![]() |
Differences between Kazaa and Kazaa Lite?
I know that one of them is that K.Lite has no spyware.
But what else is there? Can you still download content from Kazaa users if you have K.Lite, or are you just restricted to downloading from K.Lite users? |
Re: Differences between Kazaa and Kazaa Lite?
Quote:
|
I use k.lite. Yes u can d/l from regular users. Its pretty much exact same except doesn't install the spyware etc. Me likes it...
|
what is it that you have against spyware? Is there anything on your computer you dont want other people seeing? Well if there is.. your ISP could get it whenever it wants so i dont see what everyones problem with it
|
Quote:
|
When I do, I use the regular KaZaa. Its just that about once a week or so, I run Ad-Aware. It basically checks your system for spyware and gives you the option to choose which ones to delete. Just go to download.com and search for Ad-Aware. Its fun to see how much spyware you have if you have never used a spyware checker before.
|
Quote:
Best way around it is Ad-Aware You can download Ad-Aware here. Also I use Popupcop to get shot of Pop ups. You can download a Free 30-day trial for Popupcop Here. Oh yea as for K.Lite there is a patch around on the net that stops the Pop ups for free! |
Quote:
|
kazaa lite will also give you the option to download the "hosts" file which not only blocks spyware but it also blocks tracker cookies and popups (It doesn't just close a popup, it completly prevents it from ever coming up) If you do get the hosts file, you're going to want to do some tinkering with it however otherwise some websites just won't work.
When you get the hosts file, open it with notepad (I dont know what file type the hosts file is, it's not a .txt file but you can open it in notpad) be sure to deleate the line Images.com.com ) |
Quote:
|
Quote:
The point is it's MY computer. As in I have control over it. I have a lot of personal stuff on it, and no-one else has any business poking about in it without my express permission. Your ISP cannot "get everything" on your computer whenever it wants. For instance, how do they get a copy of your msvcrt.dll? Oh wait, it never enters or leaves your computer so they never see it. What about that email? Oh, it was sent with 2048 bit RSA encryption. What about that server you're connecting to? Oh, you're doing it through an SSH tunnel via two anaonymous proxies, so no-one has any idea what you're up to. The chains are only chains for as long as you hold on to them. Quote:
Besides, learning how to cripple spyware taught me more about computers than any book could've ever done :) Fifteen email addresses: free Linux: free Email client: free Never getting any spam ever: priceless. |
Quote:
Now, just because it's Free, doesn't necessarily mean it's free. Think "free" as in "free speech," not "free beer," as we in the Free Software/Open Source community like to say. In a nutshell, software that is free as in speech, like Linux, is distributed along with its source code so that anyone who receives it is free to make changes and redistribute it. So, not only is it ok to make copies of Linux and give them to your friends, it's also fine to tweak a few lines of the source code while you're at it, as long as you also freely provide your modified source code to everyone else. There, much better. :) |
All times are GMT -4. The time now is 07:17 AM. |
Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
GameTavern