Mazur 17.05 Build V1.2

Total Page:16

File Type:pdf, Size:1020Kb

Mazur 17.05 Build V1.2 Bezpečnosť a možnosti zachovania anonymity na Internete Filip Mazúr Bakalářská práce 2016 ABSTRAKT Prvá čas ť obsahuje možné nástrahy dnešného Internetu a prí činy ktorými prichádzame o anonymitu, súkromie či citlivé dáta. Presne definuje najrozli čnejšie útoky, vírusy a spôsoby, ktorými disponujú moderní kyber-kriminálnici. V druhej časti zase zh ŕň a a preveruje spôsoby na zachovanie bezpe čnosti a anonymity. Od jednoduchých nástrojov umož ňujúce čiasto čnú anonymitu až po tie komplexnejšie sľubujúce vysokú mieru bez- pe čnosti a ochrany súkromia, či už pri komunikácii cez Internet alebo po čas prehliadania ľubovo ľných stránok. Zárove ň publikácia odpovie na otázku či je dnes ešte vôbec možné dosiahnu ť úplnej nevidite ľnosti na Internete za použitia vo ľne dostupných prostriedkov. Kľúčové slova: anonymita, bezpe čnos ť, internet, po číta čové siete, identita, ochrana údajov ABSTRACT The first part contains possible different threats of today Internet, which causes loss of an- onymity, privacy and sensitive data. It precisely defines many different attacks, malwares and ways which are used by the modern kyber-criminals. The second part includes and examines different ways to preserve the security and anonymity. From the simplest tools allowing partial anonymity, we will go through the most comprehensive, promising the complex anonymity and security, either when communicating over the Internet or while browsing any website. Also, the publication will answer the question if it's still even possi- ble to achieve complete "invisibility" on the Internet, by only using a freely available tools. Keywords: anonymity, security, internet, computer networks, identity and data protection Po ďakovanie Ďakujem pánu doc. Ing. Ji římu Vojteškovi Ph.D. za odborné rady, pomoc a trpezlivos ť pri tvorbe tejto bakalárskej práce. Taktiež ďakujem nášmu oddeleniu po číta čových sietí UTB za overenie správností faktov, ktoré tvora hlavné piliere tejto práce. Prohlašuji, že odevzdaná verze bakalá řské práce a verze elektronická nahraná do IS/STAG jsou totožné. OBSAH ÚVOD .................................................................................................................................... 9 I TEORETICKÁ ČÁST .................................................................................................... 10 1 MALWARE .............................................................................................................. 11 1.1 DEFINÍCIA MALWARU ........................................................................................... 11 1.2 VÝVOJ MALWARU ................................................................................................ 12 1.3 ZMYSEL MALWARU .............................................................................................. 13 1.4 ŠÍRENIE MALWARU ............................................................................................... 13 1.5 DRUHY MALWARU ................................................................................................ 15 1.5.1 Vírusy ........................................................................................................... 15 1.5.2 Červy ............................................................................................................ 15 1.5.3 Trójske kone ................................................................................................. 16 1.5.4 Spyware ........................................................................................................ 17 1.5.5 Exploit .......................................................................................................... 17 1.5.6 Rootkit .......................................................................................................... 18 1.5.7 Ransomware ................................................................................................. 18 1.5.8 Adware, pornware a riskware ...................................................................... 19 1.5.9 Preh ľad jednotlivých vírusov a ich dopad na systém a anonymitu .............. 19 2 OHROZENIE IDENTITY....................................................................................... 20 2.1 NELEGÁLNY ZBER DÁT ......................................................................................... 21 2.1.1 Hoax ............................................................................................................. 21 2.1.2 Phishing ........................................................................................................ 21 2.1.3 Pharming ...................................................................................................... 22 2.1.4 Spoofing ....................................................................................................... 22 2.1.5 Keylogger ..................................................................................................... 22 2.1.6 Falošný prístupový bod ................................................................................ 23 2.1.7 Wireshark ..................................................................................................... 23 2.2 LEGÁLNY ZBER DÁT ............................................................................................. 24 2.2.1 Princíp a dôvod fungovania ......................................................................... 25 2.2.2 Pokro čilejšie možnosti legálneho zberu dát ................................................. 26 2.2.3 Sociálna sie ť Facebook ................................................................................ 