Trim, Cut, or Split a Video the Quickest Way for Free

With phones, DSLRs, and GoPros we’re all shooting more video than ever. But it rarely comes straight out of the camera in perfect shape. Often you’ll need to do a little editing of a video before showing or sharing it. You might want to trim a few seconds off the start or end, or cut it so that it’s a more shareable length.

Fortunately, you don’t need any editing skills to do this. You just need the right software — and you’ve probably already got it installed on your computer.

So let’s take a look at the quickest way to trim videos in Windows, Mac, Linux, and in a web browser.

Trim Video in Windows

The quickest way to trim and cut videos in Windows 10 is to the use the built in Photos app.

Open your video to get started. You can do this either by launching Photos from the Start menu and navigating your way to where the clip is stored on your hard drive, or by right-clicking the file and selecting Open with > Photos.

A video in the Windows Photos app

When the video has opened click Edit & Create in the top right corner of the window then select Trim.

The video now reopens in Edit mode. On the timeline at the bottom there’s a blue handle that enables you to scroll through the video, plus two white dots that be used to set the start and end points for your newly trimmed clip.

Using handles to trim video in the Windows Photos app

First, drag the left dot towards the right until you reach the point where you want your video to start (everything to the left of this will be cut). Then drag the right dot leftwards to trim off the end of the video.

Hit the Play button to preview the changes, and tweak the positions of the white dots to fine-tune your edit. When you’re happy, hit Save as to save the edited version as a new file. By default, it’ll be saved with the same filename with the word “Trim” appended to it. This ensures you never overwrite the original file.

Saving a new trimmed video in Windows

And that’s it. You can split a longer video into two or more shorter clips using the same technique. Just repeat the process for each clip, setting different start and end points to isolate the sections you want to save.

Trim Video on a Mac

On macOS you can trim video using QuickTime Player, which is pre-installed on all Macs.

Open the video. By default, supported video files open automatically in QuickTime Player. If yours doesn’t, right-click and select Open With > QuickTime Player, or drag the file onto the app icon in the Dock.

Editing a video in Quicktime Player on a Mac

Next, go to Edit > Trim. You’ll now see the trimming bar at the bottom of the window. Everything inside the yellow section is included in your trimmed video, while everything outside will be removed.

Grab the left handle and drag it to the right until you reach the point where you want your video to start. Then grab the right handle and drag it to the left. Hit the Play button to preview your selection, and tweak the handles if necessary.

Trimming a video in Quicktime Player on a Mac

When done, click Trim. The video will now be trimmed, and will open as a new untitled file. Go to File > Save to save the new, trimmed video.

Trim Video in Linux

If you’re on Linux, you’ll need to find a third party app to trim and split your videos. We recommend VidCutter, which we’ll be using in this guide on Ubuntu.

To begin, you’ll need to install VidCutter. How you do this depends on which Linux distro you’re using. Check out VidCutter on Github for full instructions for all main distros.

On Ubuntu, we install VidCutter through the Terminal app, starting with the following commands:

sudo add-apt-repository ppa:ozmartian/apps
sudo apt update

Finally, install the app:

sudo apt install vidcutter

To open your file either launch VidCutter and select Open Media, or navigate your way to where the video is stored on your computer. Right-click the file and select Open With > VidCutter.

Opening a video in VidCutter on Linux

When the video opens, locate the filmstrip at the bottom of the window. Drag the green handle to the point where you want your video to start. Click Start Clip to save that position.

A video in VidCutter on Linux

Next, drag the green handle to the point where you want your video to the end. Click End Clip to save this position. Now click Save Media to save a copy of your newly edited file.

Trimming a video in VidCutter on Linux

What’s good about VidCutter is that you can make multiple cuts to the same video all at once. If you want to remove something from the middle of a clip, set two start points and two end points either side of the unwanted portion. Clicking Save Media will then create a new video where the two sections you’ve selected are joined together.

