Martin Brinkmann is a journalist from Germany who founded Ghacks Technology News back in 2005. Martin started his career as a tech support representative at a large German financial corporation which he used to finance his college education in English, Information Technology and History.
He quit college and his job when Ghacks began to attract a large enough readership. He made the decision to become a full time blogger and webmaster, and has not looked back since.
Martin is interested in all things tech. His primary focus is on desktop operating systems, web browsers, Internet services, and privacy related topics.
He published the book The Complete Windows 10 Privacy Guide: Windows 10 Fall Creators Update version in 2017. Martin writes a weekly column for fellow tech site Betanews as well.
Martin has been quoted or mentioned in many major online and print publications, including Forbes, Lifehacker.com, ComputerWorld, LinkedIn, Reddit, Betanews.com, Bleeping Computer, TechCrunch, PC World, Tom's Hardware, Slashdot, Hacker News, The Register, and more.
Martin's articles on Ghacks
One of the great features of Azureus is its plugin capability which is widely used by developers. Today more than 50 plugins are available for Azureus, zeropaid took a look at the most useful ones, let us take a look at the plugins they mention. The plugins mentioned can be categorised to belong either to cosmetic changes, statistics, security, communication and time management.
We all know that CDs and DVDs don´t last forever, some expert estimate that self recorded CDs and DVDs last only for the short period of 2-5 years before they become unusuable. Many factors play a role here, some of them are the type of disk, the recording speed and handling and storage. So, what could you do if you have a medium that you can´t read / copy anymore ?
Is this my USB story week, lot´s of articles about USB drives already and more come out faster than I can type. So, I´ve found this article at watchyourend about "hacking" applications that can be run independently on usb drives. I prefer to name them security applications, all of those applications can be used for good or bad, means security IMHO fits better than hacking.
If you happen to run a webserver that uses linux or happen to run linux as your operating system for the computer you work with you should know the basics of the shell. Sometimes you quickly have to find your way into the shell and a site like linuxcommand helps you alot doing so.
It is sometimes a good choice to disable USB drives and still use other USB hardware. This is especially true for computers and notebooks that are publically accessible from time to time. So, to disable USB Drives you simply fire up regedit and browse to the following key:
The avi bug which makes it impossible to delete avis in windows xp by chosing delete from the menu or hitting del at your keyboard is caused by Explorer reading the .avi file to determine file information as soon as you move the mouse over the file. This causes 'permission denied' errors when trying to simply move, copy or delete these files as they cannot be changed while Explorer has an open handle on them.
This little open source application might come in handy for some of you. The input is a simple image which is then cut into pieces which are then saved as pdf files and can be printed out and assembled as posters. This is a great way to produce posters, the application is able to read lots of formats from digital cameras and the usual ones of course like jpg and psd.
It seems that the method that I previously posted is not working really well. If you rename the files windows will try and install the update again. Therefor one has to find another way to disable this, what we do is disable the execute bit on wgalogon.dll. That way, winlogon can't call it as a notification package at boot, and since WgaLogon is responsible for running and maintaining WgaTray.exe, no more tray popups either.
Microsoft Windows users who are living in the U.S., U.K., Malaysia, Australia or New Zealand have to deal with Microsofts next step in their fight against piracy. A user who opted for automatic security updates will recieve the new anti-piracy tool which will install and ask for a reboot. After that reboot the license of your windows operating system is checked. You might see the following message:
It´s wise to check your system components when you first start your new computer. It does not matter if you build it yourself or purchased a prebuild computer. It´s always a good idea to check if everything is working as intended. MemTest 3.4 tests your systems memory to make sure it is not damaged. It´s also a great way to test it when you overclock your computer / ram. This way you can ensure that it´s still reliable and does not produce errors.
To get Yahoo Mail Beta, just switch your content preference to Germany, Frence or UK. Then you will be asked if you want to join the beta when you log into your Yahoo Mail. Say yes, and join the beta. Then from the options menu, change your content preference what it was before. Then go to Yahoo Mail again. You should still see Yahoo Beta. If you don’t see it, go to options and click “Try Beta�? button. That’s all.
This little list might be helpful for some windows users. It is a detailed listing of windows keyboard shortcuts that most people don´t use because they simply don´t know about them. I´am not using many as well except maybe Ctrl+C to copy, Ctrl+V to paste the copied content and Alt+F4 to close a window. Shortcuts are a great way to work faster. The list is not complete but contains about 40 shortcuts.
You probably read my article about the bank heist in London where the robbers used a hardware keylogger to recieve sensitive information that allowed them to perform wireless transfers. The bank made the decision to super glue every cable to the back of the personal computer making it impossible to add the keylooger between the keyboard and the computer
The study "password security: what users know and what they actually do" was conducted by the department of psychology from the Wichita State University. The study investigated the common password generation practices of online users. All participiants took part in a survey querying (1) the types and number of different password protected accounts maintained; (2) actual practices used in generating, storing and using passwords; (3) practices believed they should use in generating and storing passwords; and (4) general demographic information.
This little device has apparently been used to pull of one of the greatest bank heist in history. You attach this device to the keyboard cable at the back of the pc and it´s able to record 130000 keystrokes. The bank robbers installed this device inside the bank and got access to Sumitomo Bank's wire transfer capability. With all the information at their hand they proceeded to transfer more than 400 million $ to various foreign accounts.
I don´t know a single large bank that does not offer its customers a way to use a website to do their transactions. There is unfortunatly no single standard set for bank websites and many companies tend to misjudge the importance of a secure website. The Secure Web Bank website did take a look at websites from US, Canadian and European institutes and check wether those provided a SSL Login page and Two Factor Auth for their customers.
More and more people use their computer to record tv shows by simply installing a tv card into it and connecting the computer to the tv signal. The only problem they are now facing is that everything will be recorded and everything includedes those unnecessary commercials. The freeware application cbreak helps you to remove those commercials from the recored avi files.
Ghacks is a technology news blog that was founded in 2005 by Martin Brinkmann. It has since then become one of the most popular tech news sites on the Internet with five authors and regular contributions from freelance writers.