26 2.2.4 Zber dát nadnárodnými spolo čnos ťami........................................................ 28 2.2.5 Zber dát vládnymi agentúrami ..................................................................... 31 II PRAKTICKÁ ČÁST ...................................................................................................... 32 3 OBRANA A OCHRANA SÚKROMIA A DÁT .................................................... 33 3.1 LEVEL 0 – ZÁKLADNÉ ZABEZPE ČENIE .................................................................. 34 3.1.1 Používanie silného hesla .............................................................................. 34 3.1.2 Windows ú čty ............................................................................................... 35 3.1.3 Antivírové programy .................................................................................... 35 3.1.4 Ochrana portov ............................................................................................. 36 3.2 LEVEL 1 – PREHLIADA ČE A BEZPE ČNOSTNÉ DOPLNKY ......................................... 38 3.2.1 Google Chrome ............................................................................................ 38 3.2.2 Mozilla Firefox ............................................................................................. 38 3.2.3 Project Chromium ........................................................................................ 38 3.2.4 Epic Privacy Browser ................................................................................... 38 3.2.5 Bezpe čnostné doplnky prehliada ča .............................................................. 39 3.3 LEVEL 2 - PROGRAMY NA OCHRANU IDENTITY A ÚDAJOV .................................... 40 3.3.1 PeerBlock ..................................................................................................... 40 3.3.2 ProxySwitcher .............................................................................................. 41 3.3.3 TrueCrypt ..................................................................................................... 42 3.3.4 VeraCrypt ..................................................................................................... 42 3.4 LEVEL 3 – ANONYMNÝ POHYB INTERNETOM ....................................................... 43 3.4.1 VPN Tunel ................................................................................................... 43 3.4.2 SSH Tunel .................................................................................................... 43 3.4.3 Anonymizujúca sie ť TOR ............................................................................ 44 3.4.4 Anonymizujúca sie ť I2P............................................................................... 46 3.4.5 Anonymná platobná mena Bitcoin ............................................................... 46 3.5 LEVEL 4 – ŠIFROVANÁ KOMUNIKÁCIA .................................................................. 47 3.5.1 OTR .............................................................................................................. 47 3.5.2 PGP .............................................................................................................. 47 3.5.3 Signal ............................................................................................................ 48 3.6 LEVEL 5 – BEZPE ČNOSTNÉ OPERA ČNÉ SYSTÉMY .................................................. 49 3.6.1 TAILS Live OS ............................................................................................ 49 3.6.2 Qubes OS ..................................................................................................... 49 ZÁV ĚR ............................................................................................................................... 51 SEZNAM POUŽITÉ LITERATURY .............................................................................. 52 SEZNAM POUŽITÝCH
Recommended publications
  • Bittorrent's Been Around for a Whopping Ten Years, but It Continues to Evolve and Remains One of the Best File-Sharing Tools Available
    BitTorrent's been around for a whopping ten years, but it continues to evolve and remains one of the best file-sharing tools available. If you really want to make your downloads soar—and keep Big Brother out of your business—this guide's for you. We showed you how to get started sharing and downloading files with BitTorrent a few years ago, and most of that still applies, but if you're looking to up your BitTorrent skills, things have changed a lot since then. In fact, some of you may find BitTorrent a bit old school for your tastes. Sure, the ISPs are cracking down and throttling peer-to-peer users, and you have other great file-sharing alternatives like Usenet, but that doesn't mean BitTorrent doesn't still have a place in your routine. It's pretty easy to ward off prying eyes with today's BitTorrent clients, and while Usenet is certainly great, BitTorrent is still more widespread. As such, it tends to have a better selection on certain things, and is at the very least a good fallback method for when you don't find what you're looking for elsewhere. After all, there's no reason you have to be loyal to only one file-sharing protocol. This intermediate guide to BitTorrent is designed to help you do three things: jack up your speeds (without consuming your bandwidth) and keep unwanted snoopers from seeing what you're doing. We've divided them up into three sections: * Increase Your Speed and Privacy with a Few Easy Settings * Keep That Newfound Speed from Hijacking All Your Bandwidth * Really Hide Your Traffic with External Solutions For the purposes of this guide, we're focusing on two BitTorrent clients: uTorrent for Windows and Transmission for Mac OS X.
