If you haven’t heard so already, Microsoft has released the Windows 8 Consumer Preview for fans, skeptics and neutral parties to download, play with and [hopefully] enjoy.Recommended Hardware for Windows 8 Consumer Preview
According to Microsoft, the Windows 8 Consumer Preview should run fine on the very same hardware that Windows 7 functions on, but the following specs are recommended:
- 1 GHz or faster processor
- 1 GB RAM (32-bit) or 2 GB RAM (64-bit)
- 16 GB available hard disk space (32-bit) or 20 GB (64-bit)
- DirectX 9 graphics device with WDDM 1.0 or higher driver
- 1024 x 768 minimum screen resolution
Where to Download Windows 8 Consumer Preview
You can take one of two paths to download the Windows 8 Consumer Preview:
- Download Windows 8 Consumer Preview Setup – includes a compatibility report, upgrade assistance & built-in tool for converting an ISO image into installation media (such as a DVD or USB flash drive).
- Download Windows 8 Consumer Preview ISO images – alternative to the Windows 8 Consumer Preview Setup; you will need to use a third-party program to convert the ISO to a DVD or USB thumb drive. Available in English, Chinese, French, German and Japanese in:
- 64-bit (x64) ~3.3GB
- 32-bit (x86) ~2.5GB
Where to Get Help with Windows 8 Consumer Preview
If you do happen to download the Windows 8 Consumer Preview, keep in mind that it is beta software, so hiccups and bugs are to be expected. No official support is available; however, you can get help by visiting the:
Additionally, Microsoft will be publishing a series of posts focused on Windows 8 on the Windows Experience Blog, so you may want to periodically check in there as well.
Have fun exploring the new Windows OS!
Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet, “Like” us on Facebook or add us to your circle on Google+.
Would you feel better if malware (and the cybercriminals behind it) took the time to actually have a conversation with you while stealing all of your banking information?
If you have a public Twitter account, prepare to have your tweets packaged and sold to companies to analyze for “market research purposes.”

Facebook is under fire for “questionable behavior” – yet again.

How would you feel if your smartphone recorded your phone calls and send them – along with your location, text messages and email – to an attacker?
We expect malware to be present in files attached to unsolicited email. It may even be assumed that a link in a spam email will take us to a malicious site hoping to infect our PC with malware.
The authors behind the Flashback Trojan targeting Macs are quite the busy bunch.
Show of hands: who here would use a “Do Not Track” feature/button if it was supplied within their web browser? (That actually worked.)
One would think with all of the headlines flying around about how hackers stole the source code for a variety of Symantec products and Symantec going from saying users only faced a “slightly increased security risk” to urging them to disable pcAnywhere before finally saying the software is safe only after being patched that users would heed the warnings and do as they’re advised.
Have you ever wondered what it’d be like having a keylogger installed on your machine, relaying every single one of your keystrokes to a remote server for some cybercrook to put to not-so-good use?
Head’s up, everyone!
It's all about size, folks.


I like the Web of Trust browser plug-in.
If you receive a mysterious confirmation email for an order you don’t recall placing, beware! It may be a trap.
As kids we’re taught not to take candy from strangers and as adults we’re told not to take file attachments from strangers.
Thinking about giving online dating a try?
By now you’ve heard of the passing of legendary R&B/Pop singer, Whitney Houston.
Incredibly thin, extremely light and offering up to 9 hours of battery life, the HP Folio is perfect for business professionals who are constantly on-the-go and need an ultrabook that's not only easy to travel with, but powerful enough to take on any task.

Have you been sitting back, wondering when companies will start paying YOU for your personal data and browsing habits?
It seems that a lot of people were open to the idea of being paid for their browsing data too.

Just when you thought the story behind the stolen Symantec source code hit the ultimate level of crazy, the bar gets raised a little higher.
It looks like the hackers that lifted source code from Symantec’s servers back in 2006 have kept their promise to release the stolen source code to the public.
So you received an email saying you got a new direct message on Twitter, but is it real?