Trim Videos Online

If you’re using a Chromebook, or just prefer to work in the browser on any machine, there are lots of options to trim videos online. We’re going to use ClipChamp. This service is good for editing up to five videos per month on a free account.

You need to sign up to get started. Fortunately this is painless, since you can log in straight away with your Google or Facebook accounts.

Loading a video into ClipChamp via the browser

Click Convert my video, or drag and drop your chosen clip into the browser window. ClipChamp also optimizes your videos for your target platform, but we need to focus on the trimming first.

In the right-hand pane, click Edit Video. A filmstrip appears below the video with two blue flags at either end. Grab these flags and drag them inwards to set new start and end points. Your selected area is shaded blue, and everything outside of this will be trimmed off.

Trimming a video in ClipChamp in the browser

There’s no need to confirm your edits at this stage, although you can undo them by clicking the Xbutton alongside the Trim icon.

Now take a look at the optimization options in the left part of the screen. You can choose a platform you want to optimize for, such as web, mobile, or to create a GIF. You can also adjust the resolution, file format, and quality.

Optimizing a video in ClipChamp

When you’re happy with your choices, click Start in the bottom right corner. It will now start processing; the amount of time it takes depends on the size of the video.

Downloading the final trimmed video from ClipChamp

When it’s finished you have two options: Upload & Share and Save. The first enables you to post the video to various social media sites. The second lets you download and save a local copy of your edited file.

New "PRILEX" ATM Malware Used in Targeted Attacks

Trend Micro security researchers recently discovered a highly targeted piece of malware designed to steal information from automated teller machines (ATMs).

Dubbed PRILEX and written in Visual Basic 6.0 (VB6), the threat was designed to hijack a banking application and steal information from ATM users. The malware was spotted in Brazil, but similar threats could prove as harmful anywhere around the world, the security researchers say.

First reported in October 2017, PRILEX was designed to hook certain dynamic-link libraries (DLLs) and replace them with its own application screens. The targeted DLLs (P32disp0.dll, P32mmd.dll, and P32afd.dll) belong to the ATM application of a bank in Brazil.

Because of this atypical behavior, the researchers concluded that the malware was being used in a highly targeted attack. What’s more, the threat only affects a specific brand of ATMs, meaning that its operators might have possibly analyzed the machines to devise their attack method, Trend Micro explains.

After infecting a machine, the malware starts operating jointly with the banking application. Thus, the malware can display its own fake screen requesting the user to provide their account security code. The code is delivered to the user as part of a two-factor authentication method meant to protect ATM and online transactions, and the malware captures and stores the code.

The malware attempts to communicate with the command and control (C&C) server to send stolen credit card data and account security code. The security researchers believe the malware’s operators might be dealing bulk credit card credentials.

“To our knowledge, this is the first ATM malware that assumes it is connected to the internet. It is likely that this bank’s ATMs are connected, since the attackers seem to be very familiar with this particular bank’s methods and processes,” Trend Micro says.

PRILEX also shows that cybercriminals can analyze the methods and processes of any bank to abuse them in highly targeted attacks. Thus, all financial institutions should take this into consideration when defending their ATM infrastructure, especially since a silent attack as this could go unnoticed for months, if not years.

At the DefCamp conference in Bucharest in early November, Kaspersky Lab’s Olga Kochetova and Alexey Osipov explained how easy it is to create ATM botnets. Discoverable online, these devices are susceptible to a broad range of attacks and infecting a single machine could allow attackers to compromise a bank’s entire network.

“A targeted malware likely took significant time and resources to develop. This shows that in today’s world, criminals consider that a worthwhile investment. Gone are the days when banks were seen as unassailable—now they are simply the biggest fish in the sea. It is not easy to kill a whale, but it is possible—and doing so allows an attacker to eat for a long time,” Trend Micro notes.

CUTLET MAKER gets cracked

In addition to PRILEX, Trend Micro analyzed CUTLET MAKER, a relatively new ATM malware that was first detailed in October this year. A run-of-the-mill program, the malware consists of multiple components and can be run from a USB memory stick connected to an ATM. The malware relies on the Diebold Nixdorf DLL (CSCWCNG.dll) to send commands to the ATM’s dispensing unit.

