Friday, 24 June 2016

Online Privacy.

Online privacy is something we should all be paying attention to - in particular, what information we're revealing about ourselves without knowing it. Assuming you're not doing anything you shouldn't be, there's nothing inherently wrong with guarding your personal details and browsing habits. Privacy isn't just an issue for celebrities.

In fact, it's far more likely that your privacy is compromised by advertising agencies than anyone else. From a simple Google search, to pretty much any ad-funded website, your browsing behaviour can be tracked to establish which adverts you're most likely to click on. Fortunately, there are plenty of ways to prevent this monitoring. We'll show you some of the best options, from simple tricks to more hardcore solutions that can shield you from almost any surveillance. It recently emerged that someone has claimed to have hacked Twitter, exposing a number of users' passwords. Twitter has maintained that it has not been hacked, and that what's likely to have happened is that people have been careless with their passwords - for example using the same password for multiple different sites.



A Twitter spokesperson told us that "we are confident that these usernames and credentials were not obtained by a Twitter data breach - our systems have not been breached. In fact, we've been working to help keep accounts protected by checking our data against what's been shared from recent other password leaks." In light of this, we've updated this guide with some first steps in making sure you're protected online, before going into more advanced techniques.


Password protection
The first rule about keeping yourself protected online is to make sure you have difficult-to-guess passwords, which ideally will be unique for every website that you log in to. If you're using the same password for all of your logins, someone could gain access to one of your accounts, and then they would be able to access all of your other ones as well. Graham Cluley, a security expert, has a useful tip of people who are worried that having multiple complicated passwords will be difficult to remember.

"I recommend that users use dedicated password managers to remember their passwords for them, and those can also be used to create unique, hard-to-crack passwords to boost security." These password managers - such as LastPass - stores all of your passwords in a digital vault that you can access with one master password. When you return to a website, LastPass can quickly fill out the forms with your username and password, making it convenient as well as secure. Stay safe online It also comes with a password generator which can create complex and nigh on uncrackable passwords for your accounts. Check out our best password managers round up to find out which ones we think are the best for protecting you online.

Use two-step verification
Wherever possible you should use two-step verification to help improve the security of your login details. Two-step verification (also known as two factor authentication) makes it more difficult for someone to gain access to your login credentials by making you have to supply two items of authentication to log in. The most popular version of this involves you providing your password, along with a verification code that's sent to your smartphone. Other methods include PIN codes generated by a physical device, or providing an answer to a question only you would know. Not all services and websites support two-step verification, but a growing number do, so you should make sure you turn this feature on when you can. Check out our guides on how to add extra security to your Apple ID and how to boost your Google account's security for explanations on how to turn on two-step authentication with those popular services.

How to stay even safer online
Anonymous browsing Online privacy tends to make headlines with stories of governments spying on citizens. But while state surveillance is undeniable, the first invasion of your privacy is more likely to come via a Google search. Although apparently anonymous, Google has a habit of tracking your searches in order to bombard you with personalised adverts. By contrast, a search engine such as DuckDuckGo generates unbiased search results without the added user profiling or tracking. Switching to a less commercially driven search engine will certainly help you on the road to anonymity, but visit a few websites and inevitably you'll receive cookies. These tiny text files are usually perfectly legitimate ways for websites to record things, such as frequently viewed items, so they'll appear on your next visit. But, cookies can easily turn on you...



Tracking cookies are more invasive and compile records of browsing habits and personal details in order for the cookie host to target you with specific adverts. Since 2011, EU and US law has increased cookie awareness by requiring websites to display homepage notification banners that you can't miss, but it's really just a token nod at respecting privacy. A more promising attempt at keeping your browsing less trackable is the Do Not Track HTTP header, now integrated into all common web browsers. When activated, websites are requested not to use tracking cookies.
However, the key word there is "requested", as while Do Not Track may be great in theory, the feature can't actually prevent websites and advertisers from tracking you.
There's no law to say they can't completely ignore a DNT request.
Clear the slate So, the bottom line is, it's up to you to stay anonymous. Simply clearing your browser cache and cookies through your browser's settings is a good start.
Alternatively, you can use clean-up software such as CCleaner to delete cookies, temporary internet fi les and various other web leftovers from multiple browsers in one go.

