How to Install Kodi On a Fire TV or Fire TV Stick

Kodi is one of the most popular media players around (and certainly the most controversial). As well as letting you access your own media files from a number of platforms, it’ll stream from hundreds and hundreds of sources across the world.

You can get Kodi on a wide range of platforms, and one of the best-suited is Amazon's Fire OS, as used by the Fire TVand Fire TV Stick. However, you can’t simply download Kodi from these devices’ app store. There are several ways to get the app on your device, though. We’re going to take you through the process using the simplest, quickest method, which should only take 10 minutes.

Step 1: Download Downloader

First, we need to get hold of an app that will let us directly download the Kodi app installer file. There are a few of these, but the one we’ll use is simply called Downloader. 

It’s free, and it has a bright orange logo if you want to hunt for it manually. The quickest way to find it, if you have a mic-enabled Fire TV Stick, is to just speak into the remote while holding down the microphone button: saying “downloader” will bring it up instantly.

If your Fire TV isn’t voice-enabled it’s quickest to use the text search, as sifting through categories can take an age. Go to the Home screen display, press the up key on the remote so the navigation tabs are selected, then press the left key to get to the universal search area. 

Type in 'downloader' and the app will pop-up in the results. Now just click through and install the app.

Step 2: Enable installing apps from unknown sources

The next part is where we get serious: enabling downloads of apps from unknown sources. By 'unknown sources', the Fire TV simply means any apps that are not from the Amazon Appstore. 

This is an important security feature, but it needs to be disabled before you can install Kodi, as it’s not available direct from Amazon.

Select the nav tabs from the home screen by pressing up, and scroll right to reach Settings. From this menu, select Device. Next, pick Developer Options and you should see a sub-menu that includes the entry 'Apps from Unknown Sources'. Select it, making sure it reads ON underneath.

The disclaimer we need to make here is that if you’re going to start downloading apps from outside the Amazon store, make sure you’re not doing so from anywhere dodgy. Android apps can harbour viruses and malware, so download from official developer sites where possible. It’s what we’ll be doing next…

Step 3: Open Downloader 

Next up, we just need to boot-up Downloader. This bit barely needs an instruction, as when you install an app you should see it pop up at the top of one of your apps feeds.

If it doesn’t, just long-press (around two seconds) the home button to get to the system shortcut menu. Select Apps, and you’ll see all the apps you have installed. 

This is one thing Amazon Fire OS doesn’t do that well – actually putting your apps at your fingertips.

Step 4: Enter the Kodi URL

Now we’re in Downloader. This is an app that lets you download apps and other files through a browser-like interface, because Fire TV doesn’t actually have its own Chrome/Safari-style internet app. 

On the app’s initial page you’ll see a white box into which you can type a URL. Select it and type in 'https://kodi.tv/download'.

This is the web page you’d head to on a laptop to install Kodi, and it works for Fire TV too. 

Step 5: Select the right Kodi build

If you typed in the URL correctly you should now see a webpage appear in the Downloader app. Scroll down using the remote’s D-pad to find the green Android robot and select it.

On the next page you’ll see all the available Android install builds. There are quite a few, and the one to pick depends on the version of Fire TV or Fire TV Stick you have. 

The very first generation of Fire TV and Stick have 32-bit CPUs, so you’ll want to choose the ARM version labelled 32-bit. If you have a newer version, pick the ARM 64-bit build. 

On this page you’ll see 'release' and 'nightly' versions of Kodi, for both 32-bit and 64-bit versions. We recommend going for the 'release' version, which will have fewer bugs. The other. 'nightly' type may be newer but it's a work in progress. 

Select the right build and the .apk installer file will start downloading. It’s an 87MB file, with the version we’re using. Once finished Downloader will automatically attempt to install it, making an installer prompt pop-up. 

Press down on the D-pad to get to the Install button at the bottom of this page. Once the install is complete, don’t head right back to the Home screen but let the process take you back into the Downloader app. You’ll see an option to delete the install file, which will free up a little space – we don’t need it any more.

Step 6: Get content on your Kodi build

Pat yourself on the back – you just installed Kodi on your Fire TV. It should now appear in the Recent section on the Home page. 

If you can’t find it at some point in the future, don’t forget you can access your app library by long-pressing the home button on the remote. 

What you’ll want to do now is install add-ons, which give you access to lots of streamed content – for more on this, be sure to check out our feature on the best Kodi add-ons.

 

The 5 Best Free Photoshop Alternatives

1. GIMp

The best free Photoshop substitute – powerful and flexible

Powerful and adaptable, GIMP is the best free Photoshop alternative. With layers, masks, advanced filters, color adjustment and transformations – all of which are fully customizable – its feature set it unbeatable.

