Wednesday, March 18, 2015
Tuesday, March 10, 2015
The Top Torrent Sites of 2015
1.Demonoid.ph: this private membership community has resurrected itself at new domain name Demonoid.ph and Demonoid.pw. Some of you will remember how Demonoid was a very popular and trusted place to get files and stay informed on which torrents to avoid. Let's see if Demonoid can regain the same eminence at this new server site!
2.Kick Ass Torrents: this is a proven favorite amongst our readers. The interface is a distinctive earth color, and the search results display in a useful format of columns, including torrent health. The best part of Kick Ass Torrents is their comment and feedback system... the user community watches the quality of torrents, and offers their recommendations and warnings. The adult advertising can be annoying, but Kickass.to has an excellent library of torrents
3.SeedPeer.me: SeedPeer is a very large database of over 3 million torrent files. The search interface is simple, and the keyword cloud map helps as a discovery means to find interesting movies, tv shows, and music artists. Fans speak very highly of SeedPeer, so do consider trying it out. 4.Isohunt.to: Isohunt is reborn! After being shut down by the MPAA on October 17, 2013, Isohunt has been resurrected with a new domain name in a new country. Please support this longtime champion of P2P file sharing!
5.BitSnoop.com: is the largest known database of torrents today. With over 18 million indexed files, one could argue that this is the only site you'd need to search at. Try BitSnoop for yourself and see how it presents its results with its comments and ratings... you might like this site as much as other readers do.
6.Bitport.io: Bitpot is a newer 3rd party service in the Czech Republic. They don't give you torrents, but instead will download torrents for you onto their own private servers. Once your large files are transferred to them, you then log on and download the completed file directly to your computer. The free version allows 100MB per hour transfer. You can subscribe to get faster transfer speeds. Bitport is an excellent service, and considering the risks that they incur, the small $5/month fee is an excellent value for the customer.
7.VCDQ.com: VCDQ.com isn't technically a torrent search site; rather, VCDQ specializes in verifying torrents. VCDQ employs a committee of serious users to confirm that torrents do indeed exist for thousands of titles, especially brand new movie releases. Use VCDQ to confirm that a title is available, then copy the torrent name to paste into a search engine like Isohunt.com. Definitely give VCDQ.com a try; this is a great resource for avoiding fake torrent files.
8.Torlock: Torlock is special. These folks actually pay their users commission for uncovering fake torrents and reporting it to their community. In a world of phony files, this is a tremendous service. If you are a regular downloader, and are tired of wasted downloads and fraudulent files, give Torlock a try.
9. btscene.com: btscene is a longtime player in the file sharing game. This website does have annoying popups and adult advertising, but it does offer a solid library of torrents. It does a good job of featuring very recent torrents (good for people who follow television shows), and presenting many browsing choices at a glance.
10.ExtraTorrent.com: ExtraTorrent.com is very visual and very busy. But the thumbnails and file information at this site are tremendous. This site is definitely worth trying, as it is very browsing-friendly for discovering movies and music artists.
11.TorrentHound: at over 4.7 million torrents, TorrentHound is one of the largest players in the torrent P2P game. The site does enforce good use of 'white space' in the sidebars, so scanning the pages can be easier for most readers. Unfortunately, the comments counts are not included in the initial search results, so you'll have to click into the individual files to see reader comments.
12.Boxopus: Boxopus is like bitport.io, a 3rd party cloud downloader. The service does charge $1.50 to use for a week, or $50 for a year. If you want to integrate with Dropbox, then you'll need to look elsewhere, as Dropbox has blocked Boxopus torrents. But there are some very convenient features here that some readers really rave about. The price is actually very reasonable if you plan your downloads so that you can use the week-long access to its maximum.
13.Torrent Funk: Torrent Funk is a very popular torrent search site that now supports commenting. While Torrent Funk also supports 'verified status' tagging, which some people prefer to comments. The interface can be difficult to discern between sponsored ads and the actual torrent links. But the Torrent Funk site layout is pleasing, the cross- movie recommendations are very helpful, and several About.com readers highly recommended Torrent Funk. Give this site a try, and watch if it will grow over time.
14.The Old (New) Pirate Bay: The Pirate Bay was shut down in 2009, was reborn, and then shut down again in December 2014 (when Swedish police recently raided the Swedish server farm) . But The Pirate Bay refuses to stay down. This new Pirate Bay is renamed 'Old Pirate Bay', and credit goes to Isohunt for resurrecting this iconic website. How long will this fan-favorite website last? Anything could happen, so use this site while you can!
15.Torrents.to: this site has a Tonga country domain name, but certainly offers plentiful metasearching of movies and music in English and Spanish. There are some popup advertisements that are annoying, but perhaps you might like the framed interface for searching other torrent sites.
