Top 5 Free Video Editing Software

Video editing software doesn't have to be expensive. Whether you're an experienced home videographer or making your first foray into filmmaking, some of the best video editing software is yours to download and use completely free. 

If you just want to cut a clip to size or add a new soundtrack, there are lightweight editors that will help you get the job done in seconds, and export the video in a format suitable for uploading online, or playing on any desktop or mobile device.

Alternatively, if you're looking for more advanced tools like chroma keying and color grading, there are also advanced programs that offer everything you'd expect to find in premium software – except the price tag.

However, not all videos editors are created equal. Some prevent you exporting projects longer than a couple of minutes, offer a very small selection of editing tools, or add unsightly watermarks to your finished work. Here we've rounded up only the software that delivers on its promises, making video editing easy and fun, with no compromises.

1. Lightworks

Puts professional quality tools within the reach of everyone – regardless of budget. The best free video editor available

Lightworks is far more than a simple application for combining video clips and applying filters; it's been used to produce Hollywood movies including The King's Speech and Road to Perdition.

Lightworks is described as the professional video editor for everyone, and we reckon that's a fair summary. Despite its power, it will run well on fairly modest hardware, and it handles video capture and advanced editing with aplomb.

If you've tried other free video editors you'll probably find that the interface is a little different to anything you're used to, but you can arrange the various controls and windows to create something that suits your way of working.

2. Hitfilm Express

A powerful free video editor that's expandable if you outgrow it

Hitfilm Express is another video editor that promises pro-level features for free – and it delivers. The basic editor is very impressive, with advanced cutting tools, a great set of audio and video filters, layers and masking, compositing options, and chroma keying for creating green screen effects.

Additional tools are available for a fee, starting at $10 for a pack featuring color-correction, exposure adjustment, split screen masking, and various creative filters.

The downside of all this power is that Hitfilm Express is much more demanding than either Lightworks or Shotcut. Make sure you check the technical requirements before downloading it to avoid disappointment.

3. DaVinci Resolve

Premium quality software for advanced video and audio editing

DaVinci Resolve is a professional-grade video editor, with intuitive interfaces for editing, color correction, audio mastering and exporting. There's the usual multi-track timeline for arranging video and audio clips, plus context-sensitive trimming, and a vast collection of filters and effects.

Color correction is one of DaVinci Resolve's standout features, whether you want to adjust a whole video or just a selected part. There's HDR support, and you can work on raw files directly from your camera.

A few of the filters are exclusive to the premium DaVinci Resolve Studio, and there's a maximum export resolution of 3,840 x 2,160, but those are the only limitations. It's overkill if you just want to trim a video and upload it to YouTube, but for bigger projects DaVinci Resolve is hard to beat.

4. Shotcut

It might look unusual, but master it and you'll reap the benefits

Shotcut is another professional-feeling free video editor that requires a little patience if you are achieve the results it is so capable of delivering. The slightly unusual interface can be put down to the fact that this started life as a Linux application, and little has changed in its conversion to Windows.

To start with, the interface may seem a little stark. You will need to not only load a video, but also choose which editing mode you would like to work in and which tools you'd like to use.

There's no getting away from the fact that Shotcut has a steep learning curve. It's possible to achieve some impressive results by simply applying one of its many filters to your video, but the real rewards will only be reaped by those willing to invest the time and energy in fully getting to grips with what's on offer.

5. VSDC Free Video Editor

A non-linear editor stacked with tools, with more added all the time

VSDC Free Video Editor provides a huge array of effects and filters to enhance your footage, with both wizards and manual options to suit beginners or more advanced users.

VSDC is highly capable, and can yield superb results. As a non-linear editor, it works in rather a different way to many other similar tools, letting you position  clips and other elements on the timeline wherever you like and edit them there.

With the ability to not only work with multiple scenes and transitions, but also to add sprites and text to videos, you can create a professional-quality movie if you're willing to stick with VSDC's slightly odd way of working and unusual interface.

The latest version of VSDC adds extra artistic effects, including smoke. There's also a dedicated Instagram export profile and automatic image stabilization. It's noticeably faster, too. An excellent choice for creative video projects.

Top 10 Tips for Wireless Home Network Security

Many families setting up wireless home networks rush through the job to get their Internet connectivity working as quickly as possible. That's totally understandable. It's also quite risky as numerous security problems can result. Today's Wi-Fi networking products don't always help the situation as configuring their security features can be time-consuming and non-intuitive.

The recommendations below summarize the steps you should take to improve the security of your home wireless network. Making even a few of the changes described below will help.

1. Change Default Administrator Passwords (and Usernames)

At the core of most Wi-Fi home networks is a broadband router or other wireless access point. These devices include an embedded Web server and Web pages that allow owners to enter their network address and account information.

These Web tools are protected with login screens that prompt for a username and password so that only authorized people can make administrative changes to the network. However, the default logins provided by router manufacturers are simple and very well-known to hackers on the Internet. Change these settings immediately.