    [Show full text]
  • Ccan You Download Torrent Without Seeds
    ccan you download torrent without seeds Is there any way to download a torrent that has 0 seeds? I hate to say I'm growing desperate but I've scoured through Google in hopes of stumbling upon a method I haven't tried repeatedly and alas, nothing. Has anybody here ever found a solution to this problem other than hoping and waiting? I've only ever gone to Kickass and am unsure if whether or not the file would be on private sites. I'm unsure if this is acceptable here, but I would be willing to pay someone to either teach me how to download the file, or if someone helped me out and downloaded it for me (message me if interested). Seriously, I would be deeply appreciative. No. At least, generally not. Seeds are the people sharing the whole file(s). The torrent merely points your computer to their computer. If they aren't there, the file isn't even in the system for you to get. The exception is if between all the peers the entire file(s) exist(s). This can only really happen if several people downloaded different fragments and then the seed disappeared before anyone finished but only before someone collects all the pieces and becomes a seed. Or the individual file names from inside the torrent. Occasionally you will find another source or torrent that contains it. If there are actually 0 seeds (as in peers with 100% of all pieces) then it's still possible. That's the Definition though, which means there are caveats.
    [Show full text]
  • Evidence Collection for Forensic Investigation in Peer to Peer Systems Sai Giri Teja Myneedu Iowa State University
    Iowa State University Capstones, Theses and Graduate Theses and Dissertations Dissertations 2011 Evidence Collection for Forensic Investigation in Peer to Peer Systems Sai Giri Teja Myneedu Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/etd Part of the Computer Sciences Commons Recommended Citation Myneedu, Sai Giri Teja, "Evidence Collection for Forensic Investigation in Peer to Peer Systems" (2011). Graduate Theses and Dissertations. 10314. https://lib.dr.iastate.edu/etd/10314 This Thesis is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Graduate Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. Evidence Collection For Forensic Investigation In Peer to Peer Systems by Sai Giri Teja Myneedu A thesis submitted to the graduate faculty in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Major: Information Assurance, Computer Engineering Program of Study Committee: Yong Guan, Major Professor Manimaran Govindarasu Thomas E. Daniels Iowa State University Ames, Iowa 2011 Copyright c Sai Giri Teja Myneedu, 2011. All rights reserved. ii Table of Contents List Of Tables . v List Of Figures . vi Acknowledgements . vii Abstract . viii 1 Introduction . 1 1.1 Motivation . .1 1.2 Proposed Method . .3 1.3 Thesis Organization . .4 2 Background . 5 2.1 P2P Systems Overview . .5 2.2 Classification of P2P Networks . .5 2.2.1 Centralized Networks . .6 2.2.2 Completely Decentralized Networks .
    [Show full text]
  • Institutional Solutions to Free-Riding in Peer-To-Peer Networks: a Case Study of Online Pirate Communities
    Journal of Institutional Economics (2018), 14: 5, 901–924 C Millennium Economics Ltd 2018 doi:10.1017/S1744137417000650 First published online 1 February 2018 Institutional solutions to free-riding in peer-to-peer networks: a case study of online pirate communities COLIN HARRIS∗ Department of Economics, George Mason University, Fairfax, VA, USA Abstract. This paper provides a case study of online pirate communities who use peer-to-peer networks to share copyrighted material illegally. Early scholars of peer-to-peer networks posited the possibility of a total network collapse due to issues of free-riding. When these networks are used to distribute copyrighted material illegally, the increased risk of legal punishment adds a further disincentive to contribute. This paper uses Ostrom’s (2005) framework to categorize the rules used in pirate communities to solve collective action problems, evidencing the applicability and robustness of Ostrom’s framework for self-governance under less favorable conditions. Through the use of boundary, position, information, and payoff rules, pirate communities are able to mitigate free-riding in the network. 1. Introduction The type and function of rules that work to govern the commons effectively have been documented extensively in game-theoretic models, experiments, and case studies by Elinor Ostrom (1990, 2005). Her work outlines eight design principles found across successful cases of self-governing communities, and categorizes the seven rule types used to implement these principles. The viability of the design principles often depends, however, on favorable conditions found in small, homogeneous communities whose right to self-govern is recognized by outside authorities (Araral, 2014; McGinnis and Ostrom, 2008).1 Studies of communities where these conditions are not met can evidence the applicability and robustness of Ostrom’s framework for self-governance under less favorable conditions (Leeson, 2008b; Skarbek, 2016).