Private business Once you've got a clean slate, keep it that way by using private browsing modes to keep your interests under wraps. This could be Microsoft's InPrivate feature, Firefox's Private Browsing mode or Incognito in Chrome.

They all do a pretty good job of preventing nosey tracking cookies from setting up camp on your computer. But even without going into full-on secret browsing mode, the big browsers also allow you to block third-party cookies, and while this doesn't create an impenetrable barrier, it's more eff ective than a Do Not Track request. Another easy way to regain control of your internet anonymity is by exploiting browser extensions to close privacy loopholes. Active web content such as Java, Flash and Silverlight can be used to obtain system information without your knowledge and piece together various browsing habits.
Automated scripts can also be potential security risks, so controlling exactly what web content can and can't run is a good thing. Browser extensions such as NoScript for Firefox and ScriptSafe for Chrome allow you to do exactly that, blocking all active web content and asking for your approval before letting it run. At first these extensions can be annoying, but the more you use them, the smarter and less intrusive they get. How to stay even safer online

Spot the spies
The problem is, even when web tracking is legitimate, the fact it happens without your knowledge provokes lack of trust. Wouldn't it be great if you could see exactly who's trying to sneak information about you so you could stop them in their tracks? Well, that's exactly what extensions such as Ghostery and Disconnect do. Both are available for IE, Firefox and Chrome.
With a simple browser button, you can see a list of active advertising, analytics and social media tracking organisations on a current webpage. You're even able to control which ones can collect information about your browsing session. Both extensions are easy to use and far less troublesome than script-blockers.
Plus, unlike private browsing modes, which simply stop tracking organisations from leaving cookies, these extensions can actually prevent them from monitoring you. Far more effective. However, just because your browser is locked down, this doesn't necessarily mean your system is secure.
Any malware already present on your PC may still be snooping on you, and carelessly downloading the wrong zip, executable or even PDF file can transmit your personal details to unintended recipients. How to stay even safer online

Encrypting email Email attachments aren't the only way in which your privacy can be compromised. Your actual written email correspondence is also far from anonymous.

Way back when Google launched Gmail with a 1GB storage limit, it wasn't keen to market how this capacity was funded. Google did, and still does, scan email content in order to target you with personalised adverts, and Yahoo is up to the same tricks.
Thankfully, there's no shortage of ways to keep your email correspondence safe and secure. If you're serious about email anonymity, providers such as Hushmail offer built-in PGP email encryption and no advertising.
Email another Hushmail user and your message is automatically encrypted when sent and decrypted when read.
Email a non-Hushmail recipient and you can still use encryption, but require them to answer a secret question before the message can be read. Clever stuff , but you'll need to part with $35 a year for it, or there's a free version if you can stick to a 25MB storage limit and log in frequently.

Alternatively, you can also encrypt mail sent via webmail accounts such as Gmail, Outlook and Yahoo, simply by using a desktop email client like Mozilla Thunderbird, plus a few other tools.

With Thunderbird installed and configured as your email client, download and install the free GNUPrivacy Guard encryption software, and then download the Enigmail Thunderbird extension and follow the configuration wizard.

If that sounds like overkill for sending a couple of anonymous messages, then consider a disposable email address instead. Guerilla Mail and Mailinator both fit the bill, letting you quickly send and receive anonymous mail with no incriminating sign-up processes or content scanning.
The wonders of encryption can also keep instant messaging secure. Apps such as Cryptocat will integrate with Chrome, Firefox or Opera, giving you an encrypted chatroom to converse with other Cryptocat users.
To minimise traceability, there are no static user accounts, so you create a dynamic username each time you connect. Once in, you can start your own conversation or type the title of one that's already active to join in. No group conversations are private though, so anyone who requests your conversation name is free to participate. However, you can select an individual for a private chat, as well as sending encrypted files and photos.

