Latest News Papers | News Papers Online | Journal News Paper | Technology News Paper

Translate

Friday, November 11, 2011

The Top 10 Torrent Sites of 2010


As of January 23rd, 2010, several torrent search engines have distinguished themselves. This list is compiled from reader suggestions, and will be updated every several days.You are welcome to submit your own suggestions to be included in this torrent sites list. This list is in random order. Special thanks to the TechChunks.com readers who contact us regularly and made this list possible.
The Top 10 Torrent Sites of 2010 Where Downloaders Find Music and Movie Files.
Antivirus Warning for P2P Downloaders: before you use any download site or P2P network, make sure you install a reliable antivirus. While most P2P users are honest, there are malicious ones who will abuse P2P file sharing as a way to propagate viruses.
1. The Pirate Bay April 18, 2009: the Stockholm district court has sentenced the four Pirate Bay founders to a year in prison, and over $USD 3.5 million in fines. This is as punishment for violating their country’s copyright laws. More on this shocking court ruling here
2. YouTorrent.com Still in beta testing format, this new torrent site claims to be the largest legal torrent search engine today. Accordingly, the result sets are much smaller than the “pirate” counterparts, but definitely try this site for yourself.
3. Isohunt.com Currently in a legal dispute with the Canadian Recording Industry Association, Isohunt is a longtime favorite of P2P users. Isohunt indexes millions of torrents from thousands of the most popular torrent sites and displays the results according to number of seeds.The community at Isohunt also helps police abuse within their network, and reader comments and votes help to identify those torrents which should be avoided.
4. PizzaTorrent PizzaTorrent is another great torrent search engine to find movie torrents quickly. Their hompage lists the popular searches made. The best part about this search engine is that the results are sorted in categories like games, movies, music, anime, etc. The results are neatly displayed and there is no advertising on their site yet. You can sort results according to seeds, peers, and size. PizzaTorrent is an easy way to search for your requiredmovie torrents. Just like NowTorrents, you can install the plugin for searching as well.
5. Torrent Root: a metasearch engine, Torrent Root will pore through other search engines on your behalf, and display the results in a slick tabbed interface for your easy browsing. WARNING:the Torrent Root web page has recently been infected by scareware and phishing viruses. The webmasters seem to have purged the infection, but fair warning: with any P2P browsing, protect yourself by installing a reliable antivirus.
6. BiteNova (formerly known as “Bi-Torrents”, BiteNova is a free Torrent site with a spartan look and fast searching format.)
7. Demonoid.com is back online! After legal conflicts in April of 2008, they have reestablished themselves outside of the USA. Demonoid is still a private community, and members are held liable for any leeching that their invited friends do in this community. If you are lucky enough to get a Demonoid membership, invite your friends carefully, lest you lose your own membership.
8. CompleTorrent CompleTorrent is quite similar to TorrentScoop and is powered by google co-op as well. The unique thing about CompleTorrent is that you can search within different categories which makes your results more acccurate.
9. Alive Torrents Alive Torrents is a relatively new site. It focuses on torrents that have distinguished themselves as having a solid swarm base and an active readership.
10. TorrentScoop TorrentScoop is a torrent search engine powered by Google co-op. The results are quite impressive but you will not able to view seeds, peers, etc.
Legal warning for new torrent users: while P2P file sharing technology is completely legal, many of the files traded through P2P are copyrighted. Uploading P2P files may put you at serious risk of a civil lawsuit in the USA, Canada, Australia, and the UK. These lawsuits are usually class-action suits, filed against groups of users who blatantly copy and distribute copyrighted materials. Recently, the MPAA, the RIAA, and the governments of England and Australia took several thousand users to court, demanding that they pay thousands of dollars in copyright infringement penalties. These P2P lawsuits are very real, and whether or not they are successful, they are extreme financial and emotional burdens on the defendant.
ISP warning: your Internet service provider may choose to release logs of your downloading/uploading activity to potential copyright plaintiffs. The more megabytes you download/upload, the more you risk being sued by copyright protection groups.
If you have any other torrent site which can be used to search the latest movie torrentsdo share in the comments.

How to Send a Text Message (SMS) Using Email


Many of you are not aware that you can send text messages to a cell phone from your email inbox. Read on, to learn the simple technique of how to send a text message from your email inbox. And it’s free too!
In today’s technologically enhanced and short messaging service utilizing environment, more and more people are learning how to send a text message from email. There are many advantages to this, the least among them being the cost factor. Instead of getting an amount added to your phone bill, you are sending a text message from email, which is free. Moreover, many users would find typing a text message via a keyboard more comfortable than typing it from a traditional cell phone keypad. Others of us may not even have cell phones (or at least not cell phones with text messaging).
How to Send a Text Message (SMS) from Email
If you fall into one of these categories and still find yourself in a position where you just need tosend a text message you have another option: using your email service. Almost everyone has an email account, nowadays and these accounts are widely used for a variety of purposes. So why not use them to send text messages to cell phones as well? From the receiver’s point of view this is convenient as well, as they receive the information as a simple text on their phone and do not have to check their email inbox. So, are you still wondering how to send a text message from email?