Designed to empty the ATM of all its banknotes, the malware was found being sold on underground markets for as much as $5,000. However, it appears that competitors have already managed to crack its code, allowing anyone to use it for free.

Each time the malware is executed, a code is required to use the program and empty the ATM. Apparently, the threat doesn’t use time-based codes, but just an algorithm, which means that the same input would generate the same output, and some cybercriminals have already built a “key generator” to automatically calculate the return code.

“The code is available on the internet and relatively easy to find. This means that anybody can start victimizing ATMs without having to pay for the program—or at least ATMs with an accessible USB port,” Trend Micro says.

Thus, some have started selling the malware along with the keygen for much lower prices compared to the original. It appears that the malware’s developers haven’t responded yet, and no new version of the tool that uses a different algorithm has been released.

How to Use Google’s Productivity Tools to Maximize Your Time

Until someone puts more hours in the day or days in the week, many of us are stuck with a 40-hour work week. Tackling everything that needs to be done can be quite a struggle. To find the best way to manage your time as well as your productivity, look no further than the tools from Google. While we’ve based our tips on Google’s tools, you can adapt many of the ideas to other productivity tools as well.

Block Time for Emails

Depending on the type of position you hold, business emails might be a huge part of your day. Although you have to create and respond to messages, it can be distracting. For example, you could be working on an business document but constantly stop because those emails are flying into your inbox. Now, that important document takes a back seat and takes you longer to complete with each distraction.

Instead, try blocking a specific time to work on emails each day. Of course, critical or emergency messages should be attended to as a priority. However, those that can wait, should.

Create an Event

You can block time in Google Calendar by creating a recurring event with a reminder. Plus, if you share your calendar with others, they will see your blocked time. Just select the appropriate date and time from Google Calendar, give the event a name, set the reminder, make it repeat, and click Create.

How to Use Google's Productivity Tools to Maximize Your Time GoogleCal RecurringEvent web

Flag Messages for Follow-up

If you use Gmail for your business, you can easily keep track of those messages that you need to handle during your blocked time. A simple way to do this is by flagging emails as you see them. Gmail offers a nice selection of flags called Stars.

To select those that you want to use, click Settings (gear icon) and the General tab. Scroll down to Stars and drag those you want to activate from Not in use to In use. Then when you see an email you want to flag, click the star next to it until the appropriate one appears.

How to Use Google's Productivity Tools to Maximize Your Time GmailStars web

With this combination of Google Calendar and Gmail, you can organize your email time with ease.

Schedule Your Availability

Planning your work week is an essential part of time management. You must be sure that you are making the most of the time that you have available. Google Calendar makes it easy to see your schedule with day, week, month, and work-week views. And, with a handy built-in feature, you can display your availability.

Work With Appointment Slots

A great way to manage your time for coworkers to see is with Google Calendar’s Appointment Slots feature. Keep in mind that you must have a work or school account to access this feature. With Appointment Slots, you do not block your time as with calendar events, but instead provide times when you are available.

For instance, if you are available from 1 PM to 4 PM, here are the steps once you access Google Calendar:

  1. Make sure that your calendar is in Day or Week view.
  2. Click the day and time you will be available.
  3. Select Appointment Slots in the pop-up window.
  4. Add a name for the slot, choose the type, and click Create. In case further details are needed, click Edit Details instead of Create.

How to Use Google's Productivity Tools to Maximize Your Time GoogleCal AppointmentSlots web

If you do not have access to the Appointment Slots feature, you can still display your availability by blocking the times you are busy, as we did above for email time.

Optimize Meeting Time

If you coordinate meetings on a regular basis, let Google Docs and Google Calendar help you make this a smooth process.

Meeting Agenda and Minutes

There is nothing worse than a meeting with no plan, organization, or structure. So, start by creating a meeting agenda that you can attach to the calendar request. Google Docs has a few different templates that combine an agenda with minutes, for an all-in-one document.