Paranoid or Prudent?
In 2013, Edward Snowden was revealed to have downloaded and leaked up to 1.7 million classified documents, revealing the extent of mass surveillance in the US and around the globe.
How to stay even safer online Key revelations from these leaks include the existence of PRISM: a partnership between the NSA and at least seven major internet companies, including Google, Apple, Microsoft, Yahoo and Facebook. PRISM enables the NSA to access the emails, documents, photos and personal details of any non-US citizen from its participating companies (which have immunity from possible ramifications), en masse, without having to specify an individual target or communications method.

The only crumb of comfort is the NSA apparently has to request the information, rather than having direct server access. Snowden's leaks also revealed the UK's Government Communications Headquarters (GCHQ) taps around 200 fibreoptic cables carrying global internet and telephone data amounting to up to 600 million daily communications.
Intelligence is then shared with the NSA and can be stored for up to 30 days for analysis. Snowden's leaks also detailed the NSA had collected over 200 million global text messages per day and stored details in a database accessible to GCHQ. The really scary bit? This surveillance was able to gain information on individuals who were not under any criminal suspicion.

How to stay even safer online The big bad world
Exposing and blocking advertisers or encrypting email can help you take back some control of your privacy, but it's not enough to keep you and your location hidden.
Whenever your computer is connected directly to the internet, you're still within radar unless you've taken some measures to conceal your IP address. There are many ways to hide your IP address - but consider if you really need to? The gatekeeper of your identifiable details is your internet service provider. But in the UK and the US, at least, they're unlikely to have the time (or the money) to want to snoop on you themselves.

Both the Creative Content UK alert programme and the US Copyright Alert System are more lenient than you might imagine. If you're found illegally downloading a copyrighted file by the rights holder, they can record and submit your IP address to ISPs in the alert program. If one ISP happens to be your provider, then you'll be sent a copyright infringement notification letter informing you of ways to avoid future breaches.
The UK system allows you to receive four such letters or emails a year. After that, well, not much happens, as it stands. In the US, you get up to six warnings. By the fifth or sixth warning, ISPs can start throttling bandwidth or using other measures to make subscribers play ball. Even then, however, US ISPs are not required to disconnect subscribers or even disclose personal details to the copyright holders.

This all sounds forgiving, but relying on your ISP to protect your identity isn't advisable. Even when most providers are reluctant to divulge your details, sooner or later they will have to give into the law. Take the recent case of Voltage Pictures identifying and attempting to sue thousands of individuals in the US, Singapore and Australia for illegally downloading the film Dallas Buyers Club. It's doubly risky when you consider that, even when the threat of legal action and fines may not stand up in court, fighting your corner won't be cheap.

Tor of duty
One way to get closer to complete anonymity on the cheap is to use Tor, aka The Onion Router. If there's an element of the internet that divides opinion it's Tor. Tor has the same effect as a proxy server, fooling monitoring systems by faking your computer's location.
But it considerably boosts your anonymity by passing your internet data packets through multiple encryption servers (nodes) before they emerge on the open internet (clearnet) and scoot off to your requested website.
As your IP address is concealed by so many encryption servers, you get multiple layers of protection rather than just a single proxy server barrier, and the result is, well, like the layers of an onion.

However, like its veggie namesake, Tor can also be eye-wateringly annoying. The numerous encryption servers that relay your data within the Tor network create speed bottlenecks, and, being volunteer-run, demand usually outstrips available bandwidth. You can't just access the Tor network via any old web browser either, as Tor requires its own modified, standalone browser, though this is a derivative of Firefox. What's more, while Tor makes it difficult for agencies to perform traffic analysis, it's not completely safe. The final Tor node that a packet is relayed through before exiting onto the clearnet is known as the exit node. There are more than 1,000 of these active at any one time, and though unlikely, it is still possible to eavesdrop on an exit node, as the data emerging there is unencrypted.

How to stay even safer online
Freenet
An alternative anonymous network without this weakness is Freenet. This is different to Tor in that it's not a means of accessing the clearnet anonymously, but rather a secure network in which to communicate and share files with trusted circles of contacts.
Freenet uses a peer-to-peer model and allocates a portion of your hard drive to store Freenet data and serve it to the network. This is encrypted, as is all the data passed around Freenet, and thanks to such comprehensive end-to-end encryption, Freenet is almost impossible to penetrate and is ideal for anonymous communication and file sharing.

