17 May 2015

Microsoft Tracks Windows 7 Pirates

Microsoft filed a lawsuit, claiming that it logged hundreds of suspicious product activations from one IP address. The software giant is currently seeking damages.


windows-7-retirement-1500x1000.th.jpg

Such software as operating systems suffers a high piracy rate due to the fact that a user needs to be present on most computers in order for them to work at all. Over the last three decades, Windows OS has been pirated millions of times. The Seattle-based company had to accept this fact as granted, and regular users usually avoided Microsoft’s aggression.

Now at least one pirate is about to find out that the same can’t be said of users pirating Windows on a commercial scale. Microsoft targets a person or persons behind a single Verizon IP address, who are responsible for some serious Windows pirating. The tech giant analyzed product key activation data, including the IP address from which the key was activated. It should be noted that the users voluntarily provided this information when they activated Windows. The forensic tools of the company allow it to analyze billions of Windows activations and discover patterns that make it believe that pirated software was being activated through that particular IP address.

The company detained in its complaint that its cyberforensics have identified hundreds of product key activations originating from a single Verizon IP address. Microsoft claims that those activations make it believe that defendants are using the IP address in question to activate pirated Windows 7. The company provided evidence that the defendant(s) have activated hundreds of copies of its operating system using product keys “stolen” from Microsoft’s supply chain or having a valid license. In some cases, the keys were used more times than their license allows.

Microsoft is now claiming damages resulting from such piracy – aside from immediate injunctive relief and the impounding of all infringing content, the Seattle-based company demands profits attributable to the infringements, treble damages and attorney fees or statutory damages.

This is not the first time when Microsoft launches a lawsuit of such a kind. The company took a similar action last December, targeting a user behind an AT&T account.

Thanks to TorrentFreak for providing the source of the article.

Facebook Removed ExtraTorrent Facebook Page with 350k+ fans

Hi Everyone!

We are “unhappy” to inform you that ExtraTorrent Facebook Page with 352k+ fans was removed from Facebook this night.

We used Facebook to have a place for ExtraTorrent community to meet, talk, debate, have fun and hang out with each other. Many ET users liked to spend their time on their ET Facebook page.

But this morning, we have received the following message from Facebook:

Facebook wrote:
"We have removed or disabled access to the following content that you have posted on Facebook because we received a notice from a third-party that the content infringes their copyright(s)"
notfoundinfacebook.png
The official URL of the ExtraTorrent Facebook Page with 352k+ fans which was removed is https://facebook.com/ExtratorrentPage

It's was the most popular Facebook page among all existing torrent websites' pages on Facebook. Many ET fans liked to spend their time on our Facebook page. ExtraTorrent ran the several contests during the last years. The winners of contests received iPad, iPad Air, iPod and other prizes, including free VIP membership on the website.

The curious thing that the last warning (the day before) we got from Facebook was the following:
Facebook wrote:
"We've removed or disabled access to the following content you posted on Facebook because we received a notice from a third party that the content infringes their copyright(s):
Elysium (2013) BRRip"

It's very curious. Looks like Facebook removed ExtraTorrent Page because of the post in 2013. Meanwhile, ExtraTorrent didn’t violate any rules of Facebook and didn’t publish torrent links on Facebook since 2013.

In spite of the Facebook ban, ExtraTorrent will continue the Facebook life. ExtraTorrent Team thinks that website didn't break terms and condtions of Facebook and the remove of the page was done by mistake because ExtraTorernt didn't post any torrent links since 2013.

We have launched a new ExtraTorernt Facebook page


https://www.facebook.com/Extratorrent


6k+ fans have already joined the page in 12 hours!
Join Extratorrent on Facebook. The ET – The Place to Be!

