answersLogoWhite

0

🚓

File Sharing

File sharing is the term given to any method people use by people to share programs and other files between one another. Questions about file sharing programs and protocols belong here.

688 Questions

Can you get caught using winrar after the 40 day trial?

WinRAR doesn't really expire. It's more like you get WinRAR with no limitations for 40 days. After 40 days you have to deal with a nag screen each time you use WinRAR and the only way to remove the nag screen is to buy the product.

As long as your willing to put up with the nag screen after 40 days, you can use WinRAR for free as long as you like. You won't go to jail or anything, you just pay by dealing with a nag screen.

Is file-hippo safe?

yes i use it all the time very good download site. also try http://www.download.com/ :)

The best torrent software reliable fast doesn't slow down computer like is bitcomet or bitlord better than utorrent or bitorrent?

uTorrent - http://www.utorrent.com/

but since you've ruled that out... (with no clear resoning)

Vuse ( was Azuerues ) - http://www.vuze.com/app

Deluge - http://deluge-torrent.org/

oh and Transmission (Mac/*nix) - http://www.transmissionbt.com/

Is sendspace.com a safe site to download from?

i wouldn't use it on my main computer because it is questionable. but it is trusted by many people and its main purpose is to share large files. i have had friends use it problem free but it depends on the upload, who knows what they did to the file.

to prevent problems try scanning the file with anti virus software before opening it.

How do you access news websites?

There are plenty of news websites and blogs that fill the internet with interesting content. Accessing them is easy if you know their URL. Most if not all newspapers and television news shows have a web presence.

# Open your web browser. use what ever your prefer, Internet Explorer, Firefox, Safari, etc. #* CNN's url: http://www.cnn.com/ #* BBC's url: http://www.bbc.co.uk/ #* Washington Post's URL: http://www.washingtonpost.com/ # Type in your url.Near the top center of the browser window there is a text input bar. It might already have a URL in it like google.com, msn.com, or apple.com. # Press enter. or click on the arrow at the end of the text box to load the page. # Browse. The main page will list the latest headlines just like the front page of a news paper. Most news sites have categories or a search bar to find other things you are interested in.

Talk to people to find their favorite news source. Look for something reliable and honest.

What is a good example of pier to pier network?

There are many application which help peer to peer networking. For eg: Ares, Warez, Utorrent. In peer to peer networking a file or a piece of the file is read from a individual's computer and it is downloaded at another's computer who has requested for that piece of information. The actual data is not shared or stored on the network.

Which gives better security workgroup sharing or homegroup sharing?

A workgroup has more security. A homegroup provides less security than a workgroup because any user of any computer in the homegroup can access homegroup resources.

Does pirate bay give viruses?

Yes- The piratebay site or ads on it's home page plays host to a piece of software called "antivirus 2010" or "anto virus XP 2010" it selfloads on your computer and starts to throw up bogus security warnings, it also opens links to drug sites and adult sites- it's main purpose is to get you to buy a "full version" of itself. Do not do this, instead remove it...Purchasing it will lead to the theft of your credit card info. This spyware will also disconnect icons and prevent you from opening your browser or other software. You need not download or start any torrents for it to download itself.

Got infected at The Pirate Bay yesterday (03/06/2010) with XP Antivirus 2010. I didn't click a thing. Even with an updated copy of Avast running as well as Spybot Seek and Destroy running, I was still infected.

Removal:

Hopefully you have Spybot Search and Destroy. If not download it on a friends computer to a USB flash/ thumb drive or CD.

Immediately reboot into in safe mode. Reboot and press F8 during the reboot. Windows will give you a menu of options. Choose safe mode.

Do a search for av.exe. It will find av.exe and also a prefetch version.

Open task manager. (CTRL-ALT - DELETE)

End Task the AV.exe

Go to your search results and right click on av.exe. Immediately delete AV.exe and the prefetch version of the file as well. If it says unable to delete it, go back to task manager and make sure you have clicked on av.exe and then clicked end process and then again go immediately to the window with your search results and delete the av.exe file.

Go into your C drive, Programs, Spybot Search and Destroy folder. In order to get around the problem of not being able to launch executables (.exe files) change the .exe to .com. (right click on SpybotSD.exe and choose rename, rename the file SpybotSD.com) The double click the file to Run Spybot Search and Destroy. Run the scan and Fix the problems it finds.

Run Ccleaner to clean out all the accumulated crap.

Problem fixed. Reboot the machine and run a full virus scan on through mode, just to be sure there are no other issues remaining.

What is a java virtual machine?

An abstract computing machine, or virtual machine, JVM is a platform-independent programming language that converts Java bytecode into machine language and executes it. Most programming languages compile source code directly into machine code that is designed to run on a specific microprocessor architecture or operating system, such as Windows or UNIX. A JVM -- a machine within a machine -- mimics a real Java processor, enabling Java bytecode to be executed as actions or operating system calls on any processor regardless of the operating system. For example, establishing a socket connection from a workstation to a remote machine involves an operating system call. Since different operating systems handle sockets in different ways, the JVM translates the programming code so that the two machines that may be on different platforms are able to connect.

How do you block upload in utorrent?

You don't.

If you don't upload then don't download.

What example of pervasive computing?

As for examples:

- Ambient Devices produced an "orb", a "dashboard", and a "weather beacon": these decorative devices receive data from a wireless network and report current events, such as stock prices and the weather.

-"Dangling String," installed at Xerox PARC This was a piece of string attached to a stepper motor and controlled by a LAN connection; network activity caused the string to twitch, yielding a peripherally noticeable indication of traffic.

-Datafountain is an internet enabled water fountain used to display money currency rates, created by Koert van Mensvoort.

Is LimeWire free?

Limewire Basic is free, However there is also a pro-version available if your willing to spend about $15 USD. It is listed what version has what on the website but I woul'd just recommend getting standard and see if it meets your needs, before deciding to get pro.

What is the new limewire?

Frostwire or Bearshare

Limewire alternative.

How does vuze work?

its pretty much a torrent downloader if u have a ps3 or xbox 360 you can hook it up to stream movies to it not sure how that works tho...