One of GIMP’s best features is its wealth of user-created plugins and scripts – many of which come pre-installed and ready to use. Some of these replicate popular Photoshop tools (such as Liquify), and there’s a package of animation tools for bringing your photos to live via blending and morphing. If all that isn't enough, you can even add Photoshop plugins to GIMP.

The latest version of GIMP offers a new interface that puts all of its toolboxes, palettes and menus together in one window. This gives it a smart, Photoshop-like appearance, though its extensive patchwork of user-created tools means you’ll have to spend a little time experimenting and perusing the documentation to learn how to get the best results from each one.

2. Pixlr Editor

A browser-based tool more powerful than some desktop apps

Pixlr Editor is no ordinary free Photoshop alternative – it’s the work of AutoDesk, one of the biggest names in computer-aided design and 3D modelling software, and is as impressive as its pedigree implies. 

Pixlr Editor features a prominent ad on the right-hand side that limits the size of your working space but that’s its main drawback. You get all the expected Photoshop-style tools (including sharpen, unsharp mask, blur, noise, levels and curves to name just a few), as well as artistic filters and automatic optimization options. Nothing is hidden behind a paywall. 

Pixlr Editor also gives you a toolbox very much like GIMP’s, with brushes, fills, selection, healing and clone stamp tools – all customizable via a ribbon above the workspace. There’s support for both layers and masks, and although Pixlr Editor can't edit pictures in batches, it will cheerfully handle multiple images at once in different tabs.

3. Photo Pos Pro

A well designed Photoshop alternative, with a few restrictions

If you haven’t heard of Photo Pos Pro, you’re in for a treat. This free Photoshop alternative aims to give the best of both worlds, offering interfaces for both novice and advanced users. The novice option puts one-click filters and automatic adjustments at the fore, while the latter closely resembles Photoshop. Both are well designed, and more intuitive than GIMP’s endless lists and menus.

Like Photoshop, Photo Pos Pro offers both layers and layer masks, as well as superb clone and healing brushes. All the expected color-refining tools are present and correct. There’s support for batch-editing and scripts to save time on routine tasks, you can import images directly from a scanner or camera.

4. SumoPaint

A Photoshop-like experience with a wide range of tools

SumoPaint's interface will look very familiar if you have past Photoshop experience. The similarities are more than just skin deep, too, as its layering functionality and fairly wide range of editing tools - including several brushes and wand types - make it a formidable alternative.

The free version of SumoPaint runs in most Flash-enabled browsers and is mainly supported by on-page ads. There is also a Chrome Web App available for Chromebooks as well as users running Google's browser on other desktop operating systems.

More intricate projects may not be suitable for SumoPaint, and its file support is somewhat limited and does not include Photoshop's default PSD format. You can open files with traditional image extensions such as GIF, JPEG and PNG while edits can be saved in the app's native SUMO format as well as JPEG or PNG.

5. Adobe Photoshop Express

Photoshop's best tools in a touchscreen-friendly package

Adobe Photoshop Express is a lightweight version of the industry-standard photo editor available free for your browser, and as a downloadable app for Windows, iOS, and Android.

Photoshop Express is the simplest of the tools here, but Adobe’s expertise in photo editing means it’s far superior to other quick-fix software. It packages Photoshop’s most useful picture-enhancing  sleek, minimalist interface that’s particularly well suited to touchscreens. Sliders enable you to adjust contrast, exposure and white balance of your photo dynamically, and there are automatic options for one-click adjustments. Once you’re satisfied with the results, you can either save the edited photo to your PC or share it via Facebook.

The main appeal of Photoshop Express is its simplicity, but this is also its biggest drawback. There are no layers, plugins, or brush tools, and you can’t crop or resize your pictures.

If you’re looking for a powerful image editor for your smartphone or tablet, Photoshop Fix (for restoring and correcting images) and Photoshop Mix (for combining and blending images) are also well worth investigating. Photoshop Mix even supports layers, and both apps integrate with Adobe’s Creative Cloud software, making it an excellent counterpart to the desktop version of Photoshop, as well as a superb tool in its own right.

Shopping For a VPN App? Read This.

You probably know by now that using your mobile device on the public Wi-Fi network of your local coffee shop or airport poses some risk. Public networks are not very secure – or, well, private – which makes it easy for others to intercept your data. So, what can you do to keep your mobile data private and secure while out and about? Some consumers have started using Virtual Private Network (VPN) apps to shield the information on their mobile devices from prying eyes on public networks. Before you download a VPN app, you should know that there are benefits and risks.  