ExtraTorrent Facebook Page - Like ExtraTorrent

Snowden called Australia’s Data Retention Legislation Dangerous

Edward Snowden expressed his views on Australia’s new data retention laws and pointed out that such bulk surveillance has allowed acts of terror to occur rather than foiled attacks. The world-known whistleblower said that Australia is adopting data retention legislation, which “has been proven not to work”.

o-EDWARD-SNOWDEN-facebook.th.jpg

Edward Snowden spoke from Moscow, saying that Australia’s role in bulk surveillance can be compared with the United Kingdom and the Tempora program, which collect everyone’s communications as part of a so-called “pre-criminal investigation”. In simple words, the surveillance outfits just watch everyone all the time. As for Australia’s outfits, they are able to search through that data not just within the country, but also share with foreign governments like the United States and United Kingdom.
It’s been a couple months that the Australia’s metadata laws had been passed to require telcos to store data on their customers for up to 24 months. According to the federal government, this measure can help fight terrorism. Edward Snowden argued that such laws were a radical departure from the operation of traditional liberal societies. Despite the fact that the company only collect metadata rather than content itself, it can still act as a proxy for content.
Edward Snowden brought a few examples, saying that mass surveillance hadn’t stopped such terrorist acts as the Sydney siege, the Boston marathon bombings or Charlie Hebdo. Snowden said that perhaps the governments missed these attacks because they had too much data to process without prioritizing. In addition, too many resources are wasted on spying on people who didn’t present a threat. The former NSA contractor suggested that governments should cooperate in order to avoid choosing between surveillance and security.
In the meantime, the US federal court ruled that mass storage of telephone data was illegal, and Edward Snowden called this decision “very significant”, as it could lead to further legal challenges of mass surveillance.
Greens senator Scott Ludlam, when discussing this issue with Edward Snowden, explained that intelligence agencies in the country operate with the “bare minimum of scrutiny” and pointed out that the debate in Australia is very stifled.

Protect Yourself with VPN While Torrenting – Save TorrentSsS

Hi Everyone!

As you know, ExtraTorrent is trying to keep ET servers alive. Unfortunately, we have no sponsors. ET still shows some popups on the website (sorry for that...) because we need to earn something to support our servers and website.

Recently, a part of ExtraTorrent community launched a VPN called by Trust.Zone VPN for safe torrenting. This is a bit experimental project. But it cares about safety of ET members and every downloader.

What's a VPN?

It's a tool that hides your IP address and your identity, it encrypts traffic and has no logging, so, your IP address will never be revealed and you will be 100% anonymous while torrenting. Government or your ISP can't track your activity. With a VPN, you are free to download any files you need without any risk.

Trust.Zone has founded by the part of ExtraTorrent community. The tool has 3 days free TRIAL period. If period ends, unfortunately, the service asks for money from you but..... our partners tried to make it as CHEAP as possible - $3.99/mo - it's the cheapest price among all popular VPN providers...


Trust.Zone - Best VPN for Torrenting!

Have you tried Trust.Zone VPN?

If so, do you have a minute to leave a feedback? Don't hesitate to share your opinion RIGHT NOW! Let’s make torrenting safer!

Protect Yourself with VPN While Torrenting – Save ExtraTorrent!
ET - The Place to Be!
Posted by:  Admin
Date:  Saturday, May 16th, 2015

13 May 2015

Russian Pirates Received a Final Warning

Russian government issued “a final warning” for people operating illegal websites. The local copyright legislation was amended again to not just protect more content, but also enable authorities to permanently block websites making copyrighted content available.

screenshot_143.png

Following massive pressure from the copyright owners all over the world, a couple years ago Russia started taking attempts to improve its reputation of the highly pirated nation. Back in 2013, a new IP law was introduced in the country, which outlined a mechanism to block the sites by intermediaries if those failed to comply with takedown notices within 3 days.

Over the first year, preliminary interim injunctions were imposed against 175 websites, but only 12 file-sharing domains were blocked. Now the law was further amended – from May 2015, it will cover not only video? but all multimedia content (except pictures).

Under the amended law, the intermediaries (Internet service providers and webhosts) can be ordered to permanently block sites that continually make unauthorized content available online.

Russian authorities officially explained the legislation’s reach, saying that the law enables to block access to online services providing access to copyright-infringing videos, TV shows and from May 1 – to music, books and software as well. The upgraded law also states that the systematic violation of intellectual property rights will lead to permanent blockage of the infringing portals.

The operators of torrent and other file-sharing websites received a particular notice. The authorities warned they have until May 1 to enter into constructive dialogue with copyright owners who are open to cooperation. The authorities underline that the common goal of the industry is to ensure that all copyright works are adequately rewarded and successful books, music and software bring profits to their creators, and not the pirates. If the website operators fail to start a legal business, the response of the government will become quite obvious.