Users are also able to create and host Freesites, which are static websites hosted within, and only accessible from, the Freenet. There are also plug-ins for anonymous email, social network-style communication and forum contact. However, as with other peer-to-peer file-sharing systems, transfer speeds are seed-dependent, and don't expect the overall speed of the network to be lightning-fast either.

How to stay even safer online
Going virtual


Though networks such as Tor and Freenet are useful for protecting privacy, their slow and limited functionality hardly makes them ideal for everyday anonymous internet usage.

To go totally incognito with the fewest possible restrictions or drawbacks, you need a VPN (Virtual Private Network). Where services such as BTGuard will hide torrent traffic, and Tor can keep web browsing anonymous, a VPN will hide the entirety of your internet traffic inside an encrypted tunnel. How to make your VPN more secure Traditionally, VPNs have been used by companies to securely connect employees working off -site to a private corporate network, but now they're increasingly popular for the average Joe wanting to preserve their privacy. To exploit a VPN, firstly you'll have to come up with at least $5/month to subscribe to one of the huge number of personal VPN providers out there, and you'll also need to install that provider's client software so you can access your VPN tunnel.
Inside the tunnel, data is encrypted to various degrees, depending on the quality of VPN you choose, but that's not the only aspect of anonymity to consider. How to stay even safer online

In and out Similar to the potential Tor exit node vulnerability, the weakest links of a VPN tunnel are its entry and exit points. The VPN server is able to see all data that goes into and out of the tunnel, so if you want to sleep at night leave no stone unturned in ensuring your VPN provider doesn't log any user details or monitor traffic. It's also a wise move to select a company that accepts payments by Bitcoin, to avoid any potential privacy breach that could occur if paying by credit card or PayPal. For more information on VPN providers, as well as comprehensive reviews, check out the Best VPN website.

With this amount of privacy protection in place, you'll now be well and truly under the radar. If you're still paranoid your every move being logged, it could be time to hone those secret agent skills and go completely off the grid.

Macbook Pro 2016.

With a MacBook Pro 2016 model purportedly incoming, it looks as though the current, non-Retina 13-inch MacBook Pro is getting the axe. The latest rumors suggest, however, that the new models will ship without a headphone jack, a la iPhone 7, perhaps leaving the 12-inch MacBook with the last of the nigh-extinct 3.5mm port.

Did you buy the 12-inch MacBook? I did, but not because I wanted one.


No: the laptop I really wanted was a new MacBook Air, or even a redesigned 13-inch Retina MacBook Pro with a sleeker chassis. Of course, neither came. And like many other Air fans, I realised that another year was to pass by without Apple's best laptop getting an upgrade. So I bought the next best thing.
The MacBook is all about compromise. With more pixels than the Air, its display allows me to be more productive on the move and slinging it into a backpack almost feels like cheating. While no powerhouse (editing 4K images on it is slightly painful), it handles basic tasks with ease.

One year later, Apple has refreshed the MacBook with Intel's sixth-generation Skylake processors while introducing faster storage, memory and graphics for the same price. The most interesting change is on the outside: a new Rose Gold finish that genuinely makes me consider owning a shiny pink laptop for the first time. Gender stereotypes be damned.

But despite its upgrades, the new MacBook is not the MacBook Air replacement that rumors once again predict will arrive this summer - it's the same unique, dazzling and challenging laptop as the one that launched one year ago. Only faster, and with longer-lasting battery life. A new processor, coupled with faster internal storage, memory and graphics has brought tangible improvements to the MacBook's performance. You'll still have to somehow manage with a single USB-C port, bolting on adapters and connectors to equip your FrankenMac with vital extra limbs.