2. Turn on Wireless Network Encryption

All Wi-Fi equipment supports some form of encryption. An encryption technology scrambles messages sent over wireless networks so that they cannot be easily read by humans. Several encryption technologies exist for Wi-Fi today including WPA and WPA2.

Naturally, you will want to pick the best form of encryption compatible with your wireless network. The way these technologies work, all Wi-Fi devices on a network must share matching encryption settings.

3. Change the Default SSID

Access points and routers all use a network name called the Service Set Identifier (SSID). Manufacturers normally ship their products with a default SSID. For example, the network name for Linksys devices is normally "linksys."

Knowing the SSID does not by itself allow your neighbors to break into your network, but it is a start. More importantly, when someone sees a default SSID, they view it is a poorly configured network and one that's inviting attack. Change the default SSID immediately when configuring wireless security on your network.

4. Enable MAC Address Filtering

Each piece of Wi-Fi gear possesses a unique identifier called the physical address or Media Access Contral (MAC) address. Access points and routers keep track of the MAC addresses of all devices that connect to them. Many such products offer the owner an option to key in the MAC addresses of their home equipment, which restricts the network to only allow connections from those devices. Doing this adds another level of protection to a home network, but the feature is not so powerful as it may seem. Hackers and their software programs can fake MAC addresses easily.

5. Disable SSID Broadcast

In Wi-Fi networking, the router (or access point) typically broadcasts the network name (SSID) over the air at regular intervals. This feature was designed for businesses and mobile hotspots where Wi-Fi clients may roam in and out of range. Inside a home, this broadcast feature is unnecessary, and it increases the likelihood someone will try to log in to your home network. Fortunately, most Wi-Fi routers allow the SSID broadcast feature to be disabled by the network administrator.

6. Stop Auto-Connecting to Open Wi-Fi Networks

Connecting to an open Wi-Fi network such as a free wireless hotspot or your neighbor's router exposes your computer to security risks. Although not normally enabled, most computers have a setting available allowing these connections to happen automatically without notifying the user. This setting should not be enabled except in temporary situations.

7. Position the Router or Access Point Strategically

Wi-Fi signals normally reach to the exterior of a home. A small amount of signal leakage outdoors is not a problem, but the further this signal spreads, the easier it is for others to detect and exploit. Wi-Fi signals often reach through neighboring homes and into streets, for example.

When installing a wireless home network, the location and physical orientation of the access point or router determines its reach. Try to position these devices near the center of the home rather than near windows to minimize leakage.

8. Use Firewalls and Security Software

Modern network routers contain built-in network firewall, but the option also exists to disable them. Ensure that your router's firewall is turned on. For extra protection, consider installing and running additional security software on each device connected to the router. Having too many layers of security applications is overkill. Having an unprotected device (particularly a mobile device) with critical data is even worse.

9. Assign Static IP Addresses to Devices

Most home network administrators use Dynamic Host Configuration Protocol (DHCP) to assign IP addresses to their devices. DHCP technology is indeed easy to set up. Unfortunately, its convenience also works to the advantage of network attackers, who can easily obtain valid IP addresses from a network's DHCP pool.

Turn off DHCP on the router or access point, set a fixed private IP address range instead, then configure each connected device with an address within that range.

10. Turn Off the Network During Extended Periods of Non-Use

The ultimate in wireless security measures, shutting down your network will most certainly prevent outside hackers from breaking in! While impractical to turn off and on the devices frequently, at least consider doing so during travel or extended periods offline. Computer disk drives have been known to suffer from power cycle wear-and-tear, but this is a secondary concern for broadband modems and routers.

If you own a wireless router but are only using it for wired (Ethernet) connections, you can also sometimes turn off Wi-Fi on a broadband router without powering down the entire network.

Security Firm Exposes Details About $15,000 Box That Can Unlock Any iPhone

When the FBI asked Apple to create a backdoor into iOS in the wake of the San Bernardino shooting, Tim Cook and co. basically told the government to screw off. That’s because if Apple created special methods of bypassing its own safety measures, the company argued it would be putting every iOS user at risk.

This forced the government to turn to hackers and third-party security firms like Cellebrite, which earlier this year claimed it could unlock all of Apple’s latest iOS devices. But now, there’s apparently a new iPhone unlocking tool on the market that could rival the $5,000-per-device unlocking service offered by Cellebrite.

According to info released to security software company Malwarebytes, the GrayKey is a proprietary hardware solution about the same size as an Apple TV that can crack an iPhone’s unlock code in a little as two hours, though it can take three days or more for longer, six-digit passcodes. You can view a picture of the device here.

Developed by Grayshift, a private security firm founded in Atlanta in 2016, the GrayKey seems to be available in two different configurations: a $15,000 model that requires a geo-fenced internet connection to function, and an unlocked $30,000 version that works offline and can be used an unlimited number of times.