In the meantime, the industry observers note that the first attempt of the country at website blocking legislation didn’t produce any apocalyptic conclusion. Now we’ll see how these latest amendments work out for Russian file-sharing sites.

Thanks to TorrentFreak for providing the source of the article.

Hackers Believe that Obama's and Clinton's Communications Are Secure

According to cybersecurity experts and even hackers themselves, both Obama’s government emails and Clinton’s private, encrypted email system are secure enough to withstand the attack from foreign powers. For example, Obama carries a specially secured BlackBerry device, which so far has proved safe from cyber spies.

screenshot_145.png

Even the National Security Agency admitted that the president’s BlackBerry has a satisfactory level of security. Recently, the US government had to admit that hackers attacked systems at the Pentagon, the White House and the State Department, but the breach in question related to the lowest-level unclassified email.

Meanwhile, controversy continues to rage over Hillary Clinton using a private email system while serving as the secretary of state. Nicknamed her “home brew” clintonemail.com system, it has sophisticated cyber “shields” to protect Clinton’s emails from prying eyes. The private domain has been used by her to conduct government business for four years, though it is not clear to what extent. Perhaps, now she would not be using this system as much, because it can appear vulnerable to some kind of hack, although it has still not been knocked offline or breached.

At the moment, the security experts are trying to work out how the hackers gained access to White House communications recently. One suggestion is that they could have infected the computer systems through the staffers while they were working on government business outside the office. Another suggestion is that they used an intrusion method called social engineering in order to lure staffers into clicking on a malicious link.

06 April 2015

নাম বদলেছিল যে সাত প্রযুক্তি প্রতিষ্ঠান

16 March 2015

International Toll Free Service (ITFS)


In the current world of globalization International Toll Free number Service plays a vital role for the businesses to reach its customers. ITFS is an ideal service for a business that focuses on strong global presence. This service enables the businesses a cost effective platform to provide their customer group to reach them at free of cost! Lack of having an ITFS can create an utter distance between a business and its customers. Recently, Bangladesh Telecommunication Regulatory Commission (BTRC) has issued directives on commercial toll free services. A Toll Free Service is such that instead of the caller the called party is charged for the call. The basic functionality of this service lies in providing customer services, sales enhancements, conference bridge access, calling card access number etc. As per the regulation, the customers of ITFS services include, but not limited to, inbound and outbound call centers, multinational companies for their brands, calling card companies, international original equipment manufacturers, financial institutions like banks, insurance companies, money exchanges and global supply chain companies, telecom companies etc; Whereas BTRC will allocate the numbers to the licensed International Gateways (IGW), the only authorized entity to sell the service.

Along with the basic functions Toll Free Service has following features:

  • Premium number as preferred by Customers
  • Special discounted price based on usage to specific destinations
  • Price discount for International toll free traffic of specific region
  • Bundle product of high quality with seamless customer support for country specific international toll free traffic
  • High quality voice with assured redundancy that ensures of reachability of customers at anytime from anywhere
  • Advanced features of ITFS numbers with full hosted PBX functionality. The advanced features can be listed as
  1. Call forwarding
  2. Time of day routing
  3. Call redirect
  4. Call recording for 15 days
  5. Interactive Voice Response
  6. Automatic Call Distribution

11 March 2015

Pakistan’s Mobile Subscribers Are Required to Fingerprint

Tens of millions of Pakistanis show up in the mobile phone stores nowadays, and the country’s government had to toughen its measures to curb terrorism. So, Pakistanis faced one of the largest efforts in the world to collect biometric data: their government has ordered mobile phone users to verify their identities through fingerprints. Those who refuse will lose their SIM cards, which is an unthinkable option for people who have enjoyed a dozen years of mobile phone usage.


lady-on-mobile-in-lahore-008.th.jpg



Pakistan government seems to be concerned about a proliferation of illegal and untraceable SIM cards and tries to restore law and order. Back in December 2014, Taliban militants killed students and teachers at a school, and it turned out that 6 terrorists were using phones registered to one woman with no obvious connection to terrorists.

