23 views posted 06 Feb 2013, 08:06
Do you have an account on Extratorrent?▼23 comments
If you have, you may vote for "Extratorrent Oscars Awards" by clicking on the links below.
Extratorrent Oscars Awards-Best Software Uploader
Nominees - ChingLiu59461 - NiCkkkDoN3670 - THERAIN14598 - projectmyskills - hartfm61441
Extratorrent Oscars Awards-Best Bluray encoder
Nominees - 3Li - MgB - IceBane4194 - KINGDOM - PetaFOX15718 - BOZX
Extratorrent Oscars Awards-Best Music Uploader
Nominees - oldskoolscouse32755 - ChattChittoRG - peaSoup - wrong user link - aSBo15019 - snehit1528 - FlacMaster - NimitMak50356 - therock72466 - /Vitamin_X
Extratorrent Oscars Awards-Best Movies uploader
Nominees - juggs168697 - scene4all301634 - srkfan31050 - Acesan8s
Extratorrent Oscars Awards-Best TV show uploader
Nominees - ettv1404031 - EZTV1285978 - mini_super_nova215 - MVGroup9488 - trialNerror
Extratorrent Oscars Awards-Best Bluray/BRRip/DVDRip encoders for non English movies
Nominees - TeamDDR - Big_A_Little_A5515 - BALA - xRG3948
Extratorrent Oscars Awards-Best Games Uploader
Nominees - extremezone - SHARON12344608 - Nan1977asdl - Bone111
Extratorrent Oscars Awards-Best BBRip/DVDRip in XVID AVI format
Nominees - RSB - memory100 - 26k - sC0rp16 - MATiNE8 - UnKnOwN - pitic7 - feel-free19429
Extratorrent Oscars Awards-Best BRRip encoder H264/X264 MP4/MKV format
Nominees - YIFY755298 - Masta ETRG - Cat_Minister 4HRG - condors28021 - vicerock13415 - vices - M2G605
5 views posted 06 Dec 2012, 01:43
for all scene people which dont have this information:
there is a new technology that is able to watermark audio files without
hearable sounds. its already used in some uncommon mp3 shops. also workprints
could be insecure.
also i hope the mighty reverse engineers of the scene will find a way to erase that data
With the aid of audio watermarking technology it is possible to embed additional information in an audio track. To achieve this, the audio signal of a music recording, an audio book or a commercial is slightly modified in a defined manner. This modification is so slight that the human ear cannot perceive an acoustic difference. Audio watermarking technology thus affords an opportunity to generate copies of a recording which are perceived by listeners as identical to the original but which may differ from one another on the basis of the embedded information.
Only software which embodies an understanding of the type of embedding and embedding parameters is capable of extracting such additional data that were embedded previously. Without such software or if incorrect embedding parameters were selected it is not possible to access these additional data. This prevents unauthorized extraction of embedded information and makes the technique very reliable.
This characteristic is utilized by MusicTrace in a targeted manner. Every MusicTrace customer receives a unique set of embedding parameters. Consequently, each customer is only capable of extracting that information which he embedded himself. Accessing embedded information of other customers, by contrast, is not possible.
In addition to the inaudibility of the watermark and process security, two other factors play an important role. The first of these is the data rate of the watermark, i.e., an indication of the volume of data which can be transmitted in a given period of time. The other is the robustness of the watermark. Robustness is an indication how reliably a watermark can be extracted after an intentional attack or after transmission and the inherent signal modifications. The watermarking process implemented by MusicTrace was investigated by the European Broadcasting Union (EBU) in terms of robustness. Forms of attack investigated included analog conversion of the signal, digital audio coding or repeated filtering of the signal. This revealed that the watermark can no longer be extracted only when the quality of the audio signal has been substantially degraded as a result of the attack.
The factors data rate and robustness are mutually dependent. If more inaudible information are to be transmitted in a certain time the robustness of the watermark declines as a consequence. For embedding additional data, MusicTrace utilizes data containers that permit an acceptably high data rate and robustness. The two most commonly used data containers permit transmission of 48-bit additional data in 5 seconds with a very high robustness or 48-bit additional data in 2.7 seconds with slightly lower robustness.