Monday, March 9, 2015
Ten Tips For Protecting Your Computer From Hackers And Viruses
1. Use protection software "anti-virus software" and keep it up to date.
Make sure you have anti-virus software on your computer! Anti-virus software is designed to protect you and your computer against known viruses so you do not have to worry. But with new viruses emerging daily, anti-virus programs need regular updates, like annual flu shots, to recognize these new viruses. Be sure to update your anti-virus software regularly! The more often you keep it updated, say once a week, the better. Check with the web site of your anti-virus software company to see some sample descriptions of viruses and to get regular updates for your software. Stop viruses in their tracks!
Make sure you have anti-virus software on your computer! Anti-virus software is designed to protect you and your computer against known viruses so you do not have to worry. But with new viruses emerging daily, anti-virus programs need regular updates, like annual flu shots, to recognize these new viruses. Be sure to update your anti-virus software regularly! The more often you keep it updated, say once a week, the better. Check with the web site of your anti-virus software company to see some sample descriptions of viruses and to get regular updates for your software. Stop viruses in their tracks!
2. Do not open e-mail from unknown sources.
A simple rule of thumb is that if you do not know the person who is sending you an e-mail, be very careful about opening the e-mail and any file attached to it. Should you receive a suspicious e-mail, the best thing to do is to delete the entire message, including any attachment. Even if you do know the person sending you the e-mail, you should exercise caution if the message is strange and unexpected, particularly if it contains unusual hyperlinks. Your friend may have accidentally sent you a virus. When in doubt, delete!
A simple rule of thumb is that if you do not know the person who is sending you an e-mail, be very careful about opening the e-mail and any file attached to it. Should you receive a suspicious e-mail, the best thing to do is to delete the entire message, including any attachment. Even if you do know the person sending you the e-mail, you should exercise caution if the message is strange and unexpected, particularly if it contains unusual hyperlinks. Your friend may have accidentally sent you a virus. When in doubt, delete!
3. Use hard-to-guess passwords.
Passwords will only keep outsiders out if they are difficult to guess! Do not share your password, and do not use the same password in more than one place. If someone should happen to guess one of your passwords, you do not want them to be able to use it in other places. The golden rules of passwords are:
Passwords will only keep outsiders out if they are difficult to guess! Do not share your password, and do not use the same password in more than one place. If someone should happen to guess one of your passwords, you do not want them to be able to use it in other places. The golden rules of passwords are:
- A password should have a minimum of 8 characters, be as meaningless as possible, and use uppercase letters, lowercase letters and numbers, e.g., xk28LP97.
- Change passwords regularly, at least every 90 days.
- Do not give out your password to anyone!
4. Protect your computer from Internet intruders -- use "firewalls."
Equip your computer with a firewall! Firewalls create a protective wall between your computer and the outside world. They come in two forms, software firewalls that run on your personal computer and hardware firewalls that protect a number of computers at the same time. They work by filtering out unauthorized or potentially dangerous types of data from the Internet, while still allowing other (good) data to reach your computer. Firewalls also ensure that unauthorized persons can't gain access to your computer while you are connected to the Internet. You can find firewall hardware and software at most computer stores nationwide. Do not let intruders in!
Equip your computer with a firewall! Firewalls create a protective wall between your computer and the outside world. They come in two forms, software firewalls that run on your personal computer and hardware firewalls that protect a number of computers at the same time. They work by filtering out unauthorized or potentially dangerous types of data from the Internet, while still allowing other (good) data to reach your computer. Firewalls also ensure that unauthorized persons can't gain access to your computer while you are connected to the Internet. You can find firewall hardware and software at most computer stores nationwide. Do not let intruders in!
5. Do not share access to your computers with strangers. Learn about file sharing
risks.
Your computer operating system may allow other computers on a network, including the Internet, to access the hard-drive of your computer in order to "share files". This ability to share files can be used to infect your computer with a virus or look at the files on your computer if you do not pay close attention. So, unless you really need this ability, make sure you turn off file-sharing. Check your operating system and your other program help files to learn how to disable file sharing. Do not share access to your computer with strangers!
Your computer operating system may allow other computers on a network, including the Internet, to access the hard-drive of your computer in order to "share files". This ability to share files can be used to infect your computer with a virus or look at the files on your computer if you do not pay close attention. So, unless you really need this ability, make sure you turn off file-sharing. Check your operating system and your other program help files to learn how to disable file sharing. Do not share access to your computer with strangers!
6. Disconnect from the Internet when not in use.
Remember that the Digital Highway is a two-way road. You send and receive information on it. Disconnecting your computer from the Internet when you are not online lessens the chance that someone will be able to access your computer. And if you have not kept your anti-virus software up-to-date, or don't have a firewall in place, someone could infect your computer or use it to harm someone else on the Internet. Be safe and disconnect!
Remember that the Digital Highway is a two-way road. You send and receive information on it. Disconnecting your computer from the Internet when you are not online lessens the chance that someone will be able to access your computer. And if you have not kept your anti-virus software up-to-date, or don't have a firewall in place, someone could infect your computer or use it to harm someone else on the Internet. Be safe and disconnect!
