Martin Brinkmann is a journalist from Germany who founded Ghacks Technology News back in 2005. Martin started his career as a tech support representative at a large German financial corporation which he used to finance his college education in English, Information Technology and History.
He quit college and his job when Ghacks began to attract a large enough readership. He made the decision to become a full time blogger and webmaster, and has not looked back since.
Martin is interested in all things tech. His primary focus is on desktop operating systems, web browsers, Internet services, and privacy related topics.
He published the book The Complete Windows 10 Privacy Guide: Windows 10 Fall Creators Update version in 2017. Martin writes a weekly column for fellow tech site Betanews as well.
Martin has been quoted or mentioned in many major online and print publications, including Forbes, Lifehacker.com, ComputerWorld, LinkedIn, Reddit, Betanews.com, Bleeping Computer, TechCrunch, PC World, Tom's Hardware, Slashdot, Hacker News, The Register, and more.
Martin's articles on Ghacks
Windows Directory Statistics is a disk usage statistics viewer and cleanup tool for Microsoft Windows. It reads the disk content once and displays three different views.
The directory list which is sorted by file / subtree size, the treemap which shows the whole content of the directory tree and finally the extension list which serves as a legend and shows statistics about the file types.
This guide will provide you with the means to detect and remove spyware that is installed on your system. Before we start we should define the term spyware. There are different categories of spyware, like adware and malware, that make it difficulty for the user to distinguish between them and select the right tool for their removal.
It seems that articles that cover running linux in windows are becoming more and more popular. I wrote one a few days ago (with vmwareplayer) and would like to introduce another method of achieving this.
Like the last time linux will be embedded inside windows which has some advantages but also some disadvantages. Many people don´t like the idea of installing a second operating system, messing with their partitions and bootconfig and probably having to setup their first os again because of errors they made. A linux run in windows does not have this difficulties, its simply load and run like all other windows programs.
I found a pearl script at binaryhack.org that lets you mass-download images that are hosted at imageshack.us. All you need is the pearl script and the mechanize module to download images from imageshack. If you are running windows you need a pearl interpreter, PxPearl seems to work with this script.
I sometimes have the difficulty that the space of my desktop is not sufficient to show every information I need. This happens for instance when I use SSH to work on my rootserver and use a browser to find information.
Now this one is huge. The attack cruiser was build by Erik Varszegi exclusively for display at Star Wars Celebration III. It even got a framed certificate of authenticity by George Lucas himself.
Stem to stern the model is 97 inches long and 47 inches wide, weighs over 150 pounds and is created using over 35,000 pieces!
This looks cool. That was my first reaction when I saw the generated images at the electricsheep.org website. Electricsheep is a free screensaver that runs on pc and mac and is used by lots of people around the world.
When the screensaver is installed on your system all computers currently displaying the screensaver combine their power to create morphing abstract animations known as "sheep".
Great the next match of my favorite sports team will not be shown on free tv. Actually it will not be shown at all in my country, except for satellite of course. If you encounter situations like this one and always thought there would be no other solution than to watch boring live tickers on internet sites, then you?ve come to the right place.
I will describe three freeware programs that let you connect to channels that stream tv and especially live sports events. This includes all major european football (soccer) leagues, champions league, uefa cup, espn, wrestling, national team matches, boxing matches and much more.
Only the pointer to the file is deleted when you opt to delete a file in windows. The whole file still exists on your harddisk and its possible to recover it using the right tools. You probably have some files where you want to make sure that the file is deleted and not recoverable at all.
There are occasions where you probably want to run a different os without really installing it. If you are running windows you probably would like to refresh your linux skills but dislike the idea of installing it on one of your partitions. The guys at wolphination explain an easy way to run on os inside your real os.
A friend of mine moved to a new house and had to change his internet provider as well. The room with the computer and the one with the phone line were not close to each other and he decided to buy a wireless lan router and use it to connect to the internet.
We had to do a scan of the surroundings of course and found lots of unsecured wireless lan networks. I don´t know why people keep these unsecured, maybe its laziness, maybe they simply don´t know the risks involved. Its like leaving your doors open when you leave your house. Lots of things can happen..
Those crazy japanese again. I´am not sure why I love them that much but it probably has something to do with the fact that they are always good for a suprise (or two). I never thought they would use different smileys until I found this japanese smileys website.
If you are new to firefox and have been using internet explorer or opera before you might find some of the concepts of firefox confusing at first glance. The Firefox Tweak Guide explains most firefox options in detail and is a great asset for every new (and probably even some older) firefox users.
Now this article over at tomshardware.com comes in handy. I told you yesterday how to encrypt your hard drives with the great true crypt freeware and recommended that everything would be encrypted and the system would be booted from usb.
Only a few days ago I wrote a first small article about true crypt and recommended it. Back then I bought a usb 2.0 hard drive with 300 GB capacity and encrypted its entire partition with true crypt. This was done to test the programs functionality but also to see if it would slow down my main computer (athlon 64 3000+, 1 gb ram).
To my great suprise it did not slow down the pc and I decided to expand the encryption to cover all my hard drives. Let me tell you why and how i did this and why you should also be considering this.
The people over at comcast have written a free troubleshooting guide for windows xp systems. There is of course no 100% fool proof way to fix a windows xp system, the problems that can occur are manifold and no article can ever deal with every possible error.
Astalavista Security Group have a beta page up that lists top freeware software products in various categories including Data Recovery, Anti Virus-Tools, Firewall and IDS and Anti-Spyware. The list contains some of the freeware tools that I already wrote about but also some new ones that might interest you.
Ghacks is a technology news blog that was founded in 2005 by Martin Brinkmann. It has since then become one of the most popular tech news sites on the Internet with five authors and regular contributions from freelance writers.