Fields of Application
Because audio watermark technology in principle opens the possibility for transmitting embedded additional data in the audio track but imposes no restrictions in terms of the type of additional data, this technology has a broad range of potential applications. A few typical scenarios for audio watermarking are briefly sketched in the following.
* Embedding of Copyright Information: During production, copyright information in the form of a watermark can be anchored directly in the recording. This makes it possible to check at a later time whether a competitor, for example, has taken samples of music played on a valuable instrument and used them in his product without permission. With the aid of the watermark, it is also possible to provide copyright verification in the event that a competitor claims he produced a given title.
* Embedding of Recipient Information: It can also be expedient to utilize audio watermarking of promotional recordings provided to radio stations or the press or when music tracks or audio books are sold by an Internet shop. Here the idea is to personalize every recording distributed. In such cases information is embedded as a watermark that can be used at a later time to monitor recipients. This can be the recipient's customer number, for example. If these recordings are found later on the Internet, the embedded data can be used to identify the person to whom the recorded material was originally distributed.
The advantage of the watermarking technique over the Digital Rights Management (DRM) technique is that the original multimedia format is not changed by the watermark. To illustrate this, if a watermark is embedded in an MP3 file, the result is an MP3 file that can be played on any commercially-available MP3 player. It is therefore not necessary for customers to purchase special playback devices. Furthermore, the watermark remains in the recording even in the event of format conversion, even if the material undergoes analog conversion.
* Embedding of Title Information: The audio watermarking technique can in principle also be implemented for monitoring radio broadcasts. To do this, each title that is to be monitored must be provided with a unique identifier in the form of a watermark. A computer subsequently scans radio programs and investigates the signal for watermarking. Even though the audio fingerprinting technique is usually implemented to perform this task there are cases in which the audio watermarking technique offers certain advantages. This is the case, for example, when specific television commercials are to be monitored that have various video tracks but an identical audio track.
8 views posted 01 Jul 2012, 08:01
Brief history of the problem▼14 comments
I have uploaded "FL Studio 10.0.9 XXL Bundle + 24 Plugins Retail" on January 5, 2012
I tested it on Windows XP and it seems clean in every aspect. I upgrade my system to Windows 7 by using new hard disk several months ago.(I have also old one on my new system as a second hard disk)
After several members complained about this torrent had a malicious element inside, i installed it on my new system and i checked both hard disks and found nothing. I reported two members as spammers for this reason several days ago.
Today i have searched it again by looking closer in it and found this;
Bad news : Yes they were right and this torrent has a malicious element.
Good news : It has a low-level danger (danger rate 22)
What will i do now?
* I will apologize these members and all downloaders.
* I will delete torrents from the sites that i uploaded this torrent except kat.ph
* I will prepare "HOW TO CLEAN STDRT.EXE" information as soon as possible and replace this torrent's description page in KAT.
* I will also check if it is coming from official copy of the application.
* The torrent should not be downloadable and should not be deleted. I need help from mods.
* This page should stay for shame on me and for help the downloaders.
If you downloaded and installed this torrent please read THIS page to clean your pc.
0 views posted 14 Mar 2012, 16:44
Audacity is a free, easy-to-use and multilingual audio editor and recorder for Windows, Mac OS X, GNU/Linux and other operating systems. You can record sounds, play sounds, import and export WAV, AIFF, AAC, MP4, Ogg Vorbis, and MP3 files, and more. Use it to edit your sounds using Cut, Copy and Paste (with unlimited Undo), mix tracks together, apply effects to your recordings, change the speed or pitch of a recording, and really much more. Audacity enables FLAC support. The program also has a built-in amplitude-envelope editor, a customizable spectrogram mode, and a frequency-analysis window for audio-analysis applications. Built-in effects include Bass Boost, Wahwah, and Noise Removal, and it also supports VST plug-in effects. Audacity is without a doubt one of the best and easiest digital audio editors on the market and it will meet any requirement at 100% no matter if it is home or professional audio edition.
You can use Audacity to:
• Record live audio.
• Convert tapes and records into digital recordings or CDs.
• Edit Ogg Vorbis, MP3, WAV or AIFF sound files.
• Cut, copy, splice or mix sounds together.