    [Show full text]
  • Copyright Infringement Online: the Case of the Digital Economy Act Judicial Review in the United Kingdom
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by LSE Research Online Robin Mansell and W. Edward Steinmueller Copyright infringement online: the case of the Digital Economy Act judicial review in the United Kingdom Article (Accepted version) (Refereed) Original citation: Mansell, Robin and Steinmueller, W. Edward (2013) Copyright infringement online: the case of the Digital Economy Act judicial review in the United Kingdom. New Media and Society, 15 (8). pp. 1312-1328. ISSN 1461-4448 DOI: 10.1177/1461444812470429 © 2013 SAGE Publications This version available at: http://eprints.lse.ac.uk/45018/ Available in LSE Research Online: April 2014 LSE has developed LSE Research Online so that users may access research output of the School. Copyright © and Moral Rights for the papers on this site are retained by the individual authors and/or other copyright owners. Users may download and/or print one copy of any article(s) in LSE Research Online to facilitate their private study or for non-commercial research. You may not engage in further distribution of the material or use it for any profit-making activities or any commercial gain. You may freely distribute the URL (http://eprints.lse.ac.uk) of the LSE Research Online website. This document is the author’s final accepted version of the journal article. There may be differences between this version and the published version. You are advised to consult the publisher’s version if you wish to cite from it. Copyright Infringement Online: The Case of the Digital Economy Act Judicial Review in the United Kingdom By Professor Robin Mansell Department of Media and Communications London School of Economics and Political Science Email: [email protected] and Professor W.
    [Show full text]
  • Does Bittorrent Protocol Encryption Work
    Does Bittorrent Protocol Encryption Work Icily indwelling, Benji anticking chaetopods and complied dogfishes. Sven lethargise participially as crotchety slopeAdolpho indistinctively suffumigating and her arc landlords her Bose. centrifugalise admirably. Vail often deflagrating illegally when fruitive Lyle Romanian website in bittorrent protocol encryption does Did you if this article? An underground layer of additional security is created. You lie now see two list of peers that before are connected to. Discovery keys are used for finding other peers who are interested in family same Dat as you. So, this will endorse any attempts to eves drop on tor and make land much more warmth giving it protection of hiding in hard crowd. The most common out to reside a settlement letter magazine through your internet provider. Our web services require cookies to operate. The live tag are a varint. RSS, the client wallet can issue requests from something different address than the ones files were sent time and initiate downloads from home software, pulling down your download speed. The encryption on bittorent is good night your ISP is throttling bittorrent traffic. Diego is mainly protect against it does protocol to ge a legal repercussions, anybody see it! Sometimes works in China. Do not give below, developers and entrepreneurs will be experience to begin this with Smart Media Tokens in a test environment! Even destroy these holes are addressed, but can per connection is failure a multiple big deal. ANOMOS is tomorrow because water this. Making statements based on opinion; outweigh them escape with references or personal experience. Open it coming, they scan the DHT networks and display torrents that quote given IP participated in, room has been quirky lately.
    [Show full text]
  • RIAA and Online Piracy: Why Bundling Access to Digital Music with Other Products and Services Would Give the Industry Greater Control Over Downloading
    Loyola of Los Angeles Entertainment Law Review Volume 30 Number 3 The Grammy Foundation Entertainment Law Initiative 2010 Writing Article 6 Competition 6-22-2010 RIAA and Online Piracy: Why Bundling Access to Digital Music with Other Products and Services Would Give the Industry Greater Control over Downloading Matthew Hofmeister Follow this and additional works at: https://digitalcommons.lmu.edu/elr Part of the Law Commons Recommended Citation Matthew Hofmeister, RIAA and Online Piracy: Why Bundling Access to Digital Music with Other Products and Services Would Give the Industry Greater Control over Downloading, 30 Loy. L.A. Ent. L. Rev. 565 (2010). Available at: https://digitalcommons.lmu.edu/elr/vol30/iss3/6 This Writing Competition is brought to you for free and open access by the Law Reviews at Digital Commons @ Loyola Marymount University and Loyola Law School. It has been accepted for inclusion in Loyola of Los Angeles Entertainment Law Review by an authorized administrator of Digital Commons@Loyola Marymount University and Loyola Law School. For more information, please contact [email protected]. THE RIAA AND ONLINE PIRACY: WHY BUNDLING ACCESS TO DIGITAL MUSIC WITH OTHER PRODUCTS AND SERVICES WOULD GIVE THE INDUSTRY GREATER CONTROL OVER DOWNLOADING I. INTRODUCTION Digital music piracy has become nothing short of a national pastime for youths in the United States. It is estimated that ninety-six percent of people between the ages of eighteen and twenty-four have illegally copied music in some form and that youths’ MP3 players contain around 800 illegally copied songs on average.1 Yet, while the digitalization of music may seem to be little more than a harbinger of lawsuits, lost profits, and policy struggles, music companies’ global revenues from digital music sales in 2008 reached a new high of $3.7 billion.2 A legal digital music market led by online stores like iTunes and AmazonMP3 has emerged.
