About ArunKumar@TWC

Arun Kumar is a Microsoft MVP alumnus, obsessed with technology, especially the Internet. He deals with the multimedia content needs of training and corporate houses. Follow him on Twitter @PowercutIN

Review of Veracrypt, the Truecrypt alternative and successor

Veracrypt enteres market within months after Truecrypt died. Veracrypt, a Truecrypt alternative, is also an open source project and file encryption software, is built upon the code of Truecrypt, but with enhancements to further secure your data. You can use […]

tunnelbear vpn review

TunnelBear VPN Review: The Bear is Good At its Job!

What any user expects from a program is its ease of functioning and no complex interfaces. TunnelBear VPN has both of these and is hence a good software. The free edition of TunnelBear gives you a cap on the amount […]

SecurityKISS VPN Review – Does it work?

The name may sound a bit odd to some, but according to the home page of SecurityKISS VPN, the KISS stands for Keep It Smart and Simple. This free VPN software and proxy has a simple interface that claims to protect […]

spambots

What are Spambots? How to deal with them?

This post will tell you what are Spambots and how you can  deal with them. In a line, Spambots are responsible for all that junk in your mail! Read on to find out what they are, how they work and […]

Review of MediaFire Cloud Storage

MediaFire is a popular file sharing destination that many of us use to share single or zipped files. I remember using it mainly for the files shared by different DJs. It was present much before since Google Drive was launched. […]

Hotspot Shield VPN

Hotspot Shield VPN review and free download

We have covered plenty of free VPN software and other privacy tools on The Windows Club. So far, the best VPN we found is Spotflux. Hotspot Shield VPN was mentioned by a reader so I thought of checking it out. […]

Review Of Moo0 System Monitor – Is It Good Enough?

Normally, you can get system performance data using the Windows Task Manager as well. But that data is separated and grouped by tabs and you may lose track of what you were doing switching among the tabs. Plus getting the […]

Dangers of free public WiFi hotspots

Nowadays free Wi-Fi is available almost everywhere – in Cafe’s, Hotels, Offices – and even in the streets and general public places. Who does not get tempted to use free WiFi to check their mail and social media updates? Well, […]

How To Avoid Being Watched Through Your Own Computer

Am I being watched through my Computer webcam? Is this a question that is troubling you? Well, most offices, IT people keep on sniffing the data packets on the network to see what is going on in the network. Some […]

Public Cloud vs Private Cloud computing difference explained

You probably already know the difference between Public clouds and Private clouds. There is one Hybrid cloud too. The article takes a quick look at the definitions and differences before these types of cloud computing going on to explain what kind […]

Peer to Peer Networks (P2P): Explanation and File Sharing

Computer networks are of two types. One is the Client server model where all computers are connected to a server computer that facilitates file sharing. The other type of computer network is Peer to Peer. Peer to peer means absence […]

Bring Your Own Network (BYON) … Seriously?

We are living in an era where the IT departments of businesses are still trying to fit in the Bring your Own Device or BYOD model in a secure arena. In our article on BYOD implementations, we talked of two […]

Windows As A Service – A Discussion

After the success of offering Microsoft Office as a Service – in the form of Office 365, is it possible for Microsoft to offer its operating system, Windows as a Service? The article tries to find out answers, while talking […]

What is ShellShock or Bash Vulnerability?

Bash is the basic shell of UNIX, a language that is used on many platforms: from different web hosting servers to modems, toys etc. If you are a Windows user, you need not fear ShellShock vulnerability as the chances of […]

what are torrent files

What are Torrent files? Are Torrented files legal, illegal, safe?

Torrent files are small files that contain information on how to download a larger file using BitTorrent protocol. The protocol, unlike HTTP/HTTPS, needs a torrent client for downloading the client. We’ll take a quick look at how BitTorrent works and […]