Security experts point out that matching people to phone numbers would require an enormous amount of work. At the moment, there are 103 million SIM cards in the country, which is almost the number of the adult population, and mobile providers have 6 more weeks to verify the owners of all of the SIM cards. Over the past 6 weeks, 53 million cards that belonged to 38 million residents have been verified via fingerprinting. The government claimed that after they verified all of the SIM cards and blocked all unverified cards, the terrorists would no longer have this tool.

First mobile phone company was set up in the country 24 years ago, but there was only sparse usage until the 21st century. Over the last dozen years, the number of mobile subscribers has increased from 5 million to 136 million. The mobile phone subscription rate in the country reaches 73% – just like in neighboring India. Given that 50 million more SIM cards are yet to be verified, mobile phone companies send outreach teams to the countryside and mountains to notify subscribers of the new measures.

The weak spot of the plan is that one region remains largely unaffected by the plan – it is an immediate area around the Pakistan-Afghanistan border. Since many Islamist militants have sought refuge there, the country’s cellphone networks generally don’t cover those areas, and residents have to use Afghan networks.

The collected fingerprints are being matched with those from a national database being created since 2005, so people those whose prints are not yet in that database must first submit them to registration authority.

10 March 2015

Show Me The Money! 6 Steps To Optimizing Your Payment Process


money-cash-usdollars-ss-1920
You’ve worked hard to convince visitors to shop from you — and even harder to get them to the checkout page. So why on earth would you make it so painfully difficult for people to give you their money?
An astounding two-thirds of shopping carts are reportedly abandoned at the payment stage. Given the hoops many websites make their visitors jump through just to enter payment details, it’s no wonder. Few buyers would tolerate such friction at the point of purchase in a brick-and-mortar store. They’d just walk out.
Your payment stage is where visitors become buyers. Here are six steps to streamlining this critical last step in your conversion funnel.

1. Optimize For Clarity & Usability

Whether you employ a single page or a multi-step checkout process, online shoppers will eventually encounter your payment page. Nobody really likes parting with their money, so it makes a lot of sense to optimize the page design to improve the user experience.
Keep Your Payment Form Short, Simple And Clear. The first step in minimizing friction is to make it appear very fast and simple to enter payment details. Perception is critical. If your page layout looks confusing and your forms ask for too much information, you’ll discourage customers from going further.
Reduce clutter on your payment form by including only elements that are absolutely necessary for the transaction. Then, once you’ve visually convinced buyers that the payment step will be quick and painless, make it so.
Don’t require special formats for credit card numbers – if they want to enter their card number with hyphens (or without), let them. Your form should be very accepting of how users enter their data. Help shoppers by auto-populating information where possible (e.g., pre-filling the address field for visitors that are signed into their accounts, or automatically choosing the card type based on the customer’s credit card number).
Example of Ulta.com auto-populating form fields
Cosmetics retailer Ulta.com allows users to automatically populate a billing address with the shopper’s shipping address.
Anticipate And Reduce Frustration From Errors. As an online shopper, I find it extremely annoying when a site wipes out the entire form after I inadvertently type in wrong information in one field. Clearing a form is the easiest way to turn off customers, especially when they’re inputting their credit card details. Luckily, you can easily solve this by submitting your form in AJAX, which allows you to preserve form information without storing sensitive financial data in your servers.

2. Address Security Concerns

Shoppers’ awareness of online shopping-related risks is naturally heightened at the payment stage, so go the extra mile in reassuring them.
Make sure your payment page looks consistent with your entire website and is professionally designed. The last thing you want is to trigger alarms in your shopper’s brain with a payment page that looks nothing like the website they just visited. Any visitor would also balk at giving personal and financial information to a poorly-designed form for fear of an insecure transaction.
Improve shoppers’ perception of security by displaying trust badges and encryption information prominently and in close proximity to sensitive form fields (where credit card information is required, for instance). A study conducted by Baymard Institute shows that the presence of security icons on certain parts of a checkout page served as visual reinforcements for shoppers, which tended to view these parts as more secure compared to the rest of the page.
Using seals to show trust on the payment page
Notice how prominent the Norton seal is on Home Depot’s payment page. Pre-checkout, the seal is tucked away in the footer, but it takes center stage once buyers enter the checkout process.

