Saturday, December 29, 2012

StartW8: Free Start Button for Windows 8

Download StartW8 1.1.34.0
Ever since Microsoft released the new Windows, we’ve seen a few solutions to bring the Start Button back into the lower left hand side corner of the desktop. StartW8 is yet another alternative that could take over the sweet spot in Windows 8.

Like most apps taking over the responsibility of the orb in Windows 7, StartW8 is free of charge and does not attempt to push additional software on your system. Installation went smooth in our case and no restart was required in order to complete the operation.

Although StartW8 looks very much like the original menu, a regular user accustomed to Windows 7 should be able to spot this is a replacement fairly easy.

On the other hand, users are interested in its functionality rather than its looks, and StartW8 is slightly different than what we’ve seen until now.

As soon as installed, StartW8 places its custom button in the lower left corner of the desktop. Clicking on it reveals a familiar view, with search bar, program list, power button and the side menu.

You can switch the list of frequently used programs to show all the applications installed on the system, although the change does not occur automatically just by hovering the mouse over.

Given the position of the button, one would expect it to completely eliminate the original functionality of that corner in Windows 8; but StartW8 preserves its purpose so users can easily switch to the modern UI Start Screen with the mouse instead of keyboard shortcuts, as possible in other programs sharing the same purpose.

The context menu for StartW8 does not resume to giving access to the configuration panel of the application and includes a few useful shortcuts as well (Run, Windows Explorer, Command Prompt (with admin elevation, too) and power options: Hibernate, Sleep, Shutdown, Restart, Sign Out, Switch User and Lock.

Worth mentioning is that not all these power options are present in programs of the same category. In some cases, the hibernate button is missing.

The configuration panel is extremely simple and it comes already set up to suit most users’ needs. It is split into two sections that allow you to define the behavior of the OS after signing in, the default action triggered by the power button and to customize the side menu.

The default action for the power button can be any of the power options available in the Start menu (Hibernate, Sleep, Shutdown, Restart, Sign Out, Switch User and Lock).

Out of the box configuration makes the application switch to the classic desktop environment instead of the modern Start Screen. This can be easily changed under the “Basic Settings” panel. Here’s also the place to enable hotkeys (Win or Ctrl+Esc) for launching StartW8’s menu.

Furthermore, you can disable the bottom left hot corner button. This feature has been freshly added in this version of the program.

In the case of the side menu, the options include links to personal folders (Documents, Music, Images, Music, Videos, etc.) as well as system areas, such as Control Panel, Devices and Printers or the list of default programs.

There is also the possibility to add the Run command to the menu, though advanced users can easily call it through the traditional Win+R hotkey.

StartW8 is pretty far from mimicking the functionality of the original orb in Windows 7 and further proof is the fact that new entries are not highlighted. On the same note, the list of frequently used programs is not dynamic, so it will not change as you launch the same entry over and over again; not even after a computer restart.

Once that space fills up, you can start deleting old entries in order to make room for new ones. The application does not offer the possibility to pin items to the start menu.

During our tests, StartW8 seemed to respond to our commands slower than applications of the same kind.

Also on the downside, there is no automatic update mechanism available or the possibility to receive alerts about a new version being available. As such, users have to check for new updates manually from the “Settings” panel.

The computer requires a restart after installing a fresh update for all the changes to take effect.

The Good

It can boot the system into the familiar desktop environment instead of the modern Start Screen. It offers easy access to power actions such as hibernate and sleep as well as to personal folders (documents, music, videos, images).

The Bad

You cannot add your own shortcuts to the start menu. New applications are not highlighted in the menu. We noticed it moved a bit slow compared to applications in the same category.

The Truth

StartW8 makes for a valid alternative as a start button for Windows 8. It is easy to work with and to configure. However, there are choices on the market that provide a wider range of features.

Download StartW8 1.1.34.0

Hackers Steals 36,000 Individual Details from US Army Database

Earlier this month, unknown hackers managed to gain illegal access to the details of around 36,000 individuals who were somehow connected to the US Army command center formerly located at Fort Monmouth.

According to APP, the details of Communications-Electronics Command (CECOM) and Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) personnel were accessed by the hackers.

Nongovernmental personnel and Fort Monmouth visitors are also affected by the breach.

The hack, discovered on December 6, exposed names, dates of birth, social security numbers and salaries, Army representatives said. After the incident, the targeted databases have been taken offline.

CECOM and C4ISR were relocated from Fort Monmouth to Aberdeen Proving Ground back in September 2011.

The affected individuals are being offered one year of free credit monitoring services.

Friday, December 28, 2012

Android Trojan Capable of Launching DDOS Attacks from your Smartphone

Security researchers from Russian firm Doctor Web have come across a new Android Trojan they call Android.DDoS.1.origin. The piece of malware can be used for various malicious tasks, including to launch distributed denial-of-service (DDOS) attacks and to send SMS messages.

For the time being, it’s uncertain how the Trojan is distributed, but experts believe the cybercriminals might be disguising it as a legitimate Android application.

Once it’s installed on a smartphone, the malware creates a fake Google Play icon on the desktop. When executed, this shortcut opens the real Google Play in order to avoid raising any suspicion.

After being executed, the Trojan connects to a remote server, sends it the victim’s phone number, and waits for further SMS commands.

The masterminds of Android.DDoS.1.origin can send various SMS commands. One of them orders the infected device to start sending out packets to a certain server, basically launching a DDOS attack against it.

While this only affects the phone’s performance, there are other activities that can be done by this threat. For instance, the cybercriminals can order the device to start sending out SMS messages to certain numbers.

These SMSs can be used to sign up the victim for premium mobile services or they can be utilized to send out spam.

Messages can also be sent to premium rate numbers, inflating the victim’s phone bill and implicitly filling the fraudsters’ pockets.

“Activities of the Trojan can lower performance of the infected handset and affect the well-being of its owner, as access to the Internet and SMS are chargeable services. Should the device send messages to premium numbers, malicious activities will cost the user even more,” experts noted.

Doctor Web has updated its products to ensure that its customers are protected against this threat.

XSS and Cookie Handling Vulnerabilities Identified on HTC Website, Allows Attacker to Hijack Account

16-year-old security researcher Thamatam Deepak has identified a number of three cross-site scripting (XSS) vulnerabilities and a cookie handling flaw on the website of world-renowned smartphone manufacturer HTC.

The expert said the vulnerabilities – which affected pages such as product security, account information, and smartphone presentation – have been addressed by HTC after he notified them, according to The Hacker News

If unfixed, the XSS vulnerabilities could have been leveraged by a remote attacker to inject arbitrary content, while the cookie handling flaw might have been exploited to hijack user accounts.