VPN app basics

How do VPN apps work? When you use a VPN app, data sent from your phone – be it your browsing data or the apps you are using – is routed through servers located elsewhere. A VPN app can make traffic from your phone to a website you visit appear to come from a server operated by the VPN provider, rather than directly from your phone. Some VPN apps also encrypt the data sent between your phone and the VPN server. So, for example, say you are using a public Wi-Fi network that isn’t secure – such as a network that allows anyone to use it, even if they don’t have a password.  Other people on the same network can see your traffic.  But when you use a VPN app that encrypts the data, anyone monitoring your network connection only sees gibberish – even if the particular site you are visiting doesn’t itself employ encryption.

Why would someone use a VPN app? VPN apps tout a variety of uses. Not only do some VPN apps promise to keep your information secure on public networks, but some also claim they will keep your information private from advertisers and other third parties. And because VPN apps route your traffic through another network, they can make it appear as if your traffic is coming from somewhere else.  This is similar to how a company might use a VPN to allow employees to use their work computer as if they were on the company’s network, even while they’re on the road.

What are some privacy and data security concerns about using a VPN app? First, you should be aware that when you use a VPN app, you are giving the app permission to intercept all of your internet traffic. You don’t want to grant such permission lightly. Also, a group of technical researchers who studied almost 300 VPN apps found potential privacy and security risks with some VPN apps. According to the study, for example, some VPN apps did not use encryption; some requested sensitive, and possibly unexpected, privileges; and some shared data with third parties for purposes such as injecting or serving ads, or analyzing the data to see how people are using a particular site or service.

Given these findings and the considerable trust you must place in a VPN app with your traffic, here are some things to consider before you download a VPN app.

Before you download a VPN app

  • Research the VPN app before you use it. You are trusting a VPN with potentially all of your traffic. Before you download a VPN app, learn as much about the app as you can. Look up outside reviews from sources you respect. You can also look at screenshots, the app’s description, its content rating, and user reviews, and can do some online research on the developer. The fact that an app promises security or privacy does not necessarily make it trustworthy.
  • Carefully review the permissions the app requests.Apps will present the permissions they request on their app store page, during installation, or at the time they use the permission. It’s useful information that tells you what types of information the app will access on your device in addition to your internet traffic. If an app requests particularly sensitive permissions (reading text messages, for example), consider whether the permission makes sense given the app’s purpose and whether you trust the app developer with that access.
  • Know that not all VPN apps actually encrypt your information. Some VPN apps use protocols that do not encrypt your traffic, or encrypt only some of your traffic. Outside reviews from sources you respect might provide more information about a particular app’s use of encryption.
  • A VPN app generally isn’t going to make you entirely anonymous. Instead, the app will typically obscure the content of your traffic from your internet service provider or public Wi-Fi provider, shifting trust from those networks to the VPN app provider. In addition, sites you visit may be able to determine that you are using a VPN app, and can still use any identifying information you directly share with them (for example, filling out a form with your email address) to track you.
  • VPN apps may share your information with third parties. Many VPN apps are free because they sell advertising within the app, or because they share your information with (or redirect your traffic through) third parties. If you are using the VPN app to keep your traffic private, make sure you review the VPN app’s terms and conditions and its privacy policy to determine if it shares information with third parties such as advertisers, and if so, what information it shares.

Security and Privacy Tips for Cryptocurrency Holders

The cryptocurrency trend is definitely a big boom in today’s financial market. More and more people are starting to treat digital currencies seriously, as they are now a great alternative for managing your personal and professional budgets. And because the stakes are getting higher, there is an increasing need for cybersecurity measures.

If you’re a cryptocurrency holder, you probably love what you’re doing. You’re grateful because you have the opportunity to invest, trade and save a lot of money by leveraging your digital coins.

However, what would happen if one day all your coins were gone? You’d likely blame the hacker at first, but it is partially your responsibility to protect your investments.

Here are some security and privacy tips that will add a significant layer of protection to your cryptocurrency funds.

 

1.    Secure Your Wallets

The first and most important way to protect your digital currency is to choose a secure wallet. That means you should find a company that offers more security measures than the “normal” wallet providers do. For example, wallets that use encryption to protect the private keys can be much better and safer. Moreover, you can encrypt your data using different crypto encryption providers.

2.    Secure Your Devices

It takes just one security vulnerability for your PC, mobile or tablet to be hacked. I’d suggest you take advantage of a premium antivirus, set your firewall settings to maximum security and take advantage of an antispyware software to regularly check for malicious software. You can also consider using a secure operating system.

3.    Back Up All Your Crypto Data

Your crypto data is really the most important element of your entire operation. If you ever make the mistake of not backing up your data, you’ll regret it forever. When your PC gets hacked, or when your laptop gets physically stolen, you can always buy another one. However, when a hacker steals all your cryptocurrency funds because they’ve gained access to your data, you’re in a sticky situation. To avoid this, store your crypto data in an offsite place. Use a colocation server, a thumb drive and an encryptedexternal disk.