• Change the speed or pitch of a recording.
• And more! See the complete list of features.
New features in Audacity 2.0.0:
* Fixed playback speed and synchronization problems when dragging clips or tracks between tracks having different sample rates.
* (Windows) Removed a crash risk where shortcuts could be used to record or import in one project while importing or exporting in another.
Imports and Exports
* Fixed crashes when changing the sample format of read-directly WAV or AIFF files using the Track Drop-Down Menu.
* Fixed a crash importing MP3 files that had duplicate metadata tags (this is a bug in current libsndfile which has been patched in Audacity; MP3 files mislabeled as WAV which have duplicate tags will still crash Audacity on Linux if Audacity has been compiled against an affected version of system libsndfile).
* Fixed an issue where excessively high or corrupted sample values in the audio could corrupt exports from the start of the problem for the rest of the file, and could corrupt the rest of the project.
* (Linux) Fixed Audacity could not be compiled against FFmpeg 0.7.x and 0.8.x.
Effects and Analysis
* Fixed crash on launch when using “Ambisonic Decoders (PC)” VST plug-ins and other plug-ins that enable additional floating point exceptions.
* Fixed Plot Spectrum background could be transparent on some machines.
* Bug fixes for Click Track, High Pass, Low Pass and Vocal Remover.
* Chirp, Tone and Silence generators now remember their settings.
Other miscellaneous bug fixes:
Changes and Improvements:
* New Interface preference to show the track name in the display (this is off by default).
* Longer default Playback preference for effects preview and preview before cut.
* Restored use of Page Up and Page Down to scroll horizontally.
Homepage : http://audacity.sourceforge.net
4 views posted 01 Mar 2012, 04:16
How Do You Delete Google History?
Protect your privacy by deleting your Google history. Users on public or shared computers can access previous queries submitted to Google, whether those queries are submitted through the address bar, the Google toolbar or typed directly into the Google search bar. Clearing the cookies and cache on your Web browser while deleting your Google history can speed up your computer. Deleting the Google history on any computer only takes a few seconds, but the process varies depending on your Internet browser.
Google Chrome Browser and Web Search History
Click the wrench icon in the upper-right corner of the browser. Select "Tools" and then click "Clear browsing data."
Choose the drop-down arrow to the right of "Obliterate the following items from" and select "the beginning of time." Click to place check marks to the left of "Clear browsing data," "Clear download history," "Empty the cache" and "Delete cookies and other site data."
Select "Clear browsing data" to delete the browser and Web search history in Google Chrome.
Internet Explorer Browser Search History
Choose "Tools" in the Internet Explorer menu bar and then click "Safety."
Select "Delete Browsing History."
Place check marks in the boxes to left of "History" and "Form Data."
Google Cache and Cookies in Internet Explorer
Open Internet Explorer and navigate to Google.com.
Press "F12." A drop-down menu appears beneath the "Gear" icon in the upper-right corner of the screen.
Click "F12 Developer Tools." The Developer Tools window appears on the lower half of the screen.
Select "Cache" in the "Developer Tools" menu bar, then select "Clear browser cache for this domain." Click "Yes" to confirm that you want to delete the cache.
Click "Cache" in the menu bar again and then click "Clear cookies for domain." Choose "Yes" to confirm the deletion of cookies for the site.
Mozilla Firefox Browser and Web Search History
Choose "Tools" in the menu bar and then click "Clear Recent History."
Click the drop-down arrow to the right of "Time range to clear" and select "Everything."
Select the drop-down arrow to the left of "Details." Place a check to the left of "Browsing place a check to the left of "Cache" and "Cookies" as well to delete both Web and browser search history.
Choose "Clear Now."
Google Toolbar Search History
Open a Web browser with the Google Toolbar installed on it.
Click the drop-down arrow on the right side of the "Search" box in the toolbar.
Select "Clear History."
Remove Google Web History
Open your Web browser and navigate to Google.com.
Click "Sign In" in the upper-right corner of the screen. Enter your Gmail address and password in the Google Account box on the right side of the screen and click "Sign in."
Select "Settings" in the upper-right corner of the web page to open a drop-down list and select "Google Account settings."
