Tech – for Everyone

Tech Tips and Tricks & Advice – written in plain English.

A Quick Word About Torrents & DRM-free Music

I received a note from a reader that got me a bit hot under the collar for a moment. It was in regards to a comment I made in yesterday’s Internet radio article (see, Music Radio For Your Phone (or Blackberry)(or PC)) .. specifically, “no, I do not purchase tunes“.

The writer presumed that indicated that I am like everyone else in the free world (apparently) and used a “file sharing” program (commonly called “Torrents”) and they inquired as to which one I liked best and recommend… uTorrent? eDonkey? LimeWire?

My first thought was, clearly they are new to the site. My second was a realization that I have not mentioned this in some time now. Perhaps the time is right to say it again.

  • I cannot tell you the exact number of times, but I can tell you the percentage is quite high, that when I am called in to remove a “virus”, I will find a “file sharing program” installed on that machine. Cyber criminals like to plant trojans in files, and then “seed” the torrent sites with them. And they lose no sleep.. as you are trying to get something for nothing yourself.
  • “File sharing” is (in my mind, anyway) synonymous with “stealing”. I don’t steal.

So there you have it: it’s risky and “quasi-legal” (at best). I don’t do it. And anyone who asks me about torrents will get a copy of this article. (Can you guess? I do not recommend it?)

So where do I get my songs? (aka “today’s free download:”) Well, I “digitized” my records and tapes using a “Y” cable (to my stereo)($3) and the editing program Audacity (free).

“Audacity is an open source audio editor that is available for several platforms (including Windows, Mac, and Linux/Unix). It is one of the most popular free audio editors in use today mainly due to its excellent set of tools. As well being compatible with MP3, WAV, AIFF, and OGG file formats you can use Audacity to record live audio, and convert analog audio such as tapes.”

But if I had it to do over again, I would get a USB turntable.

Alternatively, I would use a legal music service. And, I would buy the DRM-free versions of the songs. Instead of reinventing the wheel, I will point you to an article, titled: Buy Music Unfettered by Digital Rights Management

Competition is now wide open for these interoperable music files. Besides iTunes, millions of DRM-free files are available from Amazon, Rhapsody, Napster, Zune, eMusic, and others. But each store has its own benefits and limitations: price, file quality, selection, and other quirks. Here’s how they all stack up in the DRM-free download world.”  Read more..

I know. 99% of you are LMAO-ing. What?! Buy music???!!!

Yes.

Pay for it if you want it. The fact that “everyone is doing it” (torrents/file “sharing”) does not make it right.

Related: How To Digitize Your Old (Analog) Movies, Music, and Photos

Today’s quote:Character is doing the right thing when nobody’s looking. There are too many people who think that the only thing that’s right is to get by, and the only thing that’s wrong is to get caught. ~ J.C. Watts

Copyright 2007-2011 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


July 27, 2011 Posted by | computers, cyber crime, digital music, Internet | , , , , , , , , , , , , , , , , , , | 12 Comments

Do You Need AV on a Mac?

I get asked that from time to time. But usually, I’m not asked, I’m told. “I don’t need all that *crud*. I’m on a Mac.”
Usually, but not always, there’s a certain tone the speaker adopts when uttering that Standard Line (read, “dogma”) that conveys a smug superiority.. but, hey, everyone’s entitled to a little.. uh, delusion or two in my book. Keeps life interesting.

Basis in fact: There are some reasons for this don’t-need-an-antivirus belief system. One is, Apple itself has promoted the idea. Another is, there were hardly any (and at some points in history, no, zero, zip, nada) viruses / trojans / worms / etc. written to exploit the Mac OS. And even now, they’re considered “rare”.

Cyber-criminals (aka “hackers”) knew that less than 5% of computers were Macs, and essentially none of the “pots of gold” (database servers) were running the Mac OS.. so why write a attack program? (Apple products have been proven quite “hackable” – iTunes, QuickTime, Safari actually rank quite high on the list. See, Firefox More Secure? Tops ‘Most Vulnerable’ List) Answer– There’s basically nothing to attack with it.

Then and now: But, that was before Vista; and, the “I’m a Mac” series of television commercials. Now, instead of approximately 1-in-20 PC’s being Macs, it’s more like 1-in-10. Now, the idea of a all-Mac botnet has some merit (and a true Mac fan will tell you, all the Windows PC’s have already been taken!). An all-Mac botnet wouldn’t be all that big.. but the new numbers mean it’d be big enough for some uses…

So, sure enough, some enterprising criminal wrote a backdoor worm and glued it to a copy of iWork ’09 and posted it to several of the torrent sites, knowing that Mac-using folks who don’t like paying for things would download and install it.
Voilà, we got us an all-Mac botnet.
[note: this has happened before, to Mac+LimeWire² users; see, Firms discover Trojan horse targeted at Mac OS X]

Someone has named this worm “iServices.A”, which is much more rational and.. nicer (ahem) than what I might have named it. This worm allows the hacker to do pretty much what he wants with the infected machine, which so far appears to be sending boatloads of spam to specific URL’s, in what is called a “denial of service” attack (the flood of messages overloads the server, and causes it to ‘crash’/shutdown)(see, Our Modern Nightmare – Zombie Attack)

Me? I have consistently advised installing an AV, no matter what platform/OS you’re running, just as I consistently advise making backup copies of your files, (yes, I have been accused of being a bit of a “belt-and-suspenders” man) for one very simple reason — what is the cost if you do, versus what is the (potential) cost if you don’t?
Plus.. it’s simple math: the more popular Macs get, the more they’ll be targeted.

Feel free to disagree, but you won’t get me to change my mind. My Tiger machine has antivirus onboard.. though I don’t know why I bothered, I never turn the thing on.

Today’s free link(s):
* Brian Krebs has an absolutely great article detailing this worm, and I leave it to him to make what may be the most important point on the subject–
“Leaving aside (hopefully) the question of whether Mac users need anti-virus, I’ve tried to impress upon readers the importance of avoiding risky behaviors online that could jeopardize the security of their systems. The reality is that installing programs downloaded from P2P networks is about the most insecure practice a computer user can engage in,¹ regardless of the operating system in use.

This is why I think it’s important to call out this Trojan. Yes, it infects Macs, and that’s something we don’t see very often. But it’s also a teachable moment to remind readers that no security software is going to protect the user who is intent on installing software that may be tainted with malware, as long as that user is willing to ignore any advice (or alerts) to the contrary.

I highly recommend you read the whole article, Pirated iWork Software Infects Macs With Trojan Horse. Once you do, I think you’ll understand why he’s on my Blogroll.

* Blogroll member Bill Mullins posted an article that takes a look at the P2P “phenomenon” that I also highly recommend, Peer to Peer File Sharing – Evaluate the Risks – Consider the Trade-Offs

* And this article is a very good answer to the question, Is Mac still the safer bet?

¹ emphasis, mine.
² A very popular BitTorrent-style peer-to-peer program.

* One last thought.. anyone care to guess what percentage of people’s machines that I look at in my “real job” have LimeWire installed?

Copyright 2007-9 © Tech Paul. All rights reserved. post to jaanix

Share this post :

January 25, 2009 Posted by | advice, antivirus, Apple, computers, cyber crime, hackers, News, security, tech | , , , , , , , , , , , , , , , , , , , , , | 2 Comments