And if you didn't get on with its super-shallow keyboard, your fingers will remain as unconvinced as they were before - especially during long typing sessions. The MacBook brings more megahertz, and I'm not talking about clock speed. Lid open Big money Mac
Some people expected Apple to discount its refreshed MacBook to sweeten the deal. It didn't. The entry-level model still costs £1,049 ($1,299 or AUS$1,999), around $50/$73/AUS$99 more than the 13-inch Retina MacBook Pro.

In bush
If the cost remains too high for you, then consider picking up last year's version from Apple's refurb store. While the 2016 refresh is technically the better machine, you wouldn't be able to tell the difference between the two when undertaking low-level tasks such as surfing the web or typing up documents in Pages. At the time of writing, the entry-level version is on there for £749 (around $1,108 or AUS$1,457) alongside eight other models of varying specs and price.

often shaves a millimetre or two from its laptops when they undergo refreshes, but the 12-inch MacBook leaves no room. At 11 x 7.8 x 0.5 inches (or 280 x 197 x 13.1mm - W x D x H), the MacBook has a smaller footprint than another skinny Core M-powered laptop, the Asus UX305, which spans 12.7 x 8.9 x 0.5 inches (324 x 226 x 321mm). It also out-skinnies the MacBook Air's 12.5 x 8.9 x 0.6 inches (325 x 227 x 17mm). The 12-inch MacBook is the lighter of the two laptops, weighing just 2.03 pounds compared to the Air's 2.38 pounds. That's roughly the same as holding two iPad Pro 9.7s in the hand. In comparison, Microsoft's Surface Pro 4 weighs 2.37 pounds with the keyboard cover attached. Other Windows machines are quickly catching up the design stakes - check out HP's Spectre 13 for evidence of that. While the MacBook remains a fine feat of engineering that hasn't lost its allure, strides being made by the competition means that you won't have to choose between slick design and practicality for much longer. In plant Spec sheet

Processor: Intel Core m5-6Y54 Dual-Core CPU @ 1.2GHz Turbo Boost to 2.7GHz
Operating system: OS X 10.11 El Capitan
Memory: 8GB of 1867MHz LPDDR3
Display: 12-inch LED-backlit IPS
Graphics: Intel HD 515
Storage: 512GB PCIe-based flash
Camera: 480p FaceTime camera
Networking: 1/10/1000 BASE-T Gigabit Ethernet (using a USB-to-Ethernet adapter)
Connectivity: 802.11ac Wi-Fi; Bluetooth 4.0
Audio: Stereo speakers; Dual microphones; headphone port (supporting for Apple iPhone headset with remote and microphones)
Dimensions: 11 x 7.8 x 0.5 inches (or 280 x 197 x 13.1mm - W x D x H)
Battery: Built-in 39.4-watt-hour lithium-polymer battery
The MacBook is offered in three configurations, starting with the entry-level model that comes with 256GB of flash storage. Apple has swapped out last year's fifth-generation Broadwell processors for Intel's newer Skylake variants, with the cheapest MacBook housing a lower powered Core m3 chip clocked at 1.1GHz (Turbo Boost to 2.2GHz).

USB-C Starting at £1,299 ($1,599 or AUS$2,249), the more expensive configuration doubles that model's storage and houses a Core m5 processor with a faster clock speed of 1.2GHz (Turbo Boost to 2.7GHz). Both are equipped with faster RAM compared to last year's MacBook (8GB of 1867MHz DDR3, up from 1600MHz), and Apple claims that the Intel HD Graphics 515 solution in this year's models is 25% faster. For extra oomph, the MacBook can be configured with a faster 1.3GHz dual-core Core m7 processor with a maximum clock speed of 3.1GHz for another £120 (around $175 or AUS$230).