Click "Web History" beneath "My Products."
Place checks to the left of searches or search results you want to remove, then click "Remove" in the upper-left corner of the web page to remove the searches and search results from your Google Web History. Alternatively, select "Clear entire Web History" to clear all of your searches and search results from your Google Web History.
Google: Search History and Settings -- Delete Past Searches
Google Chrome: Privacy and Security Settings -- Delete Your Browsing History
Google: Search Box -- Clear Your Toolbar Search History
Google Chrome: Privacy and Security Settings -- Delete Cache and Other Browsing Data
by Tyson Cliffton, Demand Media
0 views posted 19 Feb 2012, 00:53
VLC reaches 2.0 (VLC Media Player 2.0.0 Final)
VLC 2.0 "Twoflower" is a major new version of our popular media player.
With faster decoding on multi-core, GPU, and mobile hardware and the ability to open more formats, notably professional, HD and 10bits codecs, 2.0 is a major upgrade for VLC.
Twoflower has a new rendering pipeline for video, with higher quality subtitles, and new video filters to enhance your videos.
It supports many new devices and BluRay Discs (experimental).
Completely reworked Mac and Web interfaces and improvements in the other interfaces make VLC easier than ever to use.
Twoflower fixes several hundreds of bugs, in more than 7000 commits from 160 volunteers.
◦Rewritten video output core and modules, allowing subpicture blending in GPU.
◦Shader support in the OpenGL output, for colorspace conversion, including 10bits.
◦New video outputs for Windows 7, Android, iOS and OS/2.
◦New debanding, grain, denoising and anti-flickering filters.
◦New deinterlacing filter, including an Inverse Telecine algorithm.
◦New resamplers for higher quality audio.
◦New dynamic range compressor and karaoke filters.
◦Simplification of the audio core for faster processing.
◦New audio outputs for iOS, Android and OS/2.
◦Multi-threaded decoding for H.264, MPEG-4/Xvid and WebM.
◦Support for 10bits codecs, WMV image and some other codecs.
◦Rewritten support for images, including jpeg, png, xcf, bmp...
◦Important changes in RealVideo and Real Format support.
◦CrystalHD cards and Android OpenMAX support for hardware decoding.
Input and Devices
◦Experimental support for BluRay discs:
- Menus are deactivated in this release (will come soon).
- AACS and BD+ DRM libraries and keys are not shipped, for legal reasons.
◦Support for SDI capture cards and QTKit devices.
◦Support for new adaptive streaming protocols, like HLS and DASH.
For Mac Users
◦Completely new, single window interface:
- Available in 2 colors: Lion grey and QTX black.
- Extensions support and better Lion integration.
◦Support for all QTKit devices through qtcapture and qtsound modules.
◦Continued support for X 10.5 and PPC users (1080p and ProRes on Dual-G5!).
For Anime Fans
◦Vastly improved MKV demuxer.
◦Rewritten linked segments and ordered chapter files support.
◦Correct support for FLAC, RV and Hi10p in MKV.
◦Rewritten seeking support in cue files.
◦Various ASS subtitles improvements.
For professional Users
◦Support for ProRes 422 and 4444, AVC/Intra.
◦Support for Jpeg-2000 and DNxHD/VC-3 in 10bits.
◦Support for EBU subtitles (stl) and EIA-608.
◦SDI and HD-SDI card support for input on Linux.
◦New Dirac/VC-2 encoder, faster than the previous one.
◦libVLC, libVLCcore and libcompat have switched from GPL to LGPLv2.1+.
◦New libVLC examples are available: media player, photobooth and mediainfo clones.
◦New JSON requests on the web interface to control running VLC instances.
◦Implementation of the MPRIS2 interface to control media players.
◦VLC's web plugins have been rewritten for better integration and stability in all browsers
Homepage - Download links : http://www.videolan.org/vlc/releases/2.0.0.html
5 views posted 31 Jan 2012, 00:25
WYSIWYG BBCode Editor - FREE SOFTWARE
If you live on a forum, or you are an occasional forum-er – this is the software for you!
Forget all those BBCode tags and the messy output. Forget the hard time you had after formating and previewing the post, then going back to find a small detail you needed to change.