This isn’t the first time when security experts find XSS bugs on HTC’s website. Back in April, researcher Shadab Siddiqui identified similar flaws and reported them to the company.

However, at the time, they failed to respond to his notifications and the vulnerabilities remained unfixed for months.

Google begins scanning of Chrome Extensions & Stops Auto-Install

Google has taken two steps to prevent its Chrome browser becoming an attack vector for malware that runs as extensions to the browser.

Like many other browsers, Chrome allows users to install “extensions”, apps that add functionality. Google even runs the “Chrome Web Store” to promote extensions.

Security outfit Webroot recently pointed out that some of the extensions in the store are illegitimate, data-sucking privacy invaders that trick users with offers to do things like change the colour of Facebook and then suck out all their data.

Google has responded in two ways, one of which is a new service “To help keep you safe on the web” that will see the company “analyzing every extension that is uploaded to the Web Store and take down those we recognize to be malicious.”

Changes are also coming in the forthcoming version 25 of the browser, which will no longer allow extensions to install without users’ knowledge. That’s currently possible because Chrome, when running on Windows, can is designed to allow unseen installs “to allow users to opt-in to adding a useful extension to Chrome as a part of the installation of another application.”

“Unfortunately,” Google now says in a blog post, “this feature has been widely abused by third parties to silently install extensions into Chrome without proper acknowledgement from users.”

Chrome 25 will therefore remove the auto-install feature, replacing it with a new system that presents the Windows Vista-esque screen below when extensions try to ingratiate themselves with the browser.


As ever, Google’s blog posts and support notice on the changes position them as responsible enhancements that show, yet again, Google is doing the world a favour.

A more critical analysis could consider the announcements in light of malware found in Google Play and take Google’s decision to more aggressively curate the Chrome Web Store as an admission it needs to devote more attention to this stuff, lest Chrome and other Google products become malware-ridden quagmires that users don’t trust.

Default Configuration Flaw in W3 Total Cache Exposes Tens of Thousands of Sites

wordpress
W3 Total Cache, which boasts high-traffic sites like Mashable and Lockergnome among its users, has serious vulnerabilities, according to this post on the Full Disclosure list.

The default setup – that is, when users simply choose “add plugin” from the WordPress catalogue – left cache directory listings enabled, according to poster Jason Donenfield.

This, he said, allows database cache keys to be downloaded on vulnerable installations – and that could expose password hashes. “A simple google search of "inurl:wp-content/plugins/w3tc/dbcache" and maybe some other magic reveals this wasn't just an issue for me”, he writes.

Donenfield later amended the search term to “inurl:wp-content/w3tc”.

“Even with directory listings off,” he continues, “cache files are by default publicly downloadable, and the key values / file name of the database cache items are easily predictable.”

Donenfield says the developer of the plug-in intends to release a fix “soon”. In the meantime, he notes that “deny from all” should be set in the .htaccess file.

Friday, December 21, 2012

WinReducer: Customized Windows 8 Installation Disk

Windows 8 installs faster and uses less disk space than Windows 7 operating system . But if you want to build a custom installation of Windows 8 , it is necessary to take the help of third party tools.

Many Advanced users of Windows 8 are in search of quality software to customize and modify the installation of Windows 8 by removing some features and applications, they will be pleased to know about the availability of a free software called WinReducer 8 to customize the installation of Windows 8.

WinReducer 8 is a portable application, and its downloadable ZIP archive contains both 32-bit and 64-bit versions of the tool. After extracting the files, simply execute the appropriate version for your computer.


The application is currently in alpha, though everything it offers works as advertised. The main interface is minimal, and pffers ‘Open’ and ‘Change Mount Folder’ buttons. Note that if you are using an ISO file of Windows 8 setup, you’ll need to extract all the files from the ISO package into a separate folder before proceeding. You can use your favorite comressed files utility for the purpose; we recommend the free and excellent 7-zip.


Open to select the said directory, point to the disk drive with your Windows 8 installation disc or choose the folder where you extracted the ISO’s contents, select your Windows 8 edition and click Mount.


Sit back and let the application fetch all the information contained within the ISO or physical disc, after which it will let you customize the setup.


The tool will let you select any unwanted features that you want to exclude. Simply mark the the components that are not required such as Accessories, Drivers, Fonts, Languages, Themes, Services etc., under the Components Reducer tab.


The Customization tab helps you make further optimization and tweaking, for instance you can remove the Charms bar, hide desktop icons, remove files and settings from Windows Explorer, clean unneeded files and so on. Likewise, it allows you to select a default Lockscreen, Wallpaper, and custom theme.


The Unattended feature of the tool is a big time saver. It lets you specify your Windows 8 serial number, so you don’t have to enter it each time you performing the installation. In addition, you can select a custom background image for the setup program, provided the image dimensions don’t exceed 1024 x 786 pixels.


Once everything is in place, apply your changes and let the tool work its magic based on your selection.


Lastly, select ‘Save in WIM file and create a new ISO’. You may also change the destination folder, ISO name, and ISO label before hitting Save to create the ISO.


This test was carried out on windows 8, 64-bit edition

10,000 Emails of Indian Government and Military Hacked

India’s government and military have suffered one of the worst cyber attacks in the nation’s history, after over 10,000 email accounts belonging to top officials were compromised, despite a warning from the country’s cyber security agency.

The attack came on 12 July, four days after the government was warned by the National Critical Information Infrastructure Protection Centre (NCIIPC), part of the National Technical Research Organisation (NTRO), that some sophisticated malware was spotted targeting specific individuals and organisations.

News of the attack was revealed at a day-long NCIIPC meeting in New Delhi this week, according to the Indian Express.

Email addresses belonging to officials working at the Prime Minister’s Office, defence, home, finance and external affairs ministries and intelligence agencies were nabbed in the attack, which has been blamed on state actors.
“The Ministry of External Affairs and Ministry of Home Affairs took the biggest hit, plus strategic information related to critical sectors, including troop deployment, was compromised,” an NTRO official told the Express.

“Paramilitary forces were also badly hit, especially the Indo Tibetan Border Police (ITBP), as deployments were revealed. There were serious cases of negligence, the involvement of insiders, if any, is also being checked.”
India’s most prolific foe in cyber space is thought to be Pakistan, but the frequent skirmishes between the two tend to involve web site defacements and the occasional DDoS attack from various hacktivist groups.