Headpjhone Aside from new configurations, Apple has made a more subtle change to this year's MacBook. In its teardown of the device, iFixit discovered that they use new hinge screws featuring heads filled with a substance that disintegrates when a screwdriver is used on them. These could be used to indicate to Apple that you've tampered with the machine, which may have a knock-on effect when it comes to solving warranty-related issues, though this is yet to be confirmed. Bundled software The new MacBook fits OS X Yosemite like a glove

Plus, Apple's Mac App Store has come on in leaps and bounds in recent years, proving an excellent resource with frequent recommendations on apps in multiple categories, such as Games, Productivity, Writing, Navigation and more. Here's every app you'll find upon booting up a New MacBook for the first time. Intel's Core M processor has, perhaps unfairly, earned itself a poor reputation since sliding under the bonnet of the Yoga 3 Pro back in 2015. The Yoga and other early machines that adopted Intel's fanless processor (ironically, the Yoga 3 Pro wasn't fanless) were sluggish and the performance hit wasn't considered worth it to get hold of their sleek new designs. However, successive generations have seen Core M's performance increase to the point that you often wouldn't be able to tell whether a laptop houses a Core M or Core i-series processor, depending on what it is you're using it for. Unfortunately for the 2015 MacBook, the Core M processors inside weren't powerful enough to provide a smooth experience under OS X 10.10 Yosemite. I found that disabling transparency effects and animations, while taking care not to open too many apps at once, was vital to prevent applications from temporarily freezing.

So how does the refreshed MacBook fare?
Underside
Benchmarks
Here's how the MacBook performed in our suite of benchmark tests:
Xbench: Overall: 394.6; CPU: 267.14
Cinebench R15 (CPU: Multi Core: 237cb; Open GL: 21.11 fps)
Unigine Heaven 4.0: Medium Quality (1,680 x 1,050): Score: 397; FPS: 18
Unigine Heaven 4.0 Ultra Quality (1,680 x 1,050): Score: 397; FPS: 15.7
NovaBench: Score: 623; Graphics: 43
Geekbench 3 (Single Core): 2,938; Multi Core: 5,900
BlackMagic Disk Speed test: Read: 921MB/s; Write: 838MB/s
Batman: Arkham City (1,440 x 900, Medium): Average: 14 fps
Tomb Raider: Medium Quality, 1,400 x 900 (Average): 17.8 fps
Streaming 1080p video over Wi-F (75% brightness): 7 hours and 10 minutes
For comparison, here is the performance of the entry-level MacBook, configured with a 1.1GHz Intel Core m3-6Y30 processor clocked at 0.90GHz (Turbo Boost to 1.1GHz), Intel HD Graphics 515 and 8GB of 1867MHz memory.
Xbench: Overall: 347.54; CPU: 228.25
Cinebench R15 (CPU: Multi Core: 213cb; Open GL: 21.03 fps)
Unigine Heaven 4.0: Medium Quality (1,680 x 1,050): Score: 292; FPS: 11.6
Unigine Heaven 4.0 Ultra Quality (1,680 x 1,050): Score: 256; FPS: 10.2
NovaBench: Score: 489; Graphics: 41
Geekbench 3 (Single Core): 2,535; Multi Core: 5,025
BlackMagic Disk Speed test: Read: 929.7MB/s; Write: 620.2MB/s
Batman: Arkham City (1,440 x 900, Medium): Average: 13 fps
Tomb Raider: Medium Quality, 1,400 x 900 (Average): 18.2 fps
Lid closed
The good news is that the spec bump has turned the MacBook into a machine that runs much efficiently under more stress. I tried both the entry-level and the mid-spec version, and found that both machines provided a smooth experience out of the box without any tweaking of OS X 's settings.

Wall Running my usual load of office applications, which includes multiple Firefox browsers, GIMP image editor, Skype, Evernote, Filezilla, Wunderlist, Ulysses, Slack, Echofon, Reader and Spotify (they're all essential, alright?), the MacBook didn't so much as stutter. I still wouldn't be confident opening another few FireFox windows and loading 30 tabs into each of them, but that's more of a criticism of the browser than it is of the MacBook's performance. Trackpad