After signing into your Google account on Google Docs, click Template Gallery from the top. Scroll down to the Work category and you will see the three Meeting Notes templates. Each option contains the same basic details including attendees, agenda, notes, and action items. They only differ in their look and feel.

How to Use Google's Productivity Tools to Maximize Your Time GoogleDocsMinutesTemplates

Meeting Requests

After you have created the agenda, put together the meeting request with Google Calendar.

Select the appropriate date and time for your meeting in Google Calendar. Then click the Edit Details button. When the page opens, you will see a spot on the right to add Guests. Just pop in the email addresses for your attendees.

To attach the agenda, click Add Attachment beneath the Description box and select your file.

How to Use Google's Productivity Tools to Maximize Your Time GoogleCal MeetingRequest web

Toggle Tasks and Reminders

While Google Tasks is a decent tool for simple to-dos, you will find many advantages to using Google Keep instead. Plus, you can switch between Google Tasks and Google Keep reminders in your calendar quickly.

Add Tasks in Google Keep

With Google Keep you can easily turn notes into tasks and to-do lists. Then, take advantage of the helpful features for managing those tasks. You can set up a reminder, create a checklist, attach an image, add a drawing, and collaborate with a coworker.

How to Use Google's Productivity Tools to Maximize Your Time GoogleKeepExtras web

In addition, you can pin notes to keep them at the top of the list, which is perfect for high-priority items. You can also incorporate tags and color-coding for easy organization.

Switch Between Tasks and Reminders

To switch between the tasks and reminders in Google Calendar, be sure that you are on your main calendar screen. On the left under My calendars, click the arrow next to Tasks. Then select Switch to Reminders. All reminders that you have set up in Google Keep will then be displayed on your calendar.

How to Use Google's Productivity Tools to Maximize Your Time GoogleCal TaskReminderSwitch web

When you want to switch back, simply follow those same steps, ending with Switch to Tasks. Your Google Tasks will then pop open on the right of the screen as normal.

Plan Your Week Ahead of Time

When planning your work week, Google makes it easy for you to do so from anywhere. Whether you are relaxing on the couch or hanging out on the patio, just grab your mobile device and use the Google tools you need.

You do not have to even open your computer. Google Calendar, Google Keep, Google Docs, and Gmail are all available for both Android and iOS devices:

How to Use Google's Productivity Tools to Maximize Your Time iPhoneGoogleCalendar mobile1

Preparing and reviewing your schedule not only gives you a solid work-week plan, but also a head start before you go into the office on Monday morning.

How to Transcribe Audio to Text for Free

You might think you don’t have a need for a transcribing tool if you aren’t a journalist, lawyer, or medical professional, but you’d be surprised. You could be in a meeting with a recording app turned on. Or in a classroom lecture as your professor drones away. Basically, we can all benefit from ways to convert audio to text, transcription is the best way to do that.

How to Transcribe Audio Using oTranscribe

oTranscribe

In the good old days, turning audio into text was sheer grunt work, but not anymore. oTranscribe is a free and open-source app that runs in your browser. Got your audio file ready? Here’s how to start the transcribing session:

  1. Click the blue Start Transcribing button on the homepage.
  2. Upload the audio recording into the browser with a click on the Choose audio (or video) filebutton. The web app also supports the transcription of YouTube videos.
  3. The file is displayed as a play head on top of the browser window with controls for rewind, pause or fast-forward. There are keyboard shortcuts for the productivity ninjas too.
  4. The word processor is where you type the transcribed text. Bold and Italic are the two formatting options available.
  5. Start typing and control the speed of playback with the slider on top or the F3 and F4 keys.

oTranscibe also has interactive timestamps. Press Ctrl + J (Cmd + J on Mac) to insert the audio file’s current time into the document. This timestamp is hyperlinked and when you click on it it will take you to the specific time in the audio file.