Back in March, minister for communications and IT, Sachin Pilot, revealed that over 100 government sites had been compromised in this manner between December 2011 and February 2012, while the India CERT said there were 834 defacements of .in sites in January alone.

However, the attack in July appears to have been more co-ordinated and carried out with the aim of obtaining specific information.

The NTRO was tight-lipped on the source of the attack.

“We would not like to name the state actors but D4 — destroy, disrupt, deny and degrade — process was initiated and counter offensive launched,” the NTRO official told the Express.

Back in June reports emerged that India’s National Security Council was finalising plans to give the NTRO and Defence Intelligence Agency (DIA) the power to carry out unspecified offensive operations if necessary.

Saturday, December 15, 2012

30 Windows Phone 8 Tips, Hacks & Tricks

Windows Phone 8 handsets has finally reached retail shelves, which means anyone can get their hands on Microsoft's latest mobile operating system. The company has detailed several of the platform's features -- Live Tiles, the new Start Screen, Kids Corner, a revamped Camera, and more -- but whether you're a Windows Phone veteran or thinking about buying your first Windows Phone device, there's a lot to learn with Windows Phone 8.

We've collected some of the most useful tips, tricks and hidden features that you'll encounter in Windows Phone 8. Got any suggestions we didn't mention here? Let us know in the comments.

1. Making a Skype call

Once you have downloaded the Skype app from Windows Marketplace, you'll find it within your apps drawer. Open the app and enter your Skype log-in details. If you don't have a Skype account, you can choose to log in with your Microsoft (Hotmail) account instead. Once you're in, you can browse your recent calls and see who is online. To make contact, select your intended recipient, then type a message for a text chat, or press the phone button at the bottom to make a call.

2. Send a "running late" message

Under "calendar" you can view all the appointments you have added. If one of these appointments includes another person -- your colleague, friend, or whoever you're supposed to be meeting -- you can send them a message to let them know you're running late.

To do this, go into your calendar, and select the appointment in question. At the bottom you'll see four options, one of which is titled "late" and is indicated by an icon of a person running. Press this and a message will be automatically generated with some standard apologetic text that can be edited or sent as is.

3. Saving battery life

Under settings is a "battery saver" option. When it's switched on, you'll get more hours of battery life, but keep in mind you'll need to manually check for new e-mails, and apps will no longer run in the background. At the bottom is a summary of how much battery life you have left, assuming you don't suddenly start streaming cat videos on a loop.

When this feature is turned on, you can tap on "advanced" at the bottom of the screen (it's grayed out when the feature is off) and choose a point at which it should automatically turn on, or if it should stay on all the time.

windows-phone-8-tips

4. Identify a song or its performer

Using Xbox Music and a data connection, Windows Phone 8 can listen to a song and then try to tell you what it is. This is done by pressing the search button at the bottom right, then hit the middle option under whatever image Bing has chosen to display. It's the one that's signified by a musical note. Once pressed, the phone will display "listening for music..." If a song is found, it will then show the artist and the album it's from, so you can download it there and then. If not, you'll be presented with the option to try again.

5. Take a screenshot

This is a nice, easy trick. Navigate to whatever you want to capture a shot of and then press the lock/power and home (Windows) button at the same time. If you've timed it right, you'll then hear a camera snap and the image will float upwards into the digital ether.

To find your screenshot, go into "photos" and then "albums." Here you'll find a "screenshots" subfolder.

6. Translating text

Handily, translating a menu or a road sign that's in another language is possible with Windows Phone 8. It does require you to have a data connection though, as the data is sent off to Microsoft's servers which then respond to your phone. Assuming you are happy with the roaming charges if you're abroad, press the search button at the bottom of your phone (the button on the right of the three). Now hit the button shaped like an eye to make the camera start up, allowing you to scan barcodes, QR codes, and the like. Press "scan text" to take a picture of the text and then hit "translate."

If the phone throws up an error, try taking the image again from straight on. Once it's successfully recognized the text, select a language from the list you wish to translate to, and Windows Phone 8 will do its best to make it comprehensible.

7. Linking e-mail in-boxes

If you like to keep your e-mail in-boxes tied together so that all your mail arrives handily in one place, you can use the "link in-boxes" option. Simply go into one of the e-mail accounts you want to link and hit the bottom ellipsis. Select "link in-boxes" and then choose the two in-boxes you want to link up.

You can easily unlink the in-boxes at a later date in exactly the same way. Choose the e-mail client you want to unlink by selecting it and just hit "unlink." You can also rename in-boxes while in this menu.


8. Editing a photo

Once you've taken or downloaded a photo, navigate to the image you want to edit and then hit the ellipsis symbol in the bottom right-hand corner. You'll then see a number of options, from which you should select "edit." From there you'll have access to a couple of options: crop, rotate and auto-fix, or Creative Studio.

Select the former and again hit the ellipsis (this feature is continually present throughout Windows Phone 8) to reveal "save," "rotate," "crop," and "fix." The rotate tool moves the image 90 degrees each time you hit it. "Crop" brings up a grid you can use to slice and dice your image by moving each of the colored corners. When you're happy with your crop, hit the check mark, or instead just choose from any one of the predetermined aspect ratios.

Finally, hit "auto-fix" to see if it improves your photo quality. When images are dark and/or murky, this can prove useful, but the effect can vary from image to image. All that's left is to save your image, which you'll find under "camera roll" for future access.

9. Kid's corner

To keep younglings and pranksters at bay, Windows Phone 8 includes a feature called Kid's Corner. To activate it, head to settings to find the option (it should be between the "location" and "battery saver" settings if you're struggling), and turn the feature on. You'll then see a number of further options, including games, music, videos, and apps. This is where you select the content you deem suitable for the eyes of others, which you can tick to include when the feature is active.

Once you're happy with your selection, hit "launch kid's corner" to see how it all looks.

Now that Kid's Corner is set up, you can access it by swiping your finger from right to left. Now you should see Kid's Corner and will be able to then swipe from down to up to remove the lock screen. And hey, presto -- you'll have a more child-friendly smartphone, which denies access to the phone, e-mail and any other key functions that you would like to keep off limits.

10. Adjusting text size

Under settings is an option called "ease of access." Here you can slide a bar up to increase or decrease the text size in order to make reading easier. You can also enable "high contrast" to improve legibility, a screen magnifier and turn on TTY/TDD -- the telecommunications system used to assist those with hearing or speech difficulties.


