Help2go has some useful information about why every windows user needs a linux live cd. First, you need it if you need information out of your computer and windows seems to have a problem starting or behaves abnormaly just in the moment you need it most.
The article created a lot of feedback, mostly positive on the subject and I would like to take the opportunity to thank everyone for their comments and present your thoughts in this new article.
Most visitors agreed that the decision of the RIAA to turn on its customers badly damaged their image and unfortunatly that of musicians as well. It seems to a lot that they don´t care as much about the music than they care about profits.
The first trojan using Sony´s rootkit software to hide itself has been discovered by anti-virus companies.
We read it in the news everyday. The major music industry players like Sony BMG or EMI are reporting losses all over the place and blame it solely on internet pirates. Internet pirates are actually a very good excuse for bad times. Hard facts do not exist and no one is able to check on the numbers the MI provides for losses due to internet pirates.
They don´t seem to realize that they criminalize their own customers with measures like copy protected cd´s and rootkit software installed on customers pc.
The news spread like fire last week: Sony has a installer on some of their music cd´s that might install a rootkit on customers pc´s if they put them into their personal computer. The rootkit software could not be uninstalled by normal means and has already been used by hackers to hide World of Warcraft cheat scripts from being detected by Blizzards Warden client.
Here is another of those online proxy sites that allow you to surf without revealing your ip at the destination site. Its available at xanproxy.be
Cd´s and Dvd´s have the nasty habit to become unreadable due to data loss or aging at the very moment when one needs them most. Dvdisaster creates error correction codes to compensate read errors which are not correctable in the CD/DVD drive.
If you ever sold or bought a used hard disk you probably know about this already. For all others, even if you use delete and format to clear the hard disk before selling it there are possibilities to recover most and possibly all data that was once on the hard disk.
There have been numerous cases in the news where people bought used hard disk and found confidential files on them using tools to recover deleted data. Enter Darik's Boot and Nuke.
I´ve been using spamihilator for the last two years and can only say that this is the best free anti spam software that I ever used. And believe me, I tried a lot. Before i used the software I recieved approximatly 500 spam mails per day, mainly due to published emails on websites that I own.
I searched desperately for a good anti spam software and tried many. Most did not work to well in reducing spam, some worked to well and even stopped my normal mail from arriving. Then, finally after a long evaluation time I found the spam software that I´am still using today. It reduced my daily spam dosis of 500 to 4 in just two days.
Yesterday I´ve written a short tutorial about streamripping and one of the questions that occured was if its possible to rip real audio music as well. Today i present a guide on how to rip the real audio format.
Rapid leech is a fine server script that is able to download files from sites like rapidshare using a server instead of your home connection which speeds up the download process. You need of course a server to install the script and run it from there.
Streamripping means saving mp3 files from internet radio streams to your hard drive. All you need is the right tool that does the work for you and your favorite radio station that broadcasts on the internet and uses a format supported.
This article will give you a tutorial on how to start streamripping and legally download all the latest mp3 files to your computer. I can´t speak for all countries though so you better check out if recording music from radio is legal in your country.
Picostick is only 6K in size, making it one of the smallest windows applications ever. It is a small post-it-note utility in your Windows(tm) taskbar icon tray. It is easy to use, come with striking color, and will not clutter your computer screen at all.
This one is pretty useful, its called SilentNight Micro CD/DVD/ISO/AUDIO Burner. The tool is just above 1 Mb in size and fits easily on and can be run from a single floppy disk. There is no installation required, just unpack and run the tool, makes it ideal for mobile usage as well.
It has come to our attention that World of Warcraft Hackers already are using Sonys Rootkit Software to hide their hacking from Blizzards Warden Client.
We reported earlier this week that some Music Cds by Sony labeled "Content enhanced & protected" would bring up an installation program when the music cd was put into a personal computer.
If you ever had the problem that you needed a good graphics suite and always thought the Adobe Photoshop line of products was far to expensive then GIMP might be the right software for your. The biggest advantage, its completely free, you don´t pay a dime for it.
And another player joins the rangs of the companies that might install spyware with their Music Cds when you put them into your pc drives. "Fontana Distribution, part of Universal Music Group and distributors for Upstairs Records Inc., are encouraging the independent records labels they distribute to use content protection on their CDs. "Twelve Eighteen", featuring the hit song "Summer Nights", carries the same content protection currently being used by Sony BMG.
John Lopez of Upstairs Records commented: "we are very pleased with the seamless production of the album. The media player on the CD has a good user experience and we intend using the technology on more new releases."
Most banks in Europe offer a new service on their internet pages. When a user has to enter his login data he has the option to enter the password using a keypad that is displayed on the screen using a java applet. The user then clicks on the numbers and they appear in the password field. This is done to prevent the keylogging of the password.
The Anti-Keylogger does the same thing, only difference is, that its a tool that is started like every other windows program. After the tool is started you simply use the displayed keys to enter your passwords or other data on websites or even local programs.
Ghacks is a technology news blog that was founded in 2005 by Martin Brinkmann. It has since then become one of the most popular tech news sites on the Internet with five authors and regular contributions from freelance writers.