You can just type and format your post message in this editor, and when it looks good, just Ctrl+Enter* or hit Generate BBCode (you can use the many keyboard shortcuts also). Whats more, you can edit your old posts also; just copy-paste your old bbcode into the lower editing window and hit Load BBCode!
No more tedious bbcode formating – what you see is what you get!Copy and paste directly from browser, and get converted BBCode.Paste images and links from clipboard.Save and load source HTML and BBCode.Supports multiple forum BBCode styles (change in options).Familiar keyboard shortcuts.Post formatted message directly to browser (IE and Chrome only)Auto-Updater.
Windows XP or greaterInternet Explorer 5 or greater
3 views posted 10 Dec 2011, 09:03
Microsoft to claim a right to rummage around in your Windows 8 hard drive
Windows Store comes with terms that allow Microsoft to kill, delete or change downloaded apps
December 09, 2011, 11:59 AM — Microsoft is stealing ideas and a sense of entitlement from the overly-entitled-feeling smartphone application market to improve its own control over products customers thought they obtained legally.
One of the many things most people don't realize about the apps they download to smartphones is that many come with kill switches – commands that can be sent across carrier networks to permanently deactivate a piece of software that turns out to be buggy, infested with malware, insecure or insufficiently invasive of the user's privacy.
(Having these things covertly built into paid apps would seem like a prime indication you bought a piece of weaselware, if the whole Android and iOS markets weren't already thick with apps seeded with spyware abilities so extensive they would make Big Brother weep with envy.)
Microsoft, which has never shied away from using someone else's ideas if they offered the chance to sell more software, announced it will build a similar kill switch into apps bought from its upcoming apps store to run on Windows 8 devices.
"In cases where your security is at risk, or where we're required to do so for legal reasons, you may not be able to run apps or access content that you previously acquired or purchased a license for…
I'm glad Microsoft is thinking ahead to what it would do if apps distributed through the Windows Store turned out to be buggy or infested with Malware or in some way unfriendly to Microsoft.
It obviously learned a lesson from the malware distribution center that took over much of Google's Android App Store at one point.
It's not Microsoft's first effort to get a look inside its customers' hard drives.
The spyware-ish Windows Genuine Advantage was a revolutionarily intrusive measure when it was first introduced in 2006 to verify Windows licenses before allowing customers to download Service Packs and other important updates).
One analyst quoted by Computerworld thinks Microsoft's process of filtering and monitoring apps in the Windows Store will be rigorous enough to keep out most of the malware and that it will follow accepted procedures to shut off or uninstall apps from the hard drives of customers.
I would hope that's true.
The Terms Microsoft has posted right now don't require that, however, so it would be free to do as it likes.
Even if Microsoft handles that power responsibly, allowing it sets a precedent that will have every other software vendor building in kill switches, PC-inventory tools, license-monitoring and verification services and half a dozen other types of proper-sounding but still intrusive commercial spyware.
Even assuming Microsoft does responsibly use the power to rummage around the hard drive of customers at will, the ability would present an awful temptation to use it to find out what competing products a customer is running, to "optimize" Windows apps or services by shutting down those of other vendors, or just monitor customer PCs to make sure they don't load any Microsoft products illegally.
Microsoft is always quick to justify any such intrusion as a way to prevent piracy, preserve its copyright and collect anonymous usage data to help its products run more effectively. It runs report-back functions in Microsoft Security Essentials, Office, Windows XP, Vista and 7, all of which are designed tor report errors and regular usage statistics. It's possible, though often awkward, to opt out of these, though most go back on by default after some patches or updates or when some random corruption forces the user to reinstall the whole app or suite.
Still, while I'm sure we all appreciate the priority Microsoft puts on making its products run effectively, it doesn’t seem as if it's the responsibility of the customer to let a vendor spy on every little thing he or she does simply to make sure one set of programs or subroutines doesn't conflict with another.
From most vendors that intrusion would seem creepy and presumptuous. From Microsoft it seems like a demand for fealty and submission to its priorities for your computer.