11. Make tabs more handy

Pop into Internet Explorer and hit the Stop icon. Scroll down to select "settings," and from here you have the option to adjust a number of features. The one you want is "use address bar button for," which you can select and then pick from the three favorite options, one of which is tabs. If you choose this function, you can jump between tabs without having to go into the options menu.

12. Customizing Windows Phone 8

Windows Phone 8 allows you to personalize your phone. Tiles can be resized by holding down on them on the home screen, or from within the apps drawer. Once in edit mode -- indicated by one tile lighting up and the rest graying out -- you can either press the bottom-right arrow to adjust the size, or unpin a tile by hitting the top-right pin button. It should be noted that unpinning is not the same as uninstalling.

To reposition a tile, drag it around with your finger, and when you're happy, quickly press the tile to exit the editing mode. If you have multiple tiles to move, just select the next live tile to adjust and keep going until you're satisfied with the new arrangement.

You can also adjust the accent color, as it's known, under settings and then "theme." Pick a color and choose whether you want the background to be light or dark. Go back to settings, and you'll find another option called "lock screen." Press this and you can customize the tabs you see on the lock screen, with the further option to pick one primary tab.

13. Searching a Web page

Within the browser is a search tool called "find on page." It was previously taken out of Windows Phone with the Mango update, but now it's back. When in Internet Explorer, press the ellipsis icon and select "find on page" toward the bottom of the list. Type in your search query and press enter. All text found in the search will show up in your chosen accent color, and there's an arrow key to scroll through all the findings at the bottom of the display.


14. Keyboard shortcuts

When using the onscreen keyboard, you can hit the "&123" option to jump between text, symbols, and numbers. To save time, though, you can hold down your finger on each key to pull up other options, including numbers, accents or, in the case of the ellipsis button, other useful symbols such as a question mark. For languages, you can jump between each one you've installed almost instantly. Handy, eh?

Other useful functionality built into the keyboard includes a word picker. Type a few letters of a word and suggestions will appear above. Move right and left between them with a swipe and then pick one by pressing it. Finally, a double tap of the space bar adds a period and a space for the next sentence.

If a word is typed that the keyboard doesn't recognize, you can press it to highlight and then hit the "+" symbol above to add it to the dictionary for future use.

15. Adding a language

Head back into the main settings menu and select "language+region." Here you can select a language, with an option to download and install it. Once done, you can easily jump between the languages you need.

If you want to adjust the speech language, head to general settings and then "speech" -- it's further down the list from "language+region." Once again, you can tailor the languages for each feature including the text-to-speech voice.

16. If in doubt, tap and hold

I've briefly mentioned this before, but I can't stress enough the importance of this tip. If you're not sure how to use something, either use the ellipsis button or press and hold down until options appear. Windows Phone 8 is pretty simple to use, but if you ever are perplexed, this should be the solution you seek.

17. Copying and pasting

If there's text on screen, you can press it and it will highlight. To highlight multiple words, the two end circles can be dragged along to select all the text you want to include. It can prove fiddly, so on a Web page try to zoom in (by pinching the screen with two fingers) to make life easier.

Once something has been copied, you can paste it using the clipboard option that will appear above the onscreen keyboard.

18. Using your phone as an Xbox 360 remote control

If your Xbox is online and your Windows Phone is on the same network (under settings you can find "Wi-Fi" and connect to your home router), you can download and install the Xbox SmartGlass app formerly known as My Xbox Live. Once installed, open the Xbox hub, select the app, and then make sure your Xbox is also turned on. The app will then sign you in, before giving you control of your Xbox.


19. Using the cloud

If you download and install the Skydrive app, you can manage your cloud storage on the go, but even without the app you can still enjoy access to the cloud. When you've taken a photo, you can press the ellipsis button and select "upload to Skydrive."

You can also choose and store multiple photos at once. Press the "select" button at the bottom of the display when in you're in an image folder and then check off the images you want to share or upload. Again, select "save to Skydrive" and then watch as all your photos are uploaded.

20. Making your media sound better

On the Nokia Windows Phone devices, you can pop in your headphones and then adjust the sound quality via the "audio" option under general settings. You can choose between a selection of predetermined settings, or fiddle about with the equalizer yourself. Alternatively, you can enable Dolby playback by swiping right and hitting "playback."

Although bass lovers may be tempted to bump up the equalizer's lows, the best sound quality in my experience comes from the Dolby option. Other factors including headphones may also affect the end result.

21. Multi-tasking

While not strictly multitasking in the Android sense, Windows Phone 8 has its own system for handling multiple jobs at once. To jump between tasks that are running, hold down the back button until the screen minimizes and color appears around the display. Now swipe left or right between tasks and select the one you need.

22. Paying for goods with NFC

Depending on the retailer, you can now pay for goods using your phone, making it into a kind of digital wallet. Simply hold your phone to the NFC pad in the shop and the phone will do the rest -- as long as you have "tap+share" enabled under general settings.

Unless you've already added a credit card or PayPal to your Microsoft Account (which you will have done if you've ever paid for an app or a song), you'll need to enter your payment details within the "wallet" feature found in the app drawer. Here you can press the "+" at the bottom and then type in the necessary details.

If it's somewhere you visit regularly, it's worth asking the shop whether it supports NFC so that, in the future, you can save yourself from digging out your card and typing in a pin number.


23. Taking notes

Unlike in Windows Phone 7, OneNote is its own entity in Windows Phone 8. Head to OneNote from within the app drawer and you can make, edit, or share notes to your heart's content. To search for a specific note, use the magnifying glass, and press the "+" key to add a new note.

As long as you have a data connection, changes you make will sync across the cloud, your notes will update on every device you own that has OneNote capability. No more e-mailing yourself a shopping list.

24. Creating and editing documents

Last but not least, you can create and edit documents. Pop into the Office hub and then press the "+" at the bottom to add a new document -- you can choose from Word and Excel -- and then start typing. You can also choose from templates if you so desire.

When in a document, select the ellipsis icon to bring up the available options. "Outline" lets you jump between sections quickly, whereas "comment" lets you add comments to a shared document, so you can let people know what you are working on or what needs changing. You can also search for a specific word or phrase, and of course edit the document itself. When you press "edit," it's a case of scrolling through the document and tapping on words, before using the onscreen keyboard to make adjustments.

Bring up the options menu at the bottom when you're editing and you can select format options -- color, font size, text size, and so on -- and then share your finished piece via e-mail.