Once you’ve finished transcribing, you can download the transcript as a markdown file, a plain text file, or retain it in the oTranscribe document format. The .OTR format can be imported back into the app. You also have the choice to export it to Google Drive and keep a backup or make it part of another document.

How Online Tracking Works

Have you ever wondered why some online ads you see are targeted to your tastes and interests? Or how websites remember your preferences from visit-to-visit or device-to-device? The answer may be in the “cookies” – or in other online tracking methods like device fingerprinting and cross-device tracking. Here are answers to some commonly asked questions about online tracking — how it works and how you can control it

Understanding Cookies

What is a cookie?

A cookie is information saved by your web browser, the software program you use to visit the web. When you visit a website, the site might store a cookie so it can recognize your device in the future. Later if you return to that site, it can read that cookie to remember you from your last visit. By keeping track of you over time, cookies can be used to customize your browsing experience, or to deliver ads targeted to you.

Who places cookies on the web?

First-party cookies are placed by the site that you visit. They can make your experience on the web more efficient. For example, they help sites remember:

  • items in your shopping cart
  • your log-in name
  • your preferences, like always showing the weather in your home town
  • your high game scores.

Third-party cookies are placed by someone other than the site you are on. For example, the website may partner with an advertising network to deliver some of the ads you see. Or they may partner with an analytics company to help understand how people use their site. These “third party” companies also may place cookies in your browser to monitor your behavior over time.

Over time, these companies may develop a detailed history of the types of sites you frequent, and they may use this information to deliver ads tailored to your interests. For example, if an advertising company notices that you read a lot of articles about running, it may show you ads about running shoes – even on an unrelated site you’re visiting for the first time.

Understanding Other Online Tracking

What are Flash cookies?

A Flash cookie is a small file stored on your computer by a website that uses Adobe’s Flash player technology. Flash cookies use Adobe’s Flash player to store information about your online browsing activities. Flash cookies can be used to replace cookies used for tracking and advertising, because they also can store your settings and preferences. Similarly, companies can place unique HTML5 cookies within a browser’s local storage to identify a user over time. When you delete or clear cookies from your browser, you will not necessarily delete the Flash cookies stored on your computer.

What is device fingerprinting?

Device fingerprinting can track devices over time, based on your browser’s configurations and settings. Because each browser is unique, device fingerprinting can identify your device, without using cookies. Since device fingerprinting uses the characteristics of your browser configuration to track you, deleting cookies won’t help.

Device fingerprinting technologies are evolving and can be used to track you on all kinds of internet-connected devices that have browsers, such as smart phones, tablets, laptop and desktop computers.

How does tracking in mobile apps occur?

When you access mobile applications, companies don’t have access to traditional browser cookies to track you over time. Instead, third party advertising and analytics companies use device identifiers — such as Apple iOS’s Identifiers for Advertisers (“IDFA”) and Google Android’s Advertising ID — to monitor the different applications used on a particular device.

Does tracking of other “smart devices” occur?

Yes. More and more, consumer devices, in addition to phones, are capable of being connected online. For example, smart entertainment systems often provide new ways for you to watch TV shows and movies, and also may use technology to monitor what you watch. Look to the settings on your devices to investigate whether you can reset identifiers on the devices or use web interfaces on another device to limit ad tracking.

Controlling Online Tracking

How can I control cookies?

Various browsers have different ways to let you delete cookies or limit the kinds of cookies that can be placed on your computer. When you choose a browser, consider which suits your privacy preferences best.

To check out the settings in a browser, use the ‘Help’ tab or look under ‘Tools’ for settings like ‘Options’ or ‘Privacy.’ From there, you may be able to delete cookies, or control when they can be placed. Some browsers allow add-on software tools to block, delete, or control cookies. And security software often includes options to make cookie control easier.  If you delete cookies, companies may not be able to associate you with your past browsing activity.  However, they may be able to track you in the future with a new cookie.