Once the GrayKey cracks an iPhone’s passcode, the box can be used to download the entire contents of a device or analyze and decrypt the device’s keychain, according to Malwarebytes. In photos shared with Malwarebytes, there seems to be evidence of a successful unlock attempt in which the GrayKey discovered the passcode of an iPhone running iOS 11.2.5, which indicates this happened relatively recently, as the most up-to-date release of iOS is version 11.2.6.

Even without your consent, the GrayKey could allow the government to access your phone in very little time. And if the device fell into the hands of a thief, it could make the process of flipping stolen iPhones trivial. With all that said, Apple’s next update to iOS could fix whatever vulnerabilities the GrayKey apparently uses to crack passcodes.

National Password Day

When is the last time you reviewed the passwords to your bank account, e-mail or credit card accounts?

Today is a good day to do it. Why? It’s National Password Day.Today, we are sharing tips to make your passwords more secure.

  • Make your password long, strong and complex.That means at least twelve characters, mixed with uppercase and lowercase letters, numbers, and symbols. Avoid common words, phrases or information in your passwords.
  • Don’t reuse passwords used on other accounts.Use different passwords for different accounts so that if a hacker compromises one account, he can’t access other accounts.
  • Use multi-factor authentication, when available. For accounts that support it, two-factor authentication requires both your password and an additional piece of information to log in. The second piece could be a code sent to your phone, or a random number generated by an app or token. This protects your account even if your password is compromised.
  • Consider a password manager. Most people have trouble keeping track of all their passwords. Consider storing your passwords and security questions in a reputable password manager, an easy-to-access application that stores all your password information. Use a strong password to secure the information in your password manager.
  • Select security questions only you know the answer to. Many security questions ask for answers to information available in public records or online, like your zip code, mother’s maiden name, and birth place. That is information a motivated attacker can obtain. Don’t use questions with a limited number of responses that attackers can easily guess – like the color of your first car.
  • Change passwords quickly if there is a breach. If you receive a notification from a company about a possible breach, change that password and any account that uses a similar password immediately.

7 Rules Your Teens Should Follow While Online Dating

Parenting teens and young adults in the online age can be daunting, especially with the prevalence of online dating. While your teen could meet the love of their life on dating apps, young people can also put themselves in unsafe situations online.

With these seven tips, though, you can rest easy knowing you’ve prepared your children for the high-stakes world of online dating.

Keep Your Identity Safe

This tip may seem like a no-brainer, but scammers can be creative and convincing as they try to steal your identity. Teach your kids to never send their Social Security numbers, bank information or any usernames and passwords to anyone they’ve met online. Never send money for any reason, even if the person claims it’s an emergency.

Your children should also keep full names, birthdates, addresses and other personal information private until they feel they know and trust the people they’re talking to.

Be Safe on Social Media

Some major dating apps connect through Facebook and display some of your public information to potential matches. Limit this shared information by updating your Facebook – and other social accounts’ – privacy settings and keeping as little information public as possible. If your children feel uncomfortable having a dating app linked to their Facebook, they can try a different app that allows them to sign in without connecting their account.

Get to Know Your Match Before Meeting in Person

Young adults should be certain they aren’t being catfished before meeting up with anyone they’ve met on a dating app or site. They should message their interest on the app for a while before meeting up for a date, and if they feel like something is off, they shouldn’t meet up with their online interest.

Video chatting is also a good way to see that the person they’re talking to is who they say they are. If someone refuses to Skype or FaceTime, they could be hiding something – even if they have a clever excuse.

Do a Background Check

If young daters have in friends in common with an online interest, they can reach out and ask if the person is trustworthy. They can reverse-search the pictures they have on the app as well using a search engine; if the search pulls up images connected to different social media accounts, the pictures were likely stolen from someone else.

Go on Safe Dates

Be sure the date happens during daylight hours and in a public place – your children shouldn’t invite a date to your home, and they shouldn’t go to their dates’ houses at first. Kids should also tell friends or family where they’ll be and always have an exit strategy just in case. They also shouldn’t accept rides from matches until they know and trust them and should always drive themselves and meet up at the location. There’s safety in numbers, so consider suggesting a double or group date.

Trust Your Friends and Family

If you or your kids’ friends say a match is sketchy, your children should at least listen to the advice. Those who are removed from the situation may have a clearer view and opinion of a potential date, while your children might be too blinded by excitement to see any possible warning signs.

Trust Your Gut

If something feels off, it probably is. Your children are under no obligation to meet anyone they’ve met on a dating app or site, even if matches are persistent or get upset if your kids say no to a date. If your child is asked on a date with which they don’t feel comfortable, they should suggest something else and be honest with their concerns. Any reasonable and trustworthy person will understand.

Consider having an emergency word your kids can text or say to you or a friend if they’re ever in an unsafe or uncomfortable situation and need help.

The most important thing you can do as a parent is create an open dialogue with your children about online safety. Do everything in your power to make sure your teen or young adult knows they can talk to you about online dating.