25. Power Down

When your battery is running low, Windows Phone 8 has a special trick to help prevent total power loss. Just go to Settings and turn on the Battery Saver option. Doing so tells the OS not to run any apps in the background or sync email automatically. You’ll still be able to make and receive calls and texts, but everything else will require manual syncing (opening up the app and choosing to sync). You can choose for Battery Saver mode to kick in only when your battery is actually low, or keep it on at all times. A little heart over the battery icon tells you when the phone is in Battery Saver mode.


26. When You're Running Late

Windows Phone 8’s built-in Calendar has a Late button option that comes in handy when you’re behind schedule. Tap the button in an event and the app will draft an email addressed to all of the people invited to or attending that event. The default text: “I’ll be a bit late, but I’m on my way. See you soon.” You can edit or just hit send to use it as is. We only wish this could send late notices to contacts via text too.


27. Get From A to Z

It’s not immediately obvious how you should navigate your People hub contacts. If you’ve added all of your social networks -- Facebook, Twitter, LinkedIn -- then the list of people can get too long to just swipe through. For quicker navigation you can just tap the header letter of a section, the “a” at the top, for example, and get a large overlay of all the letters in the alphabet. Tap one and hop over to that section of your contacts. Of course, you can always just tap the search icon at the bottom and type in your contact’s name.


28. Blocked Number

Remember back when you had to dial *69 to block your phone number and caller ID when making a prank call or dialing the number of your crush, who you were too afraid to speak to? Windows Phone 8 lets you choose who to show your caller ID to. You can select everyone, no one, or your contacts.


29. Attach Your Location

In Windows Phone 8 you can compose a text, tap the paper clip icon, and attach your location directly to the message. If your contact has a Windows Phone, they’ll receive a thumbnail of your location on the Maps app, which they can open up from there. If they have any other kind of phone, they’ll get a link that will open up in their browser.


30. Internet Explorer Buttons

Internet Explorer is speedy and smooth in Windows Phone 8, but it does have some quirks. For one, there’s no easy way to switch through tabs. But you can change this. By default, there is a stop/refresh button to the left of the address bar located at the bottom of the screen. If you go to the settings in IE, you can actually change that button to be either tabs, favorites or stop/refresh. We personally recommend the tabs button, since it’s much easier to switch through all of your windows than having to open up a separate menu.

Friday, December 14, 2012

Microsoft Confirms Internet Explorer Security Flaw that allows Hackers Track Mouse Moves

Microsoft is investigating a possible flaw in its Internet Explorer Web browser that allegedly enables attackers to track users' mouse cursor anywhere on the screen, even if the browser window isn't in use.

The alleged flaw, which security firm Spider.io says it discovered a few months ago, compromises the security of virtual keyboards and virtual keypads in all supported versions of the browser since IE6, the security firm reports.

"As long as the page with the exploitative advertiser's ad stays open -- even if you push the page to a background tab or, indeed, even if you minimize Internet Explorer -- your mouse cursor can be tracked across your entire display," the security firm said in a statement.

Even the security-conscious are at risk of having their cursor movements recorded, Spider.io warned. "An attacker can get access to your mouse movements simply by buying a display ad slot on any Web page you visit," the security firm warned, adding that any site from YouTube to The New York Times would be a possible attack vector due to ad exchange activity.

At least two display ad analytics companies are exploiting the suspected vulnerability (see video below demonstrating the issue) to see what people are looking at online, Spider.io said.

The security researcher said it informed Microsoft of the issue on October 1 but that the software giant doesn't appear to be in a hurry to patch the vulnerability.
"Whilst the Microsoft Security Research Center has acknowledged the vulnerability in Internet Explorer, they have also stated that there are no immediate plans to patch this vulnerability in existing versions of the browser," the firm said in a statement. "It is important for users of Internet Explorer to be made aware of this vulnerability and its implications."
Microsoft appeared to downplay the issue, blaming competition between analytics companies.
"From what we know now, the underlying issue has more to do with competition between analytics companies than consumer safety or privacy," Dean Hachamovitch, VP of Internet Explorer, said in a company blog post this afternoon.

"We are actively working to adjust this behavior in IE," he wrote, adding that there are similar capabilities in other browsers. He promised to update the blog when more information becomes available.

Thursday, December 6, 2012

RIM gives out BlackBerry 10 smartphone for free

Research in Motion Thursday introduced the BlackBerry 10 Ready Program to help prepare business customers for the launch of the next-generation OS on Jan. 30.

Participants in the program can get a free BlackBerry 10-based smartphone.

The four-part program is also intended to prepare users for the BlackBerry Enterprise Service 10, the name RIM is using for the next generation of BlackBerry Enterprise Server.

RIM hasn't said when Service 10 will launch, although it is due about the time of the launch of the BlackBerry 10 and two new smartphones on Jan. 30.

The Ready Program consists of a webcast series and the BlackBerry 10 Ready Offer for the smartphone, RIM said.

The Ready Offer includes a free BlackBerry 10 smartphone for customers with technical support and advantage level, or higher, contracts with RIM, that's subject to completion of an online learning course.

More information on the Ready Program is available online.

The weekly webcasts will offer tips on the products included in the Jan. 30 launch. Online registration is required.

The last two of the program's four components will be offered in January.

RIM also said that customers will be able to trade up BlackBerry Enterprise Server licenses for more than a year, up to Dec. 31, 2013. The trade-up will be available with an online tool to be announced starting in January.

Also a set of services with be offered online in January and more details can be obtained by emailing RIM at: BB10EnterpriseServices@rim.com

Kaspersky Anti-Virus & Internet Security 2013 Final + Key

Kaspersky Anti-Virus & Internet Security 2013 provides a wide range of technologies to protect your privacy and your identity – including two unique security features for entering personal information online.

Secure Keyboard is a new Kaspersky technology that automatically activates whenever you open a bank website or payment website – or you enter a password within any web page – to ensure that information you enter using your physical keyboard can’t be accessed by keyloggers

For our ultimate protection, Kaspersky’s improved Virtual Keyboard feature allows you to use mouse-clicks to enter your banking information – so that keystrokes can’t be tracked or stolen by keyloggers, hackers or identity thieves

Prevents malware from exploiting vulnerabilities in your PC

If your PC has application or system vulnerabilities that haven’t been updated with the latest fixes, cyber criminals and malware could gain entry. In addition to scanning for vulnerabilities, Kaspersky Internet Security 2013 analyses and controls the actions of programs that have vulnerabilities – so they can’t cause any harm.

Keeps your children safe and responsible

Award-winning family protection features help you to keep your children safe and also give you greater control over your children’s access to the PC, the Internet, applications, games and websites. You can block, limit or log your children’s Instant Messaging and social network communications – and block the transfer of private data, such as phone or credit card numbers.