If you block cookies entirely, you may limit your browsing experience. For example, you may need to enter information repeatedly, or you might not get personalized content that is meaningful to you. Most browsers’ settings will allow you to block third-party cookies without also disabling first-party cookies.

How can I control Flash cookies and device fingerprinting?

The latest versions of Google Chrome, Mozilla Firefox, and Microsoft Internet Explorer let you control or delete Flash cookies through the browser’s settings. If you use an older version of one of these browsers, upgrade to the most recent version, and set it to update automatically.

If you use a browser that doesn’t let you delete Flash cookies, look at Adobe’s Website Storage Settings panel. There, you can view and delete Flash cookies, and control whether you’ll allow them on your computer.

Like regular cookies, deleting Flash cookies gets rid of the ones on your computer at that moment. Flash cookies can be placed on your computer the next time you visit a website or view an ad unless you block Flash cookies altogether.

How can I control tracking in or across mobile apps?

You can reset the identifiers on your device in the device settings. iOS users can do this by following Settings > Privacy > Advertising > Reset Advertising Identifier. For Android, the path is Google settings > Ads > Reset advertising ID.  This control works much like deleting cookies in a browser — the device is harder to associate with past activity, but tracking can start anew using the new advertising identifier.

You also can limit the use of  identifiers for ad targeting on your devices. If you turn on this setting, apps are not permitted to use the advertising identifier to serve consumers targeted ads. For iOS, the controls are available through Settings > Privacy > Advertising > Limit Ad Tracking. For Android, Google Settings > Ads > Opt Out of Interest-Based Ads. Although this tool will limit the use of tracking data for targeting ads, companies may still be able to monitor your app usage for other purposes, such as research, measurement, and fraud prevention.

Mobile browsers work much like traditional web browsers, and the tracking technologies and user controls are much the same as for ordinary web browsers, described above.

Mobile applications also may collect your geolocation to share with advertising companies. The latest versions of iOS and Android allow you to limit which particular applications can access your location information.

What is “private browsing”?

Many browsers offer private browsing settings that are meant to let you keep your web activities hidden from other people who use the same computer. With private browsing turned on, your browser won’t retain cookies, your browsing history, search records, or the files you downloaded. Privacy modes aren’t uniform, though; it’s a good idea to check your browser to see what types of data it stores.

But note that cookies used during the private browsing session still can communicate information about your browsing behavior to third parties. So, private browsing may not be effective in stopping third parties from using techniques such as fingerprinting to track your web activity.

What are “opt-out” cookies?

Some websites and advertising networks allow you to set cookies that tell them not to use information about what sites you visit to target ads to you. For example, the Network Advertising Initiative (NAI) and the Digital Advertising Alliance (DAA) offer tools for opting out of targeted advertising — often by placing opt-out cookies. If you delete all cookies, you’ll also delete the cookies that indicate your preference to opt out of targeted ads.

Cookies are used for many purposes — for example, to limit the number of times you’re shown a particular ad. So even if you opt out of targeted advertising, a company may still use cookies for other purposes.

What is “Do Not Track”?

Do Not Track is a setting in most internet browsers that allows you to express your preference not to be tracked across the web. Turning on Do Not Track through your web browser sends a signal to every website you visit that you don’t want to be tracked from site to site. Companies then know your preference. If they have committed to respect your Do Not Track preference, they are legally required to do so. However, most tracking companies today have not committed to honoring users’ Do Not Track preferences.

Can I block online tracking?

Consumers can learn about tracker-blocking browser plugins which block the flow of information from a computer to tracking companies and allow consumers to block ads. They prevent companies from using cookies or fingerprinting to track your internet behavior.

To find tracker-blocking plugins, type “tracker blocker” in your search engine. Then, compare features to decide which tracker blocker is best for you. For example, some of them block tracking by default, while others require you to customize when you’ll block tracking.

Remember that websites that rely on third party tracking companies for measurement or advertising revenue may prevent you from using their site if you have blocking software installed. However, you can still open those sites in a separate browser that doesn’t have blocking enabled, or you can disable blocking on those sites.