The 2,304 x 1,440 pixel-resolution display remains one of the best I've seen on a notebook, and is the best on a MacBook. It brings incredibly rich colors and excellent 170-degree viewing angles. There's another advantage: you can scale it up to get more desktop space and go far beyond Apple's default scaled resolutions. By adding a custom resolution, I managed to soar all the way up to 1,920 x 1,080 in High-DPI mode using SwitchResX, which allowed me to see the same amount of spreadsheet rows and columns as a 27-inch monitor. Sure the text was tiny, but I could still make out the numbers and edit the spreadsheet without any trouble. I might not be doing it all the time, but compared to my old setup, which was an 11-inch MacBook Air connected to a portable USB DisplayLink monitor, I now have enough desktop real-estate to switch to see more on the screen at the same time. That's been possible on high-resolution Windows and Apple machines for some time, but having all that desktop space is even more impressive on a 12.1-inch machine as thin as a pencil.
The 2016 MacBook isn't going to win any new converts, but it leaves no excuse to pick one up if you're already swayed by what Apple's machine has to offer. Better yet, its new Rose Gold option is gorgeous.

We liked Now that there's more horsepower under the MacBook's bonnet, you won't have to tweak OS X El Capitan's settings to get hold of a smooth experience. As the old Apple motto goes: it just works. The increase is marginal, but it undoubtedly makes a difference. That doesn't mean you're suddenly going to be swapping your MacBook Pro for one to undergo heavy computing lifting. Apple didn't tweak the MacBook's chassis because it didn't need to. It still can't be matched even by its Windows-based counterparts, though I wouldn't be confident of saying that six months down the line. Its color-packed display is as vibrant as it was on the previous model, and you just try finding a 12- or 13-inch laptop with better speakers. It's a near-impossible task.

you should buy the MacBook.

Speed Up Your PC.

Speed up your PC

Remove junk files and tune up your PC

A PC or Mac is rather like a car. That showroom-fresh saloon doesn't seem so sleek and shiny once road film, suicidal insects and evil supermarket car park users start ruining it, and that speedy new computer soon begins to sag under the stress of unnecessary apps, unwanted add-ons and other irritations. Thank crikey, then, for system utilities and tools: the right ones make your PC or Mac feel brand new, or at least an awful lot faster and a lot less crashy.


There are thousands of system utilities out there, but these are our favourites - although as with any freeware, be very careful when you're installing any of them. Many free apps' installers are awfully keen on giving you extra software, toolbars or changes to your search engine that you might not want - see our guide to avoiding potentially unwanted programs.

Divider
Piriform's excellent CCleaner analyses your PC for files you can live without and deletes them for a performance boost

1. CCleaner Remove unneeded files for a quick and easy speed boost Top download - CCleanerCCleaner has been around for a long time, and part of the reason for its ongoing popularity is that it cleans the parts of your PC that many other free apps don't. There are paid-for versions that add real time protection and cleanup scheduling, but the free edition covers the important stuff such as removing temporary files, getting rid of browser caches, removing unwanted cookies while keeping the useful ones and so on. If your PC feels slow or sluggish then this is the app to try first, and is our favorite free system tool.
Download CCleaner freeHave we missed a program you rely on to keep your PC in top shape? Let us know in the comments below.
Divider
Download PC Decrapifier free

2. PC Decrapifier Uninstall the junk programs that come with a new PC Like CCleaner, PC Decrapifier's job is to remove unnecessary files and programs for your PC. It's particularly useful on brand new PCs, which are often either full of exciting opportunities to discover new apps or stuffed to the gills with a load of preinstalled junk, depending on your point of view. Download PC Decrapifier freePC Decrapifier analyses your system, shows you the apps it thinks you should get rid of - based not just on its developers' opinions but on other users' feedback - and then removes the ones you choose. It's so focused on cleaning PCs it doesn't even install itself.
Divider

Download Autoruns free 3. Autoruns Stop unnecessary startup processes to speed up boot times We don't normally quote former US Secretary of Defense Donald Rumsfeld, but when he said "There are known knowns. These are things that we know that we know. There are known unknowns. That is to say, there are things that we know we don't know. But there are also unknown unknowns. There are things we don't know we don't know," he could have been describing the apps you know you're running - the known knowns - and the ones you don't.
Download Autoruns freeThose apps run when you boot Windows, or login, or launch certain system apps. You can find and get rid of the known unknowns and the unknown unknowns with the superb Autoruns.

