KC News

I want my Music

Aquarela, Philippine based Brazilian Jazz group
You know you like that song but just don't know where to find it. You know it should be available online but don't know where to begin searching. You could also be researching for your composition but don't know where to begin.
Well, here are some easy ways to find, listen, and download those songs from your favorite artists. And a lot of these ways are FREE!

It doesn't sound like a music library, but it is. Archive.org has a great free collection of videos AND it is the home for the WAYBACK MACHINE, where you can see what a website looked like in the past. 

On top of that archive.org tons of FREE music that you can listen to and download. The songs here are primarily LIVE performances by a large variety of bands and artists - so search for your favorites and listen to a live rendition of your favorite songs! 


Music Band 2Pandora.com allows you to listen to your favorite tunes online for FREE. Searching by song or artist is a breeze. It also allows user account creation so you may be able to save your playlist and favorites! Sorry no downloads, just plenty of free tunes matching your taste.

Right now this site is only available to listeners in the USA. Other similar sites may be available in other countries. 

Try checking out a similar music site at slacker.com


BitTorrent is a peer-to-peer file sharing protocol used for distributing large amounts of data - such as music. 

If you're a bit computer-savvy and familiar with how peer-to-peer file sharing works, bittorrent is an great tool for you. Basically you download small "starter" files in torrent format and then run these to download the actual files you want. 

Bittorrent is a great distributions system for downloading ANY kind of file, from software to videos and of course for music fans there are lots and lots of tunes! You can get songs, entire albums, even entire artist catalogs - from the most popular to the rarest vinyl releases. All you need is bittorrent software and some bandwidth.

Get started:

  1. Download a Bittorrent Client (for example www.utorrent.com
  2. Install Bittorrent client
  3. Visit a website with torrent files. Search for "Bittorrent Music" to find the latest torrent websites
    that contain music. Or check the list at torrentresource.com
  1. Search for your artist/song/album.
  2. Download and Run the torrent file. The torrent client (e.g. utorrent) will open. Click OK and take note of the download folder location. This is where your files will be saved on completion.
  3. Open your music files in a player appropriate for your music. VLC is a good free media player.


Another method of getting free music is with an advanced google search. You can search for specific files on a specific website - say to find a song by your favorite artist. A good place to look is on file sharing websites. 

The advanced Google search string basically comprises of your artist or song name plus the file-sharing website name. Anything inside quotation marks tells Google to look for that exact string. Example:

"artist name" site:whatever.com
"song name" site:something.com

For example: "amazing grace" site:megaupload.com
This would lead you to a variety of versions of the song Amazing Grace

Those search strings tell Google to search for "artist name" and "song name" specifically on a specific site. 

Some file sharing sites to try:

Google is also good for so many other even more complex searches. If you are looking for something specific and not having any luck then you might want to experiment with more detailed search strings, for example:

* -inurl:(htm|html|php) intitle:"index of" +"last modified"
+"parent directory" +description +size +(wma|mp3) "Nirvana"

Just substitute the term "Nirvana" for any artist or album you might be looking for. Your search could lead you to open indexes that contain downloadable music files.

Now go rock!


Using multiple Gmail accounts all in one browser window

CookiePie is a Firefox extension that enables you to maintain different cookies storage in different tabs and windows.

What good is that?

Here's one cool feature:

Switch CookiePie ON in two tabs, and you can log in to different GMail® accounts in each one.

Yes it works. ;-)




1) Right-click a tab and select "don't load cookies".

2) Sign into your first Gmail account.

3) Open another tab. Right-click tab and select "don't load cookies".

4) Sign into your second Gmail account.

A Friend in Need is a... Phishing Scam?

!Hoax warning!

Your friend did not lose their wallet and they do not need money!

Have you gotten a desperate email, text, IM or phone call from a friend or family member who needs money?

They usually say "I lost my wallet" and "I am traveling" and naturally "I need money" as well.

fakeTheir request may sounds legitimate. You may get really worried. Stop!

Don't fall for it. Don't send money! It is probably another scam.


Who is Affected

Rich people. Poor people. Famous people. Sexologists. UK Politician Jack Straw...

Web-based email sites like Hotmail, Yahoo, and Gmail are all susceptible. Facebook and other social networking sites too.

You too!

How the Phisher/Hacker/Scammer Works

  1. Scammers are getting smarter. They are using proper language. They are using more personal details (obtained through hacks and identity theft).
  2. You get an emails supposedly from your email admin. They ask you to reply to the Email with your username and password (and occasionally with other personal info). They say refusal will result in your account being cancelled.
  3. You receive a chat request - e.g. on Facebook - from a friend. After accepting the request, the friend tells you their wallet was stolen and they need money.
  4. You get a message asking you to run a program. It sounds legit, but it is actually a Trojan Horse that can compromise your computer or network.
  5. Phishing messages today look just like legitimate messages. They look like they come from friends or businesses such as banks, phone companies, electronic payment services, credit card companies, etc. Even the graphics look legit. They may even warn you about fake messages! But the link they want you to click is usually fake, although you may not be able to tell.
  6. Spear phishing is a new form of phishing which targets a specific user. These emails look authentic. They may even include your complete name or refer to other real things. Spear phishers gather this info by doing research or breaking into databases. These emails can fool even tech-savvy people.
  7. Scammers hack into your friends email (usually by guessing their useless password), and then send out the "help me" note to EVERYONE in the address book.
  8. Newer phishing emails do not contain any obvious fake links. They don't ask you to visit fake Websites or install Trojan Horse software. They try to fool you in other ways to create a hole in your computer or network.

