Torrents – Torrent Sites – Torrent Software

Torrents - Torrent Sites - Torrent Software

I’ve been asked numerous times about how to obtain Operating System (OS) software for free. Here’s how:

But First

Be forewarned, we are treading on morally and/or legally questionable ground here and taking advantage of this particular technology has the propensity to infect your machine with all kinds of ugly little beasts if you’re not careful.

In a classic application of the “Good News/Bad News” cliche, let’s explore…

The Good News

You’ll be able to download, install and enjoy almost any software, movie, music or other digital property for free. With few exceptions, I’ve found every application I could ever use, for Windows and Macintosh, and thousands upon thousands of movie titles, music albums, audio books, photographs, etc.

The good news is easy, next;

The Bad News


The nature of this type of technology is questionable. Many, namely the major movie studios, record companies and software distributors, consider it illegal.

The technology is peer-to-peer (P2P) and started with applications like Napster, Kazaa, Morpheus and Limewire. Bittorrent is considered the 3rd generation of P2P and is not only more efficient, but also more elusive from a legal standpoint.

Without getting into too much detail, when you install a bittorrent client, like Vuze, you enable the bittorrent protocol which allows you to download very large files from multiple sources simultaneously. The source of those files do not reside on a server, which would be copyright Vuze - Formerly Azureusinfringement, but rather on a network consisting of millions of personal computers.

When you initiate a download of a particular file, the protocol searches through the network of computers, locates the file, then downloads the file a small piece at a time from each computer in the network and reassembles them in order after the download has completed. The ambiguous nature of the download presents a challenge, legally, and while there are efforts to close this gap in the law, as of this writing nothing with teeth has come about.

(Please also keep in mind that much of the software downloaded requires serial numbers and activation. Very often the tools required to activate the software are provided with the files. Serial numbers and activation codes can be generated by programs called “Keygens” and files or programs called “Cracks” are also used to make the software fully functional.)


On the face it would seem obvious that downloading a movie you didn’t buy is wrong. But what about software and movies that you have purchased?

There was a time when Microsoft included full-install disks when you bought a computer with Windows installed. With Windows 95 you could install that OS on as many machines as you wanted. As greed and time progressed, less features were offered by the software behemoth, and now if you’re hard drive fails and you only want to replace that, you conceivably are forced to purchase another OS disk from Microsoft.

So the morality of P2P is subjective, and many industry techies not only endorse using it, many use it themselves.

Virus, Trojans, Questionable Material

The last caveat is the sites where torrents are available. They are often cluttered with ads for pornography and a good percentage of the files themselves are either infected with little nasties or are fake downloads to begin with.


DemonoidShould you decide to try this out, Demonoid is the safest place to do it. In the beginning you could only register on Fridays, but this seems to have loosened up a bit. Demonoid does not allow pornography, nor does it advertise pornographic sites or products. One really great feature about Demonoid is the comments sections.

Before you embark on a torrent download, read the comments section to see if it works, and whether or not there are any virus’ or trojans associated with the files.

Pirate Bay, Isohunt, Btjunkie

Pirate Bay has a rich history of scoffing at legal threats from the largest corporations in the world. Go HERE to read through the letters and responses, very funny stuff. Pirate Bay has lost some of it’s luster since the original owners sold the company to a Swedish software firm, but at least you don’t have to pay for the service.

Isohunt, Btjunkie and hundreds of other tracker sites is where you’re exposed to porno ads and a higher probability of infecting your machine with above mentioned nasties. To add insult to injury, many of these sites want you to buy a subscription so that essentially you are paying for what they got for free.


If I bought a computer with Windows installed on it and something happened that required I reinstall the Operating System, I am not given the proper tools to correct the problem. As we Windows users are well aware, updates, patches and security fixes are a regular part of our computing experience. It is also well known that the Windows OS gets messed up after regular use.

Since Microsoft admits, by insisting on constant updates, that their product is flawed, why do they not include a full install disk with your purchase?

The simple answer is that they don’t have to, because they monopolize the market. They force us to either re-purchase the OS or seek other means to obtain it. Installing Vuze and downloading the OS from Demonoid is one other way to obtain it.


Beyond Vista

Seems that Microsoft is moving quickly towards it’s next version of Windows. They correctly identified that Vista is flawed. I understand. You put several million dollars into a project, you want it to work, but it isn’t right.

Oh well,

On to the next.


FREE Guide to Internet Security

Is your computer running slow? Don’t pay for a solution when you can get it for FREE!

FREE Guide to Internet SecuritySimply put, almost every program you install on a Windows Computer requires Root Access. Root access enables spyware, malware, adware, viruses, root-kits and more to take control of parts or all of your Windows Computer System. That’s the bad news. The good news is that there are a number of free programs you can install to protect yourself (or rather your poor unsuspecting computer) in the increasingly shark-infested virtual ocean waters we call the internet. But first:

Watch Where You’re Going!

