Tomahawk Combines Your Local Music with Spotify, Grooveshark, and Others to Put Virtually Any Song at Your Fingertips
Windows/Mac/Linux: Tomahawk is a free desktop music player that combines your local library with the libraries of our favorite streaming music services, like Spotify, Grooveshark, and more, so you don’t need to open a multitude of separate players to listen to your music.
We love streaming services, but none of them have a perfect selection, and it would be nice if you could combine them all into one service. Tomahawk does this, starting off with your local library and letting you add extensions—called resolvers—to bring in libraries from services like Spotify, Grooveshark, Last.fm, Soundcloud, YouTube, Ex.fm, and even 4Shared. That way, you have the best of each library, without any of the holes. The player isn’t anything too special otherwise, but then again, neither is Spotify’s or Grooveshark’s.
You’ll need a premium account for the services like Spotify and Grooveshark, and you may need to grab the extensions from Tomahawk’s web site—some aren’t included with the program—but overall, it’s pretty simple to build up one streaming library to rule them all (now if only they had Rdio, too). Check out the video above to see it in action.
Computer Tune-Up & Optimization to Make Your Computer Faster
Best Buy charges $49.99 (plus tax) at the minimum for this exact service.
Teechy charges just $9.95 (plus 7% tax).
Cleans up temporary files, startup files, and registry entries
Gets rid of hidden adware, malware, and spyware
Assesses your anti-virus definitions and status
Offers FREE 30-Day Anti-Virus Installation
Eliminates files that have been fragmented (Defrags your PC)
Updates your Mac or PC with critical updates from Apple and Microsoft, respectively.
For just $5 more, Teechy will install Anti-Theft software to protect your computer from theft. Because no one should ever have to deal with a stolen computer.
Installs Anti-Theft software to protect your computer and files and to track your computer to recover it immediately. (*Must select the Standard w/ Anti-Theft Software Installation package)
If you’re trying to break into a Windows computer—whether you’ve forgotten your password or are hatching an evil plan—you have quite a few options. Heres how to do it, and how to keep your own computer protected.
There are a few methods to breaking into a computer, each with their own strengths and weaknesses. We’ll go through three of the best and most common methods, and nail down their shortcomings so you know which one to use—and how to exploit their weaknesses to keep your own computer secure.
The Lazy Method: Use a Linux Live CD to Get at the Files
If you don’t need access to the OS itself, just a few files, you don’t need to go through much trouble at all. You can grab any Linux live CD and just drag-and drop files onto a USB hard drive, as you would in any other OS.
How It Works: Just download the live .iso file for any Linux distribution (like the ever-popular Ubuntu) and burn it to CD. Stick it in the computer you want to access and boot up from that CD. Pick “Try Ubuntu” when it comes up with the first menu, and it should take you right into a desktop environment. From here, you can access most of the hard drive just by going to the Places menu in the menu bar and choosing the Windows drive. It should see any NTFS drives just fine.
Note that depending on the permissions of some files, you might need root access. If you’re having trouble viewing or copying some files, open up a terminal window (by going to Applications > Accessories > Terminal) and type in gksudo nautilus, leaving the password blank when prompted. You should now have access to everything.
How to Beat It: This method can give you access to the file system, but its main weakness is that the malicious user still can’t access any encrypted files, even when using gksudo. So, if the owner of the computer (or you) has encrypted their files (or encrypted the entire OS), you won’t get very far.
Sneaky Command-Line Fu: Reset the Password with the System Rescue CD
If you need access to the operating system itself, the Linux-based System Rescue CD is a good option for breaking in. You’ll need to do a bit of command line work, but as long as you follow the instructions closely you should be fine. Hat tip to our friends at the How-To Geek.
How It Works: Just download the .iso file for the System Rescue Live CD and burn it to disc. Boot from the disc and hit the default option when the blue screen comes up. After everything loads and you’re presented with a command-line interface, type fdisk -l to see the drives and partitions on your computer. Pick the Windows partition (usually the largest NTFS partition) and note the name, e.g. /dev/sda3.
Then, run the following command:
ntfs-3g /dev/sda3 /mnt/windows –o force
Make sure to replace /dev/sda3 with the partition you noted earlier. Next, cd to your Windows/System32/config directory with this command:
cd /mnt/windows/Windows/System32/config
We want to edit the SAM file in this folder, so type the following command to get a list of users:
chntpw –l SAM
Note the username you want to access, and then type the following command, replacingWhitson Gordon with the username in question.
chntpw –u “Whitson Gordon” SAM
At the next screen, choose the first option by typing the number 1 and hitting Enter. This will clear the user password, making it blank. When it asks you to write hive files, hit y and press Enter. It should say OK, and then you can type reboot to reboot the computer. When you boot into Windows, you’ll be able to log in to that user’s account without a password.
How to Beat It: Once again, the weakness of this method is that it still can’t beat encryption. Changing the password will disallow you access to those encrypted files, which, if the user hasencrypted their entire OS, makes this method pretty useless. If they’ve only encrypted a few files, though, you’ll still be able to access all the unencrypted stuff without a problem.
Brute Force: Crack the Password with Ophcrack
Where the other two methods are vulnerable to encryption, this method will give you full access to everything the user can access, including encrypted files, since this method relies on finding out the user’s password instead of bypassing it.
How It Works: We’ve actually gone through this method before, but it doesn’t hurt to have a refresher. All you need to do is download and burn the Ophcrack Live CD(use the Vista version if you’re cracking a Windows 7 PC) and boot from it on your computer. It’ll take a little bit of time to boot, but eventually it will bring you to a desktop environment and start attempting to crack passwords. This may take a while. You’ll see the passwords pop up in the top pane of the window, though, when it finds them (or, if it doesn’t find them, it’ll notify you). You can then reboot and log in to Windows using those passwords.
How to Beat It: While this method works on encrypted OSes, it can’t crack every password out there. To increase your chance of having an uncrackable password, use something complicatedand greater than 14 characters. The stronger your password, the less likely Ophcrack will be able to figure it out.
There are a lot of methods to break into a Windows computer (in fact, we’ve featured some of them before), but these are a few of the best and most widely useful. Apart from encryption, very little can stop the first two methods, and on those occasions you have Ophcrack to possibly fall back on. Got your own favorite method for getting into your computer without a password? Share it with us in the comments.
Software security company ESET reports that hackers have successfully ported older Linux-targeting malware to Mac OS X. OSX/Tsnunami.A is a new variant of Linux/Tsunami, a malicious piece of software that commandeers your computer and uses its network connection to attack other websites
Even worse, ESET says that Tsunami can force your computer to download additional malware or other software. The company also says that its antivirus software, ESET Cybersecurity for Mac, can detect and remove the malware.