7. Back up your computer data.
Experienced computer users know that there are two types of people: those who have already lost data and those who are going to experience the pain of losing data in the future. Back up small amounts of data on floppy disks and larger amounts on CDs. If you have access to a network, save copies of your data on another computer in the network. Most people make weekly backups of all their important data. And make sure you have your original software start-up disks handy and available in the event your computer system files get damaged. Be prepared!
Experienced computer users know that there are two types of people: those who have already lost data and those who are going to experience the pain of losing data in the future. Back up small amounts of data on floppy disks and larger amounts on CDs. If you have access to a network, save copies of your data on another computer in the network. Most people make weekly backups of all their important data. And make sure you have your original software start-up disks handy and available in the event your computer system files get damaged. Be prepared!
8. Regularly download security protection update "patches."
Most major software companies today have to release updates and patches to their software every so often. Sometimes bugs are discovered in a program that may allow a malicious person to attack your computer. When these bugs are discovered, the software companies, or vendors, create patches that they post on their web sites. You need to be sure you download and install the patches! Check your software vendors' web sites on a regular basis for new security patches or use the new automated patching features that some companies offer. If you don't have the time to do the work yourself, download and install a utility program to do it for you. There are available software programs that can perform this task for you. Stay informed!
Most major software companies today have to release updates and patches to their software every so often. Sometimes bugs are discovered in a program that may allow a malicious person to attack your computer. When these bugs are discovered, the software companies, or vendors, create patches that they post on their web sites. You need to be sure you download and install the patches! Check your software vendors' web sites on a regular basis for new security patches or use the new automated patching features that some companies offer. If you don't have the time to do the work yourself, download and install a utility program to do it for you. There are available software programs that can perform this task for you. Stay informed!
9. Check your security on a regular basis. When you change your clocks for daylight-savings
time, reevaluate your computer security.
The programs and operating system on your computer have many valuable features that make your life easier, but can also leave you vulnerable to hackers and viruses. You should evaluate your computer security at least twice a year -- do it when you change the clocks for daylight-savings! Look at the settings on applications that you have on your computer. Your browser software, for example, typically has a security setting in its preferences area. Check what settings you have and make sure you have the security level appropriate for you. Set a high bar for yourself!
The programs and operating system on your computer have many valuable features that make your life easier, but can also leave you vulnerable to hackers and viruses. You should evaluate your computer security at least twice a year -- do it when you change the clocks for daylight-savings! Look at the settings on applications that you have on your computer. Your browser software, for example, typically has a security setting in its preferences area. Check what settings you have and make sure you have the security level appropriate for you. Set a high bar for yourself!
10. Make sure that anyone who shares your computer knows what to do if your computer
becomes infected.
It is important that everyone who uses a computer be aware of proper security practices. People should know how to update virus protection software, how to download security patches from software vendors and how to create a proper password. Make sure they know these tips too!
It is important that everyone who uses a computer be aware of proper security practices. People should know how to update virus protection software, how to download security patches from software vendors and how to create a proper password. Make sure they know these tips too!
Tuesday, March 3, 2015
Your phone now doubles as an Android TV game controller
So you want to play games on your Android TV set, but you'd rather not shell out for a gamepad? You might not have to in the near future. Google has revealed that an upcoming update to Google Play Services will let you use your Android mobile devices as controllers for Android TV games. If you want to start a four-way race or shooting match, you'll only have to ask friends to pull their phones out of their pockets. You'll have to wait for developers to use the technology before you can start playing, but that patience could pay off if it spares you from buying controllers that will likely spend most of their life gathering dust.
Don't miss out on all the latest from GDC 2015! Follow along at our events page right here.
Google's new mobile payment platform is called Android Pay
It's shaping up to be a big year for mobile payments, what with Apple Pay enjoying rapid adoption and Samsung finally getting in the game too. Google also has a presence, but it's only very recently decided to ramp up its efforts in this space. Last week, we saw the company team up with AT&T, Verizon and T-Mobile to preload its Wallet mobile payment app on new Android phones, and now it's creating a new framework to power payments across its OS.
Speaking at Mobile World Congress in Barcelona, Google SVP Sundar Pichai confirmed the existence of Android Pay, a platform that will allow developers to build payments into their apps. Don't think of it as a separate app like Wallet (especially as Wallet will utilize the Android Pay platform), but as an OS-level service that makes it easy for app makers or retailers to let you buy things using your Android device.
While Apple Pay lets iPhone users purchase goods in physical stores using NFC, it also provides tools allowing retailers to offer online checkout options using its platform. Pichai didn't go into too much detail as to how Android Pay will work, but did confirm that it will offer similar features to its rival. One is the use of tokenized card numbers, which reduce fraud by generating a one-time credit card number for each transaction. It's also a standard that Visa, MasterCard and American Express all support.
Don't miss out on all the latest news, photos and liveblogs from MWC 2015. Follow along at our events page.
Subscribe to:
Posts (Atom)