Compatible with Windows 8

Kaspersky Internet Security 2013 is fully compatible with Microsoft’s latest operating system – Windows 8 – and is integrated with Microsoft’s latest IT security innovations. In addition, Kaspersky Now – a new application that has been developed to support Microsoft’s new user interface – lets you monitor your PC’s security status and launch vital security features.

Identifies suspicious websites and phishing websites

Advanced anti-phishing technologies proactively detect fraudulent URLs and use real-time information from the cloud, to help ensure you’re not tricked into disclosing your valuable data to phishing websites. Our URL Advisor also adds colour-coded tags to all web links – to advise you of the danger level of the link and subsequent pages.

Download

Kaspersky AntiVirus

Kaspersky Internet Security

Kaspersky AntiVirus Key

0E0A7B9F.key
0E0E3271.key
0E138758.key
0E2F719B.key
0E494F82.key
0E5CEDF1.key
1118D639.key
1175578C.key
11C5E29C.key
12270E7B.key

Kaspersky Internet Security Key

114447A2.key
1279BD2F.key

Wednesday, December 5, 2012

New Set of Bugs discovered in MySQL

mysql.png
A series of posts on ExploitDB by an author signing as "King Cope" reveal a new set of MySQL vulnerabilities – along with one issue that could just be a configuration issue.

The vulnerabilities, which emerged on Saturday, include a denial-of-service demonstration, a Windows remote root attack, two overrun attacks that work on Linux, and one privilege escalation attack, also on Linux.

The overflow bugs crash the MySQL daemon, allowing the attacker to then execute commands with the same privileges as the user running MySQL. “King Cope” also demonstrated a user enumeration vulnerability.

The privilege escalation vulnerability, in which an attacker could escalate themselves to the same file permissions as the MySQL administrative user, has provoked some to-and-fro on the Full Disclosure mailing list, with one writer stating that “CVE-2012-5613 is not a bug, but a result of a misconfiguration, much like an anonymous ftp upload access to the $HOME of the ftp user.”

Red Hat has assigned CVEs to the vulnerabilities, but at the time of writing, Oracle has not commented on the issues.

Microsoft Releases So.cl Network to the Public

so.cl-microsoft.PNG
Microsoft’s "experiment in open search", so.cl, is now open to anyone.

Launched back in May amidst very little fanfare, so.cl (pronounced "social") was initially offered only to students and billed as an experiment in learning.

Redmond has recanted those restrictions, today telling world+dog they’re free to pile in and enjoy the fun, as so.cl is now "a service where people connect over shared interests."

So.cl is rather unlike other social networks inasmuch as a post starts with a search. The results of that search can then be assembled into a post that brings together the user’s desired elements.

Many users post just a single image. Others take a more curatorial approach, collecting several images related to the same topic in a fashion not entirely unlike creating a Pinterest collection.

Redmond’s not building a walled garden, as Facebook is a permitted login mechanism and so.cl’s About page states it is not in competition with other social networks.

Socl — pronounced social — allows you to express and share your ideas through rich post collages comprised of images, links, captions and videos.
"Socl is a research project from Microsoft Research FUSE Labs and began as an experiment in social search targeted at students for the purpose of learning. Following the lead of the Socl community, Socl has since evolved to be a service where people connect over shared interests expressed through beautiful posts that take only seconds to create", says Microsoft.
Whether Redmond will be still be saying that if, or when, it embeds a so.cl tile in the default Windows 8 start screen remains to be seen.

Wednesday, November 28, 2012

International Atomic Energy Agency server hacked

A group of hackers leaked email contact information of experts working with the International Atomic Energy Agency (IAEA) after breaking into one of the agency's servers.

The group published a list of 167 email addresses along with its manifesto on Sunday in a post on Pastebin.

IAEA hacked
"Some contact details related to experts working with the IAEA were posted on a hacker site on 25 November 2012," IAEA spokeswoman Gill Tudor said Wednesday in an emailed statement. "The IAEA deeply regrets this publication of information stolen from an old server that was shut down some time ago. In fact, measures had already been taken to address concern over possible vulnerability in this server."
The hacker group calls itself Parastoo and wants the IAEA to investigate Israel's nuclear activities at the Negev Nuclear Research Center near Dimona, an Israeli city located in the Negev desert. "Israel owns a practical nuclear arsenal tied to a growing military body and it is not a member of internationally respected nuclear, biochemical and chemical agreements," the group said.

Israel has long had a policy of nondisclosure regarding its nuclear military capabilities and has never signed the international Treaty on the Non-Proliferation of Nuclear Weapons (NPT).

The experts whose email addresses were leaked should sign a petition demanding that IAEA investigate the activities at Dimona, the hacker group said, claiming that it has evidence of "beyond-harmful operations" taking place at the site.

Parastoo threatened to published information on the whereabouts of every single individual on the list together with their personal and professional details, saying that all of them could be considered responsible if an accident was to happen at Dimona.

"The IAEA's technical and security teams are continuing to analyse the situation and do everything possible to help ensure that no further information is vulnerable," Tudor said. "The Agency treats information security, including cybersecurity, as a top priority and takes all possible steps to ensure its computer systems and data are fully protected."
The IAEA is an international organization that promotes the safe and peaceful use of nuclear energy and discourages the proliferation of nuclear weapons. The agency reports issues of non-compliance by states to the United Nations General Assembly and Security Council.

Thursday, November 15, 2012

Download the Best 2013 AntiVirus Software for Free

Antivirus software is used to prevent, detect and remove malware (of all descriptions), such as: computer viruses, adware, backdoors, malicious BHOs, dialers, fraudtools, hijackers, keyloggers, malicious LSPs, rootkits, spyware, trojan horses and worms. Computer security, including protection from social engineering techniques, is commonly offered in products and services of antivirus software companies. This page shares some of the best antivirus for 2013 that are tested and trusted.

Update: I received so many feedbacks complaining that the zip file is password protected, so I've updated the links and you should have no problem unzipping the files now. 

1) Anti-Virus Guard (AVG) 2013

Anti-Virus Guard (AVG) 2013
Anti-Virus Guard (AVG) is a family of anti-virus and Internet security software for the Microsoft Windows, Linux, Mac OS X, and FreeBSD computing platforms, developed by AVG Technologies, a publicly traded Czech company formerly known as Grisoft.

AVG features most of the common functions available in modern anti-virus and Internet security programs, including periodic scans, scans of sent and received emails (including adding footers to the emails indicating this), the ability to "repair" some virus-infected files, and a quarantine area: "virus vault/chest" in which infected files are held.