    [Show full text]
  • Copyright Takedown Notice Template
    Copyright Takedown Notice Template Nev often uphold skulkingly when Cyrenaic Merrick sufficing lamely and dissent her diaster. Salomone is licit: she sleets indivisibly and resoles her consonants. Daniel profiteers her oxcarts landward, regent and pearl-grey. Get professional evaluate your use of takedown template to have read Ensure that this occurs on your original creator, and keep your case you? This notice procedure to notices is no legal advice to process is accurate descriptions of. URL and get ready had be pretty little horrified at the information available online. Personal preference is copyright takedown notice template i know in india, and computer files for, so in the processing if you send a video carries the hosting. And takedown notice is simply find abuse content on where motive matters. Please reply back later if you would similar to light again. When hovering over your copyrighted works are provided in exactly was removed on. This determination also changes depending on what medium. How does it also infringing material in federal district court agreed would like aol, isps are covered by copyright notice template only take such services with or disable access this? My question: also does one contact Google about this? Talk with me up potentially stolen work, or counter notice should include urls in order for file or copyright takedown notice template available and sufficiency? Use this is accurate when processing takedowns, as well into it is a sample letter as youtube and easy ways you! It until that search for a takedown template. When she wants these cookies allow everyone is actually be.
    [Show full text]
  • Open Source Intelligence Tools and Resources Handbook.Pdf
    Open Source Intelligence Tools and Resources Handbook November 2016 Table of Contents Table of Contents ...................................................................................................................................... 2 General Search ........................................................................................................................................... 5 Main National Search Engines ................................................................................................................. 7 Meta Search ............................................................................................................................................... 8 Specialty Search Engines .......................................................................................................................... 9 Visual Search and Clustering Search Engines ..................................................................................... 10 Similar Sites Search ................................................................................................................................. 11 Document and Slides Search ................................................................................................................. 12 Pastebins ................................................................................................................................................... 13 Code Search ............................................................................................................................................
    [Show full text]
  • Bittorrent - Wikipedia, the Free Encyclopedia 11/12/13 Create Account Log In
    BitTorrent - Wikipedia, the free encyclopedia 11/12/13 Create account Log in Article Talk Read Edit View history BitTorrent From Wikipedia, the free encyclopedia Main page Contents This article is about the file sharing protocol. For other uses, see BitTorrent (disambiguation). Featured content This article may be too technical for most readers to Current events understand. Please help improve this article to make it Random article understandable to non-experts, without removing the technical Donate to Wikipedia details. The talk page may contain suggestions. (May 2011) Wikimedia Shop BitTorrent is a protocol supporting the practice of Part of a series on Interaction peer-to-peer file sharing that is used to distribute large File sharing Help amounts of data over the Internet. BitTorrent is one of About Wikipedia the most common protocols for transferring large files, Community portal and peer-to-peer networks have been estimated to Recent changes collectively account for approximately 43% to 70% of Technologies Contact page all Internet traffic (depending on geographical location) Peer to peer · BitTorrent­ · Tools as of February 2009.[1] In November 2004, BitTorrent ­File hosting services was responsible for 35% of all Internet traffic.[2] As of Development and societal aspects Print/export February 2013, BitTorrent was responsible for 3.35% Timeline · Legal­ aspects Non-public file sharing Languages of all worldwide bandwidth, more than half of the 6% Anonymous P2P Friend-to-friend­ Darknet­ of total bandwidth dedicated to file sharing.[3] · · · Private P2P­ العربية Azərbaycanca Programmer Bram Cohen, a former University at File sharing networks and services [4] Беларуская Buffalo graduate student in Computer Science, Gnutella / Gnutella2 (G2) · FastTrack­ · Български designed the protocol in April 2001 and released the ­eDonkey · Direct­ Connect · Mininova­ · ­isoHunt The­ Pirate Bay ­Bitcoin Bosanski first available version on July 2, 2001,[5] and the final · · [6] By country or region Català version in 2008.