The first line of defense is proper net surfing habits. Don’t click on flashy, thingy, “you’re the winner”, types of links. They are intended for idiots and you don’t fall into that category. Don’t open any attachments on emails from email addresses you don’t recognize. If you use Microsoft Outlook or Outlook Express, I recommend turning the “Reading Pane” off. The bad guys are able to initiate malicious code in image files by simply displaying the image on your computer. The “Reading Pane” opens the image, and viola, you’ve just been infected. Also, pay attention to links in emails. Bad guys will change one letter or add a .de or something similar in a familiar looking link to trick you into clicking on it. When you mouse-over the link in Firefox, the link address is displayed in the bottom left corner of the browser, just take a look before moving forward. The next thing to look out for is FAKE system alerts. Watch out pop-ups that look like the following:

Fake System Warning – Pop up

Fake System Warning

Fake Spyware Warning

Fake Spyware Alert

Fake Critical Error Message

Fake Critical Error Message

Fake Internet Explorer Warning

Fake Internet Explorer Warning

Fake Infection Notice

Fake Infection Notice

Fake Spyware Ads

Fake Spyware Ads

People have gotten really good at FAKING system error messages and behavior. They trick you into believing you have some sort of infection, then offer a link to remove it. What they actually do is infect your system even more. Fortunately there are a number of free resources available to protect you.

FREE Resources

1. Spybot Search and Destroy – (download link)

Spybot has offered their excellent FREE anti-spyware software since 2000. I recommend this every time because it’s still the best. It is constantly updated and one of the premiere products of this type. It takes a few minutes to download and install, but has many features to keep the bad guys out. Here’s a few features:

Feature Default
Removal of adware and spyware
Removal of dialers

Removal of keyloggers

Removal of trojans and other baddies

Removal of usage tracks

Yes Yes
User-extendable database Yes Yes
Save removal of threats by shredding them Yes Yes
Backups of every removed problem Yes Yes
Exclude option to ignore specific problems Yes (1) Yes
Permanent blocking of threatening ActiveX downloads

Permanent blocking of known tracking cookies for IE

Permanent blocking of threating downloads in IE

Yes Yes
Command line parameters to automate tasks Yes Yes
Number of targets > 600 > 600
Number of detection files and entries > 10000 > 10000
Detailed information about problems found Yes Yes
Strict criteria to define targets Yes Yes
Integrated update function

Weekly updates

Update notification by mail

Yes Yes
Free email & forum support Yes Yes
Settings to automate scan, removal and update No Yes
System reports to locate even unknown threats No Yes
Skins to adjust interface to the users liking No Yes
2. Ad-Aware from Lavasoft – (download link)

No spyware, malware, virus removal software is all inclusive. I don’t care what their ads say. Ad-Aware from Lavasoft is the perfect accompaniment to Spybot. Between the two of them, you catch most of the junk out there. Here are a few more features from the Lavasoft site:

  • Improved Threat Detection
    • Spyware, Adware, Trojans & Hijackers
    • Fraud Tools & Rogue Applications
    • Password Stealers & Keyloggers
  • Enhanced Rootkit removal system
  • Faster Updates & Faster Scans
  • Less Resource Usage for optimal computer performance
  • Easy to Download, Install and Use
  • Lavasoft ThreatWork submission tool
  • Compatible with Windows Vista (32- and 64-bit)
  • Supported Languages: Dutch, English, Flemish, French, German, Italian, Portuguese, Spanish
3. AVG – Antivirus – (download link)

AVG is another tried and true FREE Anti-virus software package that is constantly updated and protects you against many of the nastiest bits of code prowling the net. A little more about AVG:

  • Automatic update functionality
  • The AVG Resident Shield, which provides real-time protection as files are opened and programs are run
  • The AVG E-mail Scanner, which protects your e-mail
  • The AVG On-Demand Scanner, which allows the user to perform scheduled and manual tests
  • Free Virus Database Updates for the lifetime of the product
  • AVG Virus Vault for safe handling of infected files

These three are a great start, however I will warn you that almost any anti-spyware, anti-virus, etc., will have an effect on system performance. Things will slowdown a little. Each of these programs attempt to catch the rogue code before it makes onto your hard drive. That means there are millisecond delays before pages load, emails appear, etc. so that’s the trade off. Paid for versions by Norton, McAfee and other are no better, in fact in most cases they are worse.

If you’re a pretty safe surfer and you don’t want to bog your machine down with a bunch of software than there are FREE online Scan alternatives. I refer all my friends to these:

TrendMicro – is a FREE online virus scanner. It’s completely trustworthy, effective and up-to-date.

Panda ActiveScan – is another great FREE online scanner.

A couple other safeguards are switching to Mozilla’s Firefox browser instead of Internet Explorer. Firefox has a number of builtin safety factors that IE is trying to implement, but just doesn’t do as well.

I hope this was helpful. Any comments are welcome of course.