Unfortunately, the priorities of any vendor are pretty close to the polar opposite of those held by any customer. Customers have no interest in buying a continuing string of updates, paying for support they don't need, paying for products that only fail to interfere with other applications if they both came from the same vendor, or regular, unjustified friskings to verify we haven't become pirates or criminals since the last digital equivalent of a strip search.
Thanks for planning ahead for potential problems from third-party software we may download from the Windows Store, Microsoft.
If it comes down to a choice between getting an app from the Windows Store and not having it at all, I'll go with the one that doesn't encourage what has become a long line of software vendors wanting unrestricted, unannounced access to my hard drive.
There are plenty of people around who are after the same thing but – unlike Microsoft or other vendors whose indefensible Terms of Service pretend to justify uninvited intrusions – those people don't pretend they're doing it for my benefit, and tend to go to jail when they're caught.
26 views posted 29 Oct 2011, 04:56
Entertainment companies seeking to trace people who are illegally file sharing may be interested in new research that could identify file-sharers through their Skype accounts. A research team has figured out how to link online Skype users to their activity on peer-to-peer networks, a correlation that could represent a major threat to users' privacy.▼13 comments
The study focused on how a Skype user's IP address can be determined without that user knowing, and then linking that same IP address to files that are being shared through peer-to-peer networks such as BitTorrent.
Using information that users publish in Skype's directory, such as their name, location, and birth date, the researchers were able to get very close to identifying the person doing the sharing. They note, however, the method will just identify a machine rather than an actual person behind the computer.
A Skype user's IP address can be figured out even without their knowledge due to a major privacy vulnerability, the researchers wrote. Skype was notified in May -- the same month that it was announced Microsoft had acquired the company -- but the issue has not been fixed.
Skype's Chief Information Security Officer, Adrian Asher, said in an e-mailed statement that "just as with typical internet communications software, Skype users who are connected may be able to determine each other's IP address. Through research and development, we will continue to make advances in this area and improvements to our software."
Skype's peer-to-peer routing system means many machines are involved in setting up a Skype call. But the team figured out a way to sift out the nodes through which calls are routed and determine the user's real IP address by sniffing the packets.
Because Skype uses a proprietary protocol and encrypts the payloads of its messages, packets coming from the called party can't be inspected, the researchers wrote. Instead, they looked at the patterns between a caller and the Skype nodes.
Due to Skype's privacy vulnerability, an IP address could be extracted even if the caller wasn't in the called party's Skype's contact list, or if the caller had been blocked. The researchers also found a way to exchange packets with a user without them ever receiving a notification of a call.
Tools Identify, Track Users
The researchers built a Skype tracker that selected a set of 100,000 identified users. To correlated those IP addresses with files shared on BitTorrent, they also built tools to collect BitTorrent file identifiers, called infohashes, a BitTorrent crawler to collect IP addresses on the network and a verifier to match an online Skype user with an online BitTorrent user.
"As soon as the BitTorrent crawler detects a matching IP address, it signals the verifier, which immediately calls the corresponding Skype user and, at the same time, initiates a handshake with the BitTorrent client," they wrote.
A Skype user and a BitTorrent user could appear to be one and the same because they have the same IP address, but that may not be true due to the use of NAT (Network Address Translation), which allows several machines to share one public IP address. To weed out false positives of this nature, the researchers looked at identifiers in the IP datagrams received to see whether they had been sent shortly after one another from the same machine. If the identifiers in the datagrams generated by Skype and BitTorrent suggested they were sent close together in the same sequence, the Skype user was likely to be the one using BitTorrent.
Overall, the researchers determined that 52 percent of the 765 users they had verified were really using both applications. That means from a sample set of 100,000 Skype users, they figured out that 400 of them were using BitTorrent. Of those users, all had provided their last names to Skype and all but two provided their first names. All but one listed where they lived.
"We have further shown that by deploying modest resources, it is possible for an attacker to scale this scheme to not just one user but tens of thousands of users simultaneously," the researchers wrote. "A prankster could use this scalable calling scheme to, for example, create a public website which provides the mobility and file-sharing history of all active Skype users in a city or a country."
The research was done by Stevens Le Blond of MPI-SWS in Germany; Chao Zhang and Keith Ross of NYU-Poly in the U.S.; and Walid Dabbous and Arnaud Legout of INRIA in France.