselected. Ten entries were shown and you could assign spots from 1 to 10 to them. Now, after all votes have been cast Youtube presents the Winners of the 2006 Video Awards in the categories Most Creative, Best Comedy, Best Commentary, Best Series, Best Music Video, Most Inspirational and Most Adorable. The videos below are in the same order in case you are wondering.
Nothing is more frustrating than to realize that some files of a backup are corrupted. This happens of course right at the time when you need the backup. One way to prevent this scenario from happening would be to use different locations for your backups, for example CDs, external hard drives and USB drives. Even though you store the backup in different places it is not guaranteed that the files on those devices are not corrupted. The probability that it will happen is simply reduced.
Ghacks is a technology news blog that was founded in 2005 by Martin Brinkmann. It has since then become one of the most popular tech news sites on the Internet with five authors and regular contributions from freelance writers.