Glasswire is a network monitoring and security solution for Microsoft Windows and Google Android devices. On Windows, it is available as a free version as well as several commercial versions which are […]
I watched the movie Crank last saturday in a cinema near my hometown, it was a great movie but something that happened before the film really annoyed the hell out of me. Why the hell are they showing clips that it is illegal to record the movie with cams and that you will face jail time for it before the movie starts ? How likely is it that someone who has the intention to record the movie is actually in there ? How much more likely is it that many visitors who paid lots of money to watch the movie are pretty annoyed by this message ?
Combimouse, a crossbread of keyboard and mouse looks pretty strange to say the least. On the one hand we have a patented and award winning design and on the other hand we have the users who will surely think twice before they give this a try. Let us see how this works. You can type normally and once you need to use the mouse you use your right hand to touch a certain spot on the right unit to activate mouse mode. This means there is no way to hit the keys accidentally while using mouse mode or move the cursor while typing.
Those of you who got a glimpse at Windows Vista might remember the explorer breadcrumbs feature which it introduced. Explorer Breadcrumbs for XP takes this functionality to Windows XP. After you installed the free tool a new toolbar is added to the windows explorer showing breadcrumbs. Those breadcrumbs are identical to the navigation structure, if you are opening for example e:\apps\opera you see the breadcrumbs Desktop > My Computer > E: > Apps > Opera.
While I was searching for a way to reduce the font size of my bookmarks toolbar I came across the extension UI Tweaker for Firefox. It felt strange that I've never heard about this extension before because it has some really nice features that change the appearance of firefox. The extension offers five tabs (Menu hacks, Toolbar hacks, Tab hacks, Findbar hacks and Miscellaneous hacks).
I have more bookmarks in that toolbar than Firefox was able to display which lead to the unfortunate situation that the last ones were not shown in this toolbar anymore. I was only able to access them using the arrow on the right side of that toolbar that contained all bookmarks who could not be displayed anymore. This was not a great situation and the first thing that came to my mind was to change the text of the bookmarks - identify the site with less text and you have more space for sites.
Jedi Concentrate is a very usefull application that fades out every part of the screen that does not belong to the active window. You can download it from the great website an app a day. The application is open source and uses only 44 Kb unpacked. All you need to do is unpack the application to any place on your hardrive and run it from there.
You see keyless doors all the time on tv, in series like 24 and alias for instance and every movie in which the military plays a part. They never have normal doors, they use keyless doors that work either by using fingerprints to identify the person and grant / deny access or keycards to do the same. It still sounds a lot like science fiction and I bet you never seen something like this on your neighbors door - so, why not be the first one who has this kind of device ?
Well this is just a little registry hack that changes the size of the thumbnails of images that are displayed in windows explorer by default. The default size is relativly small and most people surely would like a bigger size for the thumbnails to get a better preview of the images. To do that you have to add a new entry called ThumbnailSize to the following registry key:
I recently received some emails asking about the kind of hosting that I was using for ghacks.net and I decided that it would be a nice idea to write about it in an article. Ghacks is running on a dedicated server provided by the German company Hetzner with the following details: AMD Athlon 64 3700+ cpu, 2 GB DDR 400 Ram, 2x 160 GB SATA hard drives, unlimited traffic and Suse 10.0 as its operating system.
This topic has been covered before in my blog but I tend to take a look at older interesting topics from time to time and update them to reflect the changes that happened to the concept in the time between. One-Use-Emails, also known as Disposable Email Addresses and Throwaway Emails are really helpful when you do not want to give someone your real email address because you fear that they would abuse this information and probably sell the address to make a quick bug.
I started my gaming "career" on an Atari 2600 system with stunning games like River Raid and Pitfall, bought a C-64 later, then an Amiga and finally a PC. If your history looks similar you've come across many unforgetable moments and games - that is why I'am going to post this retro game article. Every game mentioned is free to download and play. I know that a top 10 is probably not enough because there are many great remakes out there but I had to limit my post somehow, therefor, it is only a top 10.
Songbird is a relatively new open source media player that is build from Mozilla and aims to revolutionize the media player market the same way firefox did to the browser market. Songbird is currently available in revision 0.2 "test flight" and runs on Windows 2000+, Linux and Mac just like firefox. Songbird comes with pretty much the same functionality as iTunes and more, due to the fact that it is based on the same core as firefox you can easily use songbird to browse between websites of radio stations, podcasts and blogs. Which means you play the songs and at the same time read what they have written in the same program.
System Safety Monitor 2 is available in a free version from the developers website. The tool basically works as a firewall preventing malicious software to be started automatically. The free version runs in paranoid mode which means you have to allow or disallow every process and get nagged quite a bit at the beginning. Once the majority of rules are established the software runs a lot smoother and seems to come forth only when you tend to install a new program or change existing ones.
I finally decided to make the switch from Operas M2 mail client to Thunderbird. The reason for the change was primary that the anti-spam combination Opera and Spamahilator was not working that well anymore and I thought that it would be better to have one single program to handle the spam and the mail. Thunderbird has a great working junk filter that seems to handle spam really well even after just a few days of working with the program.
I found a pretty small and useful open source application that pulls images from google images in a given interval and displays them as the wallpaper on the pc the application is running. Once unrared you can run the application right from that location without installation; you will see a small icon in your system tray if the application is running. Right-click the icon and select options.
Until yesterday it was only possible to download the 32-bit client version of the release candidate 1 of Windows Vista. Yesterday Microsoft added the Vista 64-bit client to the download list which can be downloaded through your browser by either using a direct download or Microsofts download manager. As usual this version is time limited and will stop working on June, 1st 2007. You will also need a product key for vista, I wrote a little article detailing the procedure to receive one.
Ever wondered where those guys in stormtrooper armor got their suits from ? Look no further, the Shepperton Design Studio is selling a complete Stormtropper armor for a very reasonable price. You can purchase the battle helmet for 299 British pounds and the suit (without helmet) for 999 British pounds. Both combined sell for 1299,95 pounds. The offers seems successful because currently all items are out of stock and will be available again in October.
You see lots of processes when you start your taskmanager, svhost.exe, csrss.exe, winlogon.exe and many more. A user who never dealt with those executables before has a hard time figuring out which are safe and which could be malicious because normally you can't say which program is using those files. A question like "Is svhost.exe a virus, is it safe ?" is normal and can be answered using the methods described below.
Ghacks is a technology news blog that was founded in 2005 by Martin Brinkmann. It has since then become one of the most popular tech news sites on the Internet with five authors and regular contributions from freelance writers.