3. Offer Multiple Ways To Pay

Accepting a variety of payment methods on your site ensures that your visitors will have at least one viable option at checkout. In addition to major credit cards, consider expanding payment options to include PayPal, Google Wallet, Amazon Payments, Bill Me Later, or BitCoin.
Of course, your decision on which payment types to accept should be based upon your audience profile. For instance, BitCoin may not be used by a large percentage of your visitors, and if you know you get a lot of visitors using iOS devices, you might consider implementing Apple Pay.
Example of offering multiple payment methods
Build.com offers Amazon Payment and PayPal in addition to major credit cards. For buyers who are reluctant to enter payment information, having the option of using their existing payment accounts is reassuring.
There is a caveat, however. Increasing the number of payment methods can also increase the complexity of your payment page. Too many choices can hinder decision-making and lead to choice paralysis. So, before you rush into adding a bunch of payment methods to your page, plan your design carefully. Pay attention to steps you can take to nudge users into quickly choosing the most appropriate payment method for them. Then, minimize confusion by showing only the fields relevant to the shopper’s chosen payment method.

4. Fix Fat Finger Challenges

Payment pages are especially tricky on smaller screens. According to research done by SeeWhy, 99.5% of mobile users will bail out before buying. And a major cause of friction is any place where the user is required to enter information.
Here are some things you can do to improve the payment process for mobile buyers.
  • Don’t require your customers to create an account to check out, but if you do remember customers’ account details (as is the case with Amazon), give them the option of logging in so they can access stored payment methods, shipping address and other account details.
  • Minimize the customer’s effort by using technology to pre-fill information. For example, instead of asking for postal code as the last part of the address, put it before the city and state, and then pre-populate those fields based on the data entered for the postal code.
  • Visually reinforce mobile shoppers’ sense of security with well-placed badges, icons and copy.
  • Provide shoppers with several payment methods. According to SeeWhy’s Mobile Playbook 2014, mobile consumers are twice as likely to convert when given alternatives to entering credit card details.
  • Show progress indicators to set customer’s expectation of how long the process will take, and to let them know where they are in the process.
  • Error handling is an even bigger issue given how tedious it already is to enter information on small screens. Minimize frustration by having bigger text fields and buttons and clearly indicating which fields are causing errors.

5. Understand The Needs Of International Customers

If you sell to customers outside of your home country, you probably already know how challenging it can be to process international payments. Credit cards can be hard to authorize for international addresses. And even preferred payment methods will vary depending on the customer’s country.
According to eConsultancy’s “Internationalisation of E-commerce Best Practice Guide,” Germans prefer to pay through ELV and debit card, while Scandinavians prefer to pay by cash on delivery. Not surprisingly, customers will also want to pay in their local market currency, so you will need to work with your payment service provider to make this possible.
Bonus Tip: If you currently don’t process international orders, say so upfront. Don’t wait until customers are deep into the checkout process before telling them that you don’t accept non-U.S. cards or don’t deliver to other countries.

6. Speed Up Payment Processing

Even after your customer has entered his or her payment details, your optimization job is not complete. Payment processing and authorization speed is just as crucial as getting the customer to fill out the payment form.
When customers finally click that “place order” button on your site, do they end up watching a spinning circle for 5, 10, even 15 seconds before being taken to the confirmation page?  The longer the spinning circle goes on, the more anxious customers get.
A study from the Aberdeen Group reveals that a one-second delay in page load time decreases customer satisfaction by 16%. Imagine how much worse this is for people who have just given away their credit card information.
The time between clicking the “place order” button to the confirmation page should almost be instantaneous. Check how long it takes for your payment processor to authorize and confirm payments on different internet providers and devices, and address any performance issues you notice. If necessary, get a new payment processor.

Conclusion

Optimizing your payment process may be one of the least exciting projects you take on during this final pre-holiday push, but it can easily deliver the most impact. With all the effort that goes into offering the right products, optimizing conversion funnels, designing campaigns and driving targeted traffic, you owe it to your company, and your visitors, to make it as easy as possible for buyers to give you their money.