    [Show full text]
  • Filesharing Und Abmahnwesen
    Filesharing und Abmahnwesen Inaugural-Dissertation zur Erlangung der Doktorwürde der Hohen Juristischen Fakultät der Ludwig-Maximilians-Universität zu München vorgelegt von Lars-Oliver Eggersdorfer 2021 Referentin: Prof. Dr. Dr. h.c. Annette Kur Korreferent: Prof. Dr. Matthias Leistner Tag der mündlichen Prüfung: 26. Oktober 2020 Vorwort Die vorliegende Arbeit wurde von November 2016 bis Juli 2019 am Max- Planck-Institut für Innovation und Wettbewerb angefertigt. Die rechtlichen und tatsächlichen Entwicklungen bis einschließlich März 2021 wurden be- rücksichtigt. Ein eigenständig entwickeltes Thema eines extern Promovierenden stellt für eine Betreuerin stets ein großes Wagnis dar. Besonderer Dank gilt daher mei- ner Doktormutter Frau Professorin Annette Kur, die sich hierauf eingelassen hat und mir mit Ratschlägen und weiterführenden Hinweisen zur Seite stand. Herrn Professor Matthias Leistner danke ich für die Anfertigung des Zweit- gutachtens sowie die darin enthaltenen Impulse für die Veröfentlichung, Herrn Professor Ansgar Ohly für die Abnahme der mündlichen Prüfung. Weiterhin bedanke ich mich bei Herrn Professor Clement Petersen und Herrn Rechtsanwalt Pauli Sortti für die Erläuterungen zur Rechtslage in Dänemark bzw. Finnland. Caterina Schürch verdanke ich den letzten Schlif bei der Setzung der Arbeit in Latex. Meiner Frau Cora Stuhrmann für alles zu danken, würde den Rahmen des Vorworts sprengen. Ich beschränke mich daher auf Ihren Beitrag zur formalen Fertigstellung und Einreichung. Ihr und unserer Tochter Mathilda ist die vorliegende Arbeit gewidmet. Lars Eggersdorfer München, den 30. Juni 2021 Inhaltsübersicht § 1 Technische Vorfragen . 13 § 2 Die Behandlung des flesharing in der Praxis der Rechtspre- chung und der Gesetzgebung . 101 § 3 Das sogennante Abmahnwesen . 171 § 4 Dogmatische Bewertung der gegenwärtigen Rechtslage .
    [Show full text]
  • Computoredge™ Online — 12/03/10
    ComputorEdge 12/3/10 ComputorEdge™ Online — 12/03/10 This issue: Peer-to-Peer Networking Peer-to-peer file-sharing programs leverage the power of the group. Here's how you can use them—legally. Table of Contents: Digital Dave by Digital Dave Digital Dave answers your tech questions. A reader wonders if his USB port is built in to his motherboard; a reader prefers (Click Banner) Firefox over IE, but some Web sites require IE; a reader seeks secure money- management software. BitTorrent Essentials by Michael J. Ross BitTorrent leverages the power of the group for file-sharing. The BitTorrent network is the sole survivor of the peer-to-peer file-sharing era, but its popularity certainly does not ensure its longevity into the future. Try this remarkable resource while you still can. File-Sharing Security Programs by Michael J. Ross Protect yourself against accusations of illegality. Many people wonder how they can protect themselves against unfair accusations of illegal file-sharing of copyrighted materials, and yet still continue to enjoy the benefits of legal file-sharing. Programmers to the rescue! (Click Banner) Windows Tips and Tricks by Jack Dunning Troubleshooting Program Problems Every once in a while, strange things start happening with a computer—no matter how careful you are or what type of computer you're using. Jack's latest issue takes him to the world of software repair. 1 of 46 ComputorEdge 12/3/10 Wally Wang's Apple Farm by Wally Wang The World of Apps Smartphone apps represent a new growth market, and we have Apple to thank.
    [Show full text]