It is no secret that companies like Logistep are monitoring p2p networks to sue file sharers who are offering software from clients like Zuxxez, a German company who recently sued 500 British p2p users claiming that they illegally distributed the game Dream Pinball 3D. The website Torrentfreak got their hands on a copy of one of those letters that have been send out which details the process of how Logistep determines which users are illegally distributing the game.
I read an rather obvious article over at the TorrentFreak blog that was entitled "Piracy Investigators Infiltrate Private Torrent Sites" which confirmed that piracy investigators have been getting access to private torrent sites by either joining them when they were still open for registration or being invited from a man in the inside. It was always pretty obvious to me that private could not really mean private if the site owners did not know each of the users personally. This system was bound to fail right from the beginning and the article on TorrentFreak only confirms this.
Let me ask you a question: What do you do with old CDs and DVDs that have data on them ? Do you simply throw them away, recycle them ? What do you use to destroy the data on the disks ? If you never thought about this matter before and have a stash of used disks lying around you might want to take a look at the compact disk eraser. The disk eraser is a handy compact tool that wipes out CDs and DVDs environmentally friendly keeping the disks intact. You slide the disk once or more through the disk eraser creating a wide strip that can't be polished out.
Many novice users use the software that comes preinstalled with their purchased computer and rely on these to be safe from the dangers that lurk on every corner in the Internet. Trojans, Malware, Spyware, Phishing and worse are threats that every user should know about and be able to deal with. It is pretty easy to detail my security concept, it is not the most secure on earth but even those are not secure at all. If you want security do not connect to the Internet at all, that is my advise.
Rootkits received a publicity boost with Sony's rootkit infested CDs that was supposed to be some kind of copy protection. Since then rootkits have become an ever growing threat on the Internet in line with Viruses, Trojans, Phishing and Spam. The major problem with rootkits is that most users think that their virus scanner protects them from rootkits as well which is most of the time not the case. Rootkits are much harder to detect by normal means and software that can scan systems for rootkits should be used by inexperienced users to be able to detect at least the most common ones.
One of the many disadvantages of every new Windows edition is the fact that the operating system becomes more and more bloated. Microsoft adds new features to Windows which could then be used to exploit the system.Instead of concentrating on fast efficient systems they produce heavy systems that look shiny but have problems under the surface. Recently a vulnerability in Windows Animated Cursor Handling was discovered. In order for this attack to be carried out, a user must either visit a Web site that contains a Web page that is used to exploit the vulnerability or view a specially crafted e-mail message or email attachment sent to them by an attacker.
This article is going to show everyone, even the inexperienced, how to create a data safe that can store as much personal information and files as you want using the open source program True Crypt. True Crypt makes it very easy to encrypt almost every piece of hardware including partitions, hard drives, usb keys and other storage devices. Once everything is setup you would mount the True Crypt container using the password that you have selected while creating the encrypted container. This is actually the only password that you have to remember, everything else can be kept in the encrypted container for safety reasons.
I came upon the article "How I would hack your weak passwords" yesterday and pondered if I should write an article about it. I decided that it would be worth it. The author of the article details how he would try and find out your passwords and get access to all of your accounts in the end. His first approach would be to use the most common used passwords by users on the net. He needs information about your personal life for some passwords but those information can be obtained pretty fast through social engineering. Trying those "top 10" passwords would already cover a large percentage of online users, statistically speaking that is.
You might have come upon this problem during scans for viruses and Trojans on your system. A malicious file was identified by your favorite virus scanner and it prompts for action. You can delete, move, rename or move the file into quarantine. It is however not possible to delete malicious files when you choose to delete them because they are currently in use and can't be therefor deleted.
HiJack This is a very sophisticated security analyzer that generates an advanced report of various registry settings and files in your computer. The difference to many other security analyzers such as trojan scanners is that Hijack This makes not difference between "good" and "bad" settings but displays everything that it founds in its security log. It is then up to the user to find potentially harmful files and settings and remove them from his computer.
It is very convenient to save login passwords for internet sites such as forums, blogs or paysites to login quicker to those websites. That is, it is great until you can't remember the password anymore but would like to know it again. This could be the case if you want to switch from Internet Explorer to Firefox or Opera for instance. Protected Storage Pass View does not only reveal passwords that have been saved in Internet Explorer while accessing protected sites or using the auto complete form but also passwords that have been saved in Outlook Express and MSN Explorer.
A new kind of Trojan was discovered recently which targets only Japanese file-sharers. When executed the Trojan displays manga-like images with a reminder which differs depending on which image is displayed. The text however looks similar and always asks the user to stop using P2P networks. One of the messages for instance reads ""Ah, I see you are using P2P again...if you don't stop in 0.5 seconds, I'm going to kill you." Talk about a threat boy, jeeze."
20 minutes to increase the security of a computer, wow that must be a good guide. The guys at itsecurity have written a security guide that indeed covers the basics of PC security. I do know from first hand experience that many users do not follow simple PC security guidelines, e.g. they probably have a anti-virus solution but never update it.
Why would you need another program to block IP addresses if you already have a firewall ? A good question that can be answered easily. Peer Guardian uses a database of bad IP addresses and blocks them automatically as soon as the IP is added to the database of blocklist.org. A single user would have to know that a new IP (range) poses a thread and add it manually to his firewall.
USB Virus Scan is a nice little command line utility that performs predefined operations if a usb drive is connected to your computer. It is able to distinguish between various drives which means that you can add custom operations for the drives that you own and a general option for drives that are not recognized. The tool uses the volume serial number of the drives to identify them and perform the operation.
Do you know that your anti-virus solution is working ? You could try to test your anti-virus program against the EICAR (European Expert Group for IT-Security) test file to see if it reacts the way it should. All you need to do is create the testfile and scan it with your virus scanner. If the scanner detects something it is working as intended, if it does not you should consider changing immediately to a more reliable one.
There are times when it is safer to remain anonymous on the internet - be it that you want to write something about your current company on the web, live in a country that does everything to prevent it's citizens from accessing unbiased information or simply for the reason that you do not wish that someone could track what you are doing on the internet. In an ideal world every user should have the right to read and publish on the internet without the fear of loosing his job or life. The world however is not ideal and tools like FoxTor exist to help those people out.
Most internet users have serious troubles with passwords: they either choose to use the same password on all sites, use passwords that can be easily guessed by looking at the persons background or write all their passwords down to be able to look them up if they forget them. Only a few users use high quality passwords that they are able to remember.
Ghacks is a technology news blog that was founded in 2005 by Martin Brinkmann. It has since then become one of the most popular tech news sites on the Internet with five authors and regular contributions from freelance writers.