What You Can Do

1) Call your friend (don't reply to the email!)

2) Tell them their email was hacked and suggest they do the following:
a) reset or close their account
b) warn and apologize to everyone in their address book
c) notify their email company
d) only use secure passwords

3) Tell your friend that their password was probably not safe. This resulted in a scammer getting access to all the emails and addresses in their email account. Ouch! Now your friend and everyone in their address book is more susceptible to identity theft.

4) Use a browser such as Mozilla Firefox with antiphishing features. It can warn you about bogus sites.

5) Use email software such as Mozilla Thunderbird with antiphishing features. It can warn you about bogus emails.

6) Run antimalware or antispyware software and keep it updated

7) Verify ANY requests for MONEY

More Information

UK Justice Secretary Jack Straw hacked

Family Member Impersonated

Sexologist Hacked

Sample Scam Email

Hope you get this on time,sorry I didn't inform you about my trip in Scotland for a Program, I'm presently in Scotland and am having some difficulties here because i misplaced my wallet on my way to the hotel where my money and other valuable things were kept. presently i have limited access to internet,I will like you to assist me with theloan of $ 2500 to sort-out my hotel bills and to get myself back home.

I have spoken to the embassy here but they are not responding to the matter effectively,I will appreciate whatever you can afford to assist me with,I'll Refund the money back to you as soon as i return,let me know if you can be of any help.I don't have a phone where i can be reached.
Please let me know immediately.




Spyware and malware attacks are becoming much more aggressive than even just a few months ago. And your computer that is connected to the internet is vulnerable! So what can you do?

First of all, having antivirus and antispyware on your computer is NOT ENOUGH.

You must follow safe computing practices in order to avoid infection and transmission of harmful software.

We strongly recommend you follow these SAFE COMPUTING PRACTICES:

1. Don't open any chain emails or mass emailings.

If you do open one then don't forward such communications to others. Just hit delete!

2. Don't open any attachments from unverified sources.

That means DO NOT open any attachments that are unexpected. Just hit delete!

3. Don't install it!

Don't install any specialty applications found in Facebook and similar applications; don't click on any Twitter links. Ignore them!

4. Mac users are no longer safe.

Macs are no longer virus-free products - in many ways, they are more susceptible to malware/virus attacks than their Windows counterparts. Mac users, don't be complacent and make sure that you exercise safe computing, too!

5. Don't fall for fake Pop-ups

If a window pops up on your computer indicating that you have some sort of virus infection and that you should click on a link to scan your machine or download software, DO NOTHING! DO NOT CLICK ANYWHERE ON THE POP-UP WINDOW MESSAGE, DO NOT CLICK CANCEL, DO NOT CLOSE THE WINDOW. Interacting in any way this pop-up window can lead to the installation of password catches, key loggers, and all sorts of other terrible things on your computer. Instead, press Control+Alt+Delete on your keyboard and then end all applications listed in Window's Task Manager.

6. Don't get infected by infected websites

The worst attacks on the internet at this time get on your computer from infected Web sites - these may be perfectly legitimate sites that have been subverted by hackers.

By time you see a pop-up window you may already be infected. The worst of these infections tell you you're infected and may put up something that looks exactly like a Windows report. They will tell you to purchase a clean-up tool. And if you pay them, that's just the beginning of your problems. These infections are written by experts. They are extremely difficult to remove. Special tools and techniques are needed.

7. Always update windows and browsers immediately!

Make sure your Windows and Web Browser are updated with patches and fixes as soon as they come out. This is extremely important as these infections exploit flaws in Windows, Internet Explorer and other programs. The moment a patch comes out the bad guys analyze it for how to exploit the vulnerability it fixed - then write exploits to go after all the unpached computers out there. it takes them only 3 or 4 days.

8. Avoid Microsoft Internet Explorer

Use Mozilla FireFox, Opera, Chrome or Safari rather than Internet Explorer, as it is the most vulnerable Web browser.

9. Make Backups

Purchase an external hard drive and back up all your files to it regularly. Think of this hard drive as $100 insurance that comes in the form of a little black box.

10. Antivirus recommendations

Make sure you have a good antivirus program and it's always up-to-date. Windows includes a free built-in antivirus called Windows Defender (formerly known as Microsoft Security Essentials) which does a decent job.

We don't recommend the popular Norton or McAffee software. AVG or AVAST or even 360 is what we recommend to clients (the free versions usually suffice). Anti-virus programs can't stop everything out there, but at least they may be able to slow some things down - if they're up-to-date. And regular backups are still more important!

11. Antispyware recommendations

Make sure you have antispyware which is not exactly the same as antivirus software. We recommend Spybot Search & Destroy.

Need more advice? Contact Kahl Consultants or speak with your computer or IT expert.