4.    Dedicate One Device to Cryptocurrency Only

The best way to add an extra layer of security to your cryptocurrency wallets is to base all your cryptocurrency activities and operations on a single device. You should have a personal PC/phone and a cryptocurrency PC/phone.

Do your best to keep your work device as private as possible by using dedicated IPs and private servers that keep your location, name and activity anonymous.

5.    Don’t Keep All Your Funds in One Wallet

Most of you know the saying “don’t keep all your eggs in one basket”. This advice is actually very concrete and worth following when it comes to our cryptocurrency operations.

That is why you should have two digital wallets that serve different purposes. Through the first wallet, called the “hot wallet,” you will perform all your trading and transactions. The other wallet is called the “cold wallet” or the “cold storage,” and it is the wallet that stores your savings. Back up both your wallets’ private keys and store them offline.

6.    Avoid Public Wi-Fi

Public Wi-Fi is definitely a no-no for all cryptocurrency holders that want to keep their funds safe. There are many hackers that attack their victims through public Wi-Fi, so you must pay a lot of attention whenever you connect to the web using your phone, laptop or tablet.

Better, don’t connect if you’re not sure. Moreover, make sure that you don’t lend your phone to unknown people. If you’re a student who lives on campus, do not lose sight of your smart devices.

7.    Regularly Look for Intrusions

When you install a clean version of an operating system, you will be able to note the default programs that run in your Task Manager under Processes. Note down that list and know the number of processes that your PC usually opens.

Great hackers are always working silently. They might have infected your PC already and be waiting for the perfect moment to strike. That’s why you should regularly check for new processes that start when your PC starts. If you find something unwanted, you should take action and remove it immediately.

8.    Enable Strong Authentication

If your wallet allows it, enabling two-factor (strong) authentication is absolutely essential to your crypto security. Strong authentication provides an extra layer of security beyond your username and password to protect against account hijacking.

9.    Use Your Common Sense and Stay Safe Online

Lastly, yet most important, you should always use your common sense to stay safer online. Whenever you have suspicions about a link, email, invitation or process that runs under your Task Manager, it’s to better follow your instincts and use common sense.

 

Takeaways

Securing your cryptocurrency funds is probably the most important thing that should concern your mind right now. Unless you believe you’re super protected, start taking action and dedicate your time to optimize the level of protection of your crypto operations. Good luck and stay safe!

Are You Sharing Your Security Answers on Social Media?

Social media can be a lot of fun, but if you’re not careful, it can be an easy road to identity theft, account takeover, and more. The three texts mentioned above are from actual poststhat have come across sites like Facebook, inviting others to share their answers…but why?

“Who Remembers Their Childhood Phone Number? Share It Below!”

“Tag Your Mom If She’s the Best Mom in the World!”

“What’s Your Dragon Name? Find Out Below and Share It in the Comments!”

Social media can be a lot of fun, but if you’re not careful, it can be an easy road to identity theft, account takeover, and more. The three texts mentioned above are from actual posts that have come across sites like Facebook, inviting others to share their answers…but why?

Think it through: does anyone really care if you can remember your very first phone number? Wouldn’t it be enough to simply answer yes or no, rather than proving it by typing it in the comments? The only people who genuinely care about this knowledge are people who are hoping to figure out the name of your hometown from the area code and call prefix.

The name of your childhood town, or rather, the city where you were born…

Of course, your first phone number might not have been the city where you were born. One ITRC staffer has a hilarious story about being born in another city while her parents were simply passing through. But that’s obviously not the norm, and it just means that a scammer would have to give up and move on to the next person who’d answered the question.

Who has the best mom in the world? I do, of course! And I’ll prove it by tagging her in the comments! Not just typing her first name or the words, “My mom is the best,” but actually tagging her according to the post’s instructions. But once I’ve tagged her, a scammer can simply click on the profile name and see her account. Many women use their maiden names in their social media profiles so that childhood friends can find them.

So, now the scammer has my mother’s maiden name…

But what can be the harm in finding out my “dragon name?” All I have to do is match up the month I was born with the date, and then I pick from the list of names. Once I type “Golden Slasher” in the comments, the scammer knows that Golden equals August and Slasher equals the 3rd. Based on information in my profile, like the fact that I’m in the Class of ’67 Facebook group for my high school, it gives an identity thief plenty of jumping off points to guess my complete birthdate.

And now they’ve got my birthdate…

Posts like these are common on social media, and they fall into the category of oversharing. You might think you’re just playing along and having fun, but the thief who first originated the viral post is gleaning identifying information from thousands of social media users at a time. It only takes a few seconds’ work to figure out if your answer leads to access to your account.

Remember, adopt an air of caution when it comes to the things you share about yourself or your family, especially when you don’t know where that information will end up or who will be able to see it. It’s far better to be a party-pooper (because everyone was just DYING to know your dragon name) than a victim of identity theft.