Download

2) Norton AntiVirus (2013)
Norton AntiVirus 2013
Norton AntiVirus, developed and distributed by Symantec Corporation, provides malware prevention and removal during a subscription period. It uses signatures and heuristics to identify viruses. Other features include e-mail spam filtering and phishing protection.

The 2013 edition of Norton AntiVirus beat all other current products in malware removal test and rated high with the independent labs as well. Its multi-layered protection can block new attacks at many levels, it blocks attacks on system vulnerabilities, and it offers useful bonus features. It's a great choice.

Download
Norton AntiVirus Final Activation

Update: I received so many feedbacks complaining that the zip file is password protected, so I've updated the links and you should have no problem unzipping the files now.

Saturday, November 10, 2012

Teenage Hacker ‘Cosmo the God’ sentenced to six years – WITH NO INTERNET

“Cosmo the God” in a park near his home in Long Beach, California.

A 15-year-old hacker convicted of multiple felonies was handed an unusual sentence by a Long Beach, California juvenile court on Wednesday, one that will see him all but banned from the internet until his twenty-first birthday.

The hacker's real name was not disclosed because he is a minor, but according to a report, he goes by the handles "Cosmo" or "Cosmo the God."

As a member of the notorious UG Nazi hacker collective, Cosmo participated in an online reign of terror involving many of the year's most significant hacking events, including a DDoS attack that brought down Twitter for several hours.

Cosmo was finally nabbed in June, following a coordinated law enforcement action that also led to 23 other arrests, spread across eight US states and 13 countries. He was eventually arraigned on a laundry list of charges, ranging from credit card fraud, to identity theft and online impersonation, to making bomb threats.

Had he stood trial and been convicted, he faced a sentence of three years in prison. Instead, he pleaded guilty to all of the charges against him, in exchange for a six-year probation that will allow him to avoid incarceration – for a price.

Under the terms of his plea bargain agreement, Cosmo cannot use the internet without the prior consent of his parole officer, for the duration of his probation. Even then, he cannot go online "in an unsupervised manner," and he cannot use the internet for anything but education-related purposes.

Furthermore, he must turn over the usernames and passwords for all of his online accounts, and if he has access to any devices that are capable of connecting to a network, he must identify them to the court in writing. The devices the court already knows about – the ones that were seized in the FBI raid on his home – won't be returned.

Finally, Cosmo is to have no contact with any members of UG Nazi or Anonymous, nor their associates, nor a list of "other individuals," as specified by the court.

Violate any of those terms, and he goes straight to the slammer for the full three-year bid.

Chinese government blocks Google.com, Gmail, Google+, Maps, Docs, Analytics, Drive, more


Google has experienced a precipitous drop in traffic from China, which a Web-monitoring group attributed to the search engine being "blocked" by the government.

Data provided by Google's Transparency Report shows a sharp drop off in traffic -- to roughly half the normal amount -- to Google's Web sites as of early this morning California time.

GreatFire.org, which performs real-time monitoring, suggested that the drop meant the Chinese government is "one step closer to fully separating the Chinanet from the Internet."

It wasn't immediately clear whether the block was intended to be long-lasting, or whether it's been lifted and Chinese Internet users will be able to connect to Google when they wake up. It's 3:50 a.m. in Beijing right now.

Google has been wrestling with censorship in China for more than half a decade. In April, Google Drive was blocked. Even after switching to a Hong Kong domain in 2010, sensitive topics remained off-limits.

Google has issued our representatives a statement today saying: "We've checked and there's nothing wrong on our end."

Monday, October 29, 2012

IObit Advanced System Care 5 License Key Code 2012

Advanced SystemCare (formerly Advanced Windows Care) is a computer tool for Windows 7, Windows XP, Windows Vista and Windows 2000 created by IObit. It is used to improve computer performance and speed.

Advanced SystemCare includes a free version and a PRO version. Functions on both versions include cleaning up computer registries, do a disk defragmentation, scan for malware, and clean up broken shortcuts.

Differences between Free and Pro version

Free version's functionality include basic system clean, fix, and optimization, as well as basic protection from security threats. The Pro version includes more automated tools: Fuller system tune-up for speed, clean windows registry in depth, automatic and active optimization, malware & spyware scan and removal, 24/7 technical support, automatic updating, and different skins and themes.[citation needed] In short, the Free version includes less utilities and functionality than the pro version. The Pro version is very similar to the Advanced Vista Optimizer and are both comprehensive PC tuneup tools.

License Key

D735F-51E93-1B1E4-C8AD4

Update: It's still working.

Tuesday, October 16, 2012

Microsoft Surface Priced: 32GB For $499 Without Touch Cover, $599 With; 64GB For $699

Microsoft's Surface tablet pricing has been outed by the software giant.

Earlier today, Surface pricing was posted on the Microsoft Store online site. Not long after, the page was taken down, seemingly because the pricing information was put up on the site before it was supposed to go live.


Based on that screenshot, it appears Microsoft will sell its Surface with Windows RT for a starting price of $499 with 32GB of storage and a Touch Cover. Those who want a Touch Cover included in the order will need to set aside $599 for the device. Adding an additional 32GB of storage will push the Surface's price up to $699.

Microsoft unveiled its Surface tablet earlier this year. The RT version comes with a 10.6-inch screen and a 1,280 x 720 resolution. The device is expected to be Wi-Fi-only, and its Touch Cover add-on works as a screen protector, stand, and keyboard. Surface for Windows 8 Pro is expected to launch after the Windows RT version, and will come with a "full HD" 1080p screen resolution. That device will likely be more expensive than the Windows RT model.

Windows 8 is scheduled to launch on October 26. Windows RT, which will be running on the Surfaces leaked on the store site, will run on ARM processors. Microsoft will also sell Windows 8, Windows 8 Pro, and Windows 8 Enterprise versions. Those models are not compatible with ARM-based chips.

Wednesday, October 3, 2012

How to Use BTGuard to Completely Anonymize your Bittorrent Traffic

If you're using BitTorrent without taking special measures to hide your activity, it's just a matter of time before your ISP throttles your connection, sends you an ominous letter, or worst case, your ISP gets a subpoena from a lawyer asking for your identity for a file-sharing law suit. Here's how to set up a simple proxy to keep your torrenting safe and anonymous.