Divider You never know when you'll need Recuva - an emergency tool for restoring deleted files

4. Recuva An essential tool for recovering lost or accidentally deleted data There are lots of data recovery tools out there, but Recuva is our favorite. Not only can it recover files that have been deleted but not overwritten, but it can recover files from removable media such as USB drives and memory cards. It can even get data off damaged discs, although naturally the success rate depends on the kind and extent of the damage. Download Recuva freeThe paid-for Pro version adds support for virtual hard disks and offers technical support too, but the free one is worth sticking on a thumb drive as part of your emergency toolkit.
Divider
Download 3DP Chip free

5. 3DP Chip A convenient tool to keep your hardware drivers up to date The near-infinite variety of possible Windows PC configurations is a great thing, but it can also lead to a great big pain in the backside: ensuring that the device drivers, the bits of software that Windows uses to communicate with your various bits of hardware, remain up to date. It's worth doing because driver updates banish bugs, vanquish vulnerabilities and fix flaws, but it's not remotely quick or fun. Download 3DP Chip free nowEnter 3DP Chip, which can do the dirty work for you - and unlike some other driver update programs, it doesn't try to install a whole bunch of nonsense on your PC either.
Divider
Download SpaceSniffer free

6. SpaceSniffer Find out what's taking up so much space on your hard drive or SSD You're running out of space but you've no idea why. Does that sound familiar? Then you need SpaceSniffer, which enables you to see what's taking up space via a format known as a Treemap. Download SpaceSniffer freeIt's a very immediate way to understand where the space hogs are on your system, and the filtering means you can limit the visualisation to certain kinds of files or to exclude certain kinds of files. You can also combine filters to look for space hogs of a particular kind or vintage.
Divider
Download Auslogics Duplicate File Finder free

7. Auslogics Duplicate File Finder Delete redundant files to free up space on your hard drive or SSD One of the downsides of digital media is that it's very easy to end up with multiple copies of the same thing taking up valuable storage space. That's bad enough on a hard disk, but on the more limited space of an SSD it's even more of a problem - or at least, it is if you don't have Auslogics Duplicate File Finder. Download Auslogics Duplicate File Finder freeIt scans your PC for duplicate files and enables you to restrict the search to specific file types or sizes, and you can specify whether duplicates should be binned or placed in a holding area for you to check them out. This is a great and genuinely useful app for Windows users of all kinds.

Divider
Download Revo Uninstaller Free

8. Revo Uninstaller Free Remove all traces of uninstalled programs to avoid junk buildup If you like trying new apps you'll be horribly familiar with the joys of the Windows Uninstaller, where all too often uninstalling a program leaves bits and pieces everywhere. It's a particular pain when an app installs other apps such as browser toolbars and unwanted helper apps. Download Revo Uninstaller FreeRevo Uninstaller Free can solve that problem by scanning for the bits the standard uninstaller often leaves behind, and its multiple uninstall option means it's a big time saver too. The free version can't uninstall apps that were on your PC before you installed it, but it does a good job of getting shot of anything added since. Divider
Download Secunia PSI free

9. Secunia Personal Software Inspector (PSI) Keep your software up to date with the latest bug fixes and security patches Secunia PSI solves one of the biggest headaches for Windows users: keeping software up to date in order to keep your system secure. The app knows about thousands of different programs and can scan your system to identify whether you have the most up to date versions. Download Secunia PSI freeAnd here's the best bit: if you don't, it can usually download and install the necessary updates and/or patches without any further intervention from you. The combination of PSI and Windows Update should ensure that malware can't exploit any vulnerabilities in unpatched software. Divider
Download Onyx free

10. OnyX A system cleanup tool to keep Macs running quickly and smoothly The majority of system tune-up and cleaning apps are for Windows, but Macs get messy too - and on OS X, the evergreen OnyX is often the solution. It can get shot of bulging system logs and clean up files that are no longer needed, it can turn on hidden features in OS X itself and you can use it to schedule dull but useful maintenance tasks. Download OnyX freeIt has two companion apps, both also free: Deeper is purely for personalisation while Maintenance covers - yep - maintenance. For most people OnyX offers the best of both.