How to Send a Text Message from Email

This is a very simple task and anyone can do it easily. All you have to do is make a change in the ‘send to’ box, and you can send your text message from your email account itself. Each cell phone service provider has a domain name that you can send the text message to, via email. Once you have received the email domain of the receiver’s cellphone service provider, you can easily send a text message from email to cell phone. All you have to do is that type that person’s phone number in the ‘send to’ box and then follow it with ‘@ name of the cell phone service provider’s email domain’. It’s as simple as that.
______________________________________________________
The different email domains for various cellphone service providers are as follows.
- AT&T: number@txt.att.net
- Qwest: number@qwestmp.com
- T-Mobile: number@tmomail.net
- Verizon: number@vtext.com
- Sprint: number@messaging.sprintpcs.com or number@pm.sprint.com
- Virgin Mobile: number@vmobl.com
- Nextel: number@messaging.nextel.com
- Alltel: number@message.alltel.com
- Metro PCS: number@mymetropcs.com
- Powertel: number@ptel.com
- Suncom: number@tms.suncom.com
- U.S. Cellular: number@email.uscc.net
- Cingular: number@cingularme.com
By simply typing the number before these domains, you can learn how to send a text message from email to cell phone. For example, if you wish to send a text message from email to cell phone of someone who uses Verizon service provider, and their number is 243-567-8978in the ‘send to’ box you will write ’2435678978@vtext.com’. This is the address you will send the text message to.
Filling in the subject line is optional, but it is advisable to just leave it blank. Displaying a subject line in a text message is quite meaningless. Ensure that your text message does not exceed 160 characters though, because if it does the entire message may not be displayed on the receiver’s phone. If you have to send a longer text message, send 2 separate messages. Also remember to remove your email signature before you send the message.

Flow Chart (Sending SMS via Email)

1. Log into your email or open your email program like Outlook Express.
2. Start a new message.
3. Type the recipient’s 10 digit cell phone number @ the cell carrier’s email domain in the address box. For example if the message recipient uses Verizon it would be cellnumber@vtext.com. Sometimes there’s a special domain for text messaging; check with the cell carrier’s web site.
4. Type your message making sure it doesn’t exceed 160 characters, otherwise it may get cut off.
5. Send your message.
That’s it. As you can see sending a text message (SMS) from email to a cell phone is pretty easy. Isn’t it? 

18 Cell Phone Security Tips to Protect You Against Identity and Information Theft


In this world of information and identity th3ft it is no more a privilege to use a cool cell phoneand brag about it too! In past, crooks used to require more physical ways to lay their hands on your hard earned money. But with the advancement of technology and the prevalence of electronic transactions, now it is just a matter of wrong steps (plethora of information being conveyed in private conversations being conducted publicly or retrieve the data stored in mobile phones) before you would find your money vanished from your a/c and you would have lost your identity too!
In light of all these facts and potential threats, it is imperative to take concrete defensive action safeguarding your personal information. It can be difficult to sacrifice convenience for safety, but it is a necessity in these electronic times. Remember, it only takes seconds for your personal information to be transmitted to a criminal network. And it takes an experienced cyber-criminalmuch less time to steal your identity, resources, and good name than it took you to establish them.
Use this list to help you protect your information in this cellular world:
1. Make sure you know the make and model of your phone, the phone number, the serial/IMEI number, the PIN number and the descriptive details of the phone including color, shape, size and identifying features. Taking a picture of your phone is helpful. Staple the picture to a sheet of paper with the details noted above. If your cell phone is ever stolen, the police will need this information to help with their investigation.
Cell Phone Security 18 Tips to Protect Your Phone
_______________________________________________________
2. Contact the network with whom you have service as soon as you realize your cell phone has been stolen. Ask that they block your phone across all networks so service cannot be obtained with another provider.
3. Use the PIN or security lock code option available with your phone to lock your phone when it is not in use. This will keep your valuable personal information safe from a th1ef who gains access to your phone.
4. A limited number of phones have a remote lock capability. If your cell phone has that option, familiarize yourself with how to do it and set up your phone for it. The feature will allow you to lock your cell phone and your memory card.
5. Use an ultraviolet marker to place a security mark on your cell phone and battery. It is recommended that you use two numbers of significance to you. Do NOT use an account or PIN number. You can use your zip code, your house number, a lucky number.
6. Clear your text messages and calendar entries as soon as possible. Entries of significance or sentimental value can be forwarded to your home email and printed out or stored on your computer’s hard drive.______________________________________________________
7. Never elect to have passwords saved on your device or to stay logged on to your accounts from your cellular phone. Though it may save you a few precious seconds, it can cause you significant harm which will require a substantial amount of the time you cannot afford to waste.
8. Allowing your browser history to be saved for lengthy periods of time can offer some useful information to a savvy th1ef.  Make sure your settings are such that eliminate the history as quickly as allowed. Let your home computer be the place you store that type of information if you must.
9. Protect your friends and families from identity th3ft. Do not keep comprehensive contact information stored in your phone. Imagine the harm that could befall your loved ones if you were to have their names, birthdates, email addresses, and relationship to you saved for anyone to see.
10. When engaged in a conversation in public, do not readily reveal personal data. If it is required, save the conversation for a time when you are in private. If the phone cal cannot wait and you must provide this type of information only do so if you have access to a secure area which limits the potential for strangers to overhear.
11. Don’t leave your phone out when it isnt’ in use. No point in making a th1ef’s job easy, is there? Keep your cell phone away whenever possible.
12. Register your cell phone with The National Mobile Property Register. This will make the process of getting your phone returned to you easier for the police. Report your cell phone missing, lost, or stolen as soon as you notice it.
13. Do NOT leave your phone visible in the car when you leave it there. Half of all cell phone th3fts occur in vehicles.
14. Do NOT open texts from unknown or unfamiliar sources. These could be malicious software waiting to steal your information or encouraging you to visit a particular website with the intent of retrieving certain information.
15. Report suspicious activity or issues with service immediately. Overage charges could be caused by malware texts or by someone gaining access to your service and using to attack other people.
16. Avoid using downloadable software unless it is from a trusted source or has been deemed acceptable by a trusted source.
17. Disable remote capabilities when they are not in use to limit the opportunity for information being retrieved in that manner.
18. Encrypt your information if you must keep it on your cell phone. Some devices offer the option to encrypt files or the software to do it.