Note, you don't need to be doing anything illegal. Maybe you just want to keep Big Brother out of your business and from throttling your connection. Either way, if you really want to keep your activity private, your best bet involves routing your BitTorrent connection through an external service. BTGuard is a dead simple BT-focused proxy server and encryption service, and it's my service of choice. Below, I'll explain what it does, how it works, and how to set it up to privatize and anonymous your BT traffic.

How BTGuard Works

When you download or seed a torrent, you're connecting to a bunch of other people, called a swarm, all of whom—in order to share files—can see your computer's IP address. That's all very handy when you're sharing files with other netizens, but file sharers such as yourself aren't necessarily the only people paying attention. Piracy monitoring groups (often paid for by the entertainment industry either before or after they find violators) also join BitTorrent swarms, but instead of sharing files, they're logging the IP addresses of other people in the swarm—including you—so that they can notify your ISP of your doings. A proxy (like BTGuard) funnels your internet traffic—in this case, just your BitTorrent traffic—through another server, so that the BitTorrent swarm will show an IP address from a server that can't be traced back to you instead of the address that points to your house. That way, those anti-piracy groups can't contact your ISP, and your ISP has no cause to send you a harrowing letter.

But wait, can't the piracy groups then go to the anonymizer service (BTGuard) and requisition their logs to figure out that you're the one downloading the new Harry Potter? Theoretically, yes, but the reason why we chose BTGuard is because they don't keep logs, so there's no paper trail of activity leading back to you. All the piracy monitors see is BTGuard sharing a file, and all your ISP sees is you connecting to BTGuard—but not what data you're downloading, because it's encrypted.

If you subscribe to an ISP that throttles BitTorrent traffic, and aren't using an anonymizer service, you have an additional problem. Your ISP can still see what you're doing, and if they detect that you're using BitTorrent—even if you're using it for perfectly legal purposes—they'll throttle your connection so you get unbearably slow speeds. When you encrypt your BitTorrent traffic, your ISP can't see what you're using your connection for. They'll see that you're downloading lots of information, but they won't be able to see that it's BitTorrent traffic, and thus won't throttle your connection. You still have to be careful of going over your ISP's bandwidth cap, however, if that exists.

BTGuard offers you both a proxy (to combat spying) and encryption (to combat throttling)—though many torrent clients have encryption built-in as well.

First, BTGuard isn't free. At $7/month (as little as $5 if you pay for a year in advance), it isn't very expensive, and we think it's well worth it if you want to torrent anonymously. A law suit settlement, if it comes to that, will cost you at least a couple thousand dollars, which equals a couple decades of BTGuard subscriptions, so keep that in mind, too. The other potential downside is that piping your downloads through another service may decrease your upload and download speeds. How much depends on what torrent you're downloading, who from, and a lot of other factors, but just know that it's a possibility. In my experience, more popular torrents stayed at their top speed of 1.4 MB/s (my bandwidth cap) with a proxy, while other less popular torrents (which flew at 1.4MB/s without a proxy) would fluctuate around 200 or 300 kB/s with BTGuard in place. Again, though, a little longer wait on downloads is well worth the protection you get.

Lastly, proxies aren't supported by every client, which means you'll have to use one with more advanced features. uTorrent (for Windows) and Vuze (for Windows, Mac, and Linux) both support proxies, but sadly Mac and Linux favorite Transmission does not. (If you're absolutely stuck with a client that doesn't support proxies, check the end of this article for some alternative solutions to the anonymity problem.)

How to Set Up BTGuard

BTGuard has a one-click install process, but we're going to show you how to do it the manual way, since it works in any BitTorrent client that supports SOCKS5 Proxy—not just the ones supported by BTGuard's installer. It'll also give you a better sense of what exactly BTGuard does, so if you run into problems, you'll have a better idea of how to fix it.

Step One: Sign Up for BTGuard

First, sign up for an account over at BTGuard.com. It'll just take a minute, and then you can get to configuring your client. Their BitTorrent proxy service costs $6.95 a month, but you can get discounts by buying multiple months at a time (up to a year's service for $59.95). Once you're done, you should receive an email telling you that BTGuard is ready to go.

Step Two: Configure Your Client

Next, open up your torrent client of choice and find the proxy settings within its preferences. In uTorrent, for example, this is under Preferences > Connection. Your client may have them in a different place (Google around to find out where), but no matter your client, your settings should look like this:

  • Proxy Type: Socks v5
  • Proxy Host: proxy.btguard.com
  • Proxy Port: 1025
  • Username: Your BTGuard username
  • Password: Your BTGuard password
You'll also want to make sure you're using the proxy for hostname or tracker lookups as well as peer-to-peer connections, so check all boxes that say anything like that. You'll also want to disable connections or features that could compromise the proxy, so check all the boxes under uTorrent's "Proxy Privacy" section, or anything similar that your client may have. Hit Apply, exit the preferences, and restart your client. Your proxy should now be active.


Step Three: See If It's Working


To ensure that it's working, head over to CheckMyTorrentIP.com. This site can tell you what your IP address is, and compare it to the IP address of your torrent client, which will let you know whether your proxy is working correctly. To test it, hit the "Generate Torrent" button, and open the resulting torrent in your client. Then, go back to your browser and hit the Refresh button under the "Check IP" tab. If it's the same as your browser IP—which you'll see next to the Refresh button—then your proxy isn't working, and you'll want to double-check all of the above settings. If it shows a different IP address (often from another country like Germany or Canada), then BTGuard is successfully tunneling all your traffic for you.

Step Four (Optional): Enable Encryption

If you want extra security (or if you're trying to protect your connection from being throttled), you'll also want to encrypt all that traffic. Many clients have this feature built-in. In uTorrent, for example, just head to Preferences > BitTorrent and look for the "Protocol Encryption" section. Change your outgoing connection to Forced encryption, and uncheck the "Allow incoming legacy connections" box. From there, you should be good—your ISP shouldn't throttle your connection after this is enabled.

If your client doesn't support encryption, or you want a more powerful encryption behind your torrenting, BTGuard offers an encryption service as well. Just head to their Encryption page, download the software, and install it to C:\BTGUARD (this is very important; don't change the installation directory). Then, start the BTGuard Encryption program (accessible from the Start menu), and open up your BitTorrent client. Change your proxy server from proxy.btguard.com to 127.0.0.1, restart your client, and you're golden. Again, this isn't necessary if your client already supports encryption, but it is an extra layer of protection if you really want to keep everything private.

BitTorrent isn't the safe place it once was, and if you're going to use it to share and download files, we highly recommend getting some sort of protection from the services above so you can avoid DCMA notices and throttled speeds. Got any other tips for keeping your file sharing on the down low? Share them with us in the comments