I Puffi: Viaggio nella foresta segreta [HD] N/A HD Guarda ora | When Calls the Heart HDTV | Fortune Salon

How to Securely Erase Your Private Files

Most of us store sensitive information on our computers, such as payment details, personal information, login credentials, private collections of photos and other files and much more. If you intend to recycle, donate or sell any computer or data-bearing hardware, then you're going to want to make sure that private information is securely deleted. Unfortunately, it is not possible to get rid of the files for good simply by deleting them and emptying the Recycle Bin. In fact, that process does nothing more than mark the space that was previously occupied by the file as available for new file operations. In other words, until something else overwrites the original data, it will be easily recoverable using any specialized data recovery software. So, if you have something you want to get rid of, you're going to need a solution like [email protected] KillDisk to take care of it.



How Hard Drive Sanitation Works

Securely deleting a single file is not a reliable method of getting rid of a single piece of sensitive data. The reason for this is that older versions of the file could be stored in different physical locations on the disk. In this case, overwriting the deleted data with ones or zeros does not guarantee success, since any deleted copies of the file stored elsewhere on the drive will be unaffected. Similarly, in the case of modern solid-state drives, which most computers now use, the location of deleted data and the creation of new data is entirely controlled by the drive's firmware. In other words, no third-party program can have control over how the data is stored, deleted and accessed. That's why a complete hard drive sanitation solution like [email protected] KillDisk offers the only certain way to completely erase everything on a drive



Unlimited Possibilities

As the result of many years of research and development, [email protected] KillDisk is extremely good at its job. The latest version sports many improvements which include a redesigned user interface and improved visualization throughout the erasure process. Now, you can easily and securely wipe any number of hard drives as well as any other digital storage devices that may be written to. It handles drives better than ever before thanks to improved support for hot-swapping and handling of disks with read/write errors. You can even have the computer automatically shut down after all jobs have been completed. The revamped console supports ATA Secure Erase for SSD drives, network mapping, network sharing and modern 64-bit UEFI Secure Boot, as well as regular legacy boot. The program also ships with the latest edition of [email protected] Boot Disk Creator, allowing users to access the functions within a self-contained operating environment.



[email protected] KillDisk comes with a new licensing policy for erasing multiple drives in parallel, and the packages have been simplified to three different versions instead of seven. As such, customers can enjoy greater scalability and flexibility without the extra complications that often come with it. If you're ready to get started with version 11 of the world's leading hard drive sanitation software, visit http://www.killdisk.com today and test out the free trial.

Download Now

Access and Repair an Unworkable PC with Active@ Boot Disk

If your computer simply refuses to boot up, then you might think that all hope is lost, and it will be necessary to send it in for repairs or, at best, reinstall Windows and lose all your files. Fortunately, however, there is another way thanks to LSoft Technologies' [email protected] Boot Disk software. This powerful software suite provides a wide range of tools to help you repair your computer, access files and much more. From data recovery to disk imaging to secure data erasure, [email protected] Boot Disk is one of the industry-leading disk utility suites on the market. It works through an entirely self-contained boot environment as well. This means you can use it even if your computer won't boot or if your hard drive doesn't even have an operating system installed. The self-contained boot environment allows you to perform various tasks, all independently of your computer's operating system.



Backup and Recovery Tools

Making sure you're prepared for the next massive cybersecurity attack is about more than just running the latest antivirus software. You should always keep important data backed up, but it's not always easy to tell exactly what needs to be archived. [email protected] Boot Disk includes the latest disk imaging software for making a complete, byte-by-byte copy of all the data on your hard drive or other storage device. This is also useful if you want to replace your hard drive without having to completely reinstall your operating system and all your programs. It's also great in business scenarios, when you might need to upgrade multiple computers at the same time. Aside from disk imaging, [email protected] Boot Disk includes everything you need for recovering existing disk images, recovering deleted data and restoring lost or damaged partitions.



Independent Operating Environment

[email protected] Boot Disk provides an enormous degree of functionality all from the convenience of an optical disk, USB flash drive or memory card. Even if you don't have a hard drive installed in your computer, this software suite provides a wide range of tools for completing common computing tasks. Included are various Internet utilities for browsing the web and checking your email. There are also remote desktop, Telnet and FTP clients for accessing remote resources over a network. Included document viewers allow you to preview many different types of file, which is also very useful when recovering or securely erasing data. The included image viewer supports virtually every type of image format you're ever likely to encounter. Other common PC tools, such as a calculator, task manager, registry editor and partition manager are also included.



Securely Erase or Recover Deleted Data

[email protected] File Recovery, [email protected] Partition Recovery and [email protected] KillDisk are all included in the software package. With the recovery applications, you can recover deleted data, formatted disks or deleted partitions with ease. However, if secure data erasure is your goal, then the [email protected] KillDisk utility will make certain that deleted data will never be recoverable, since it will meticulously overwrite it with zeros. If you're selling or donating your PC or hard drive, this is a great option to have.



To learn more about [email protected] Boot Disk, visit http://www.boot-disk.com/ today.

Download Now

Unleash The Full Power of Your Processor

In previous articles, the results across four different PCs have included nearly 90% average faster boot time and an over 39% average gain in download speed. Here we look at the gains observed in CPU, or processor, power.



The data show that the CPU-tuning tools PowerSense and OptiCore in System Mechanic can significantly improve processor performance by boosting core clock speed and prioritizing your current tasks in real time.



Results

  • The aggregate score (across all PCs) for CPU Performance was: 17.25% improved.

  • The test PCs with 2 to 4 cores had impressive improvements of nearly 30%.


For separate processor results for each of the PCs, see the chart below.

CPU Performance Improvement (%) after running System Mechanic



The CPU is one of the most important PC components responsible for smooth, responsive computing. Windows does not always default to taking full advantage of its capabilities, however, due in part to factory settings generally favoring power conservation over maximum speed.



But today's high-demand tasks - whether online video gameplay, movie and music streaming, office multitasking, or 3D graphic design - often require the processor to be fully unleashed.



OptiCore automatically perceives which among your running programs is the current priority task, and allocates system resources accordingly. For its part, PowerSense can override sluggish Windows default settings to unpark idle processor cores and rev them to maximum clock speed when using high-demand apps that require more raw CPU power. The result is a faster PC that smoothly and capably meets today's complex computing challenges.



Methods

Performance metrics were collected during tests run five times before and five times after System Mechanic was installed on each of the four Windows machines, with the scores averaged to deliver results across the following categories:

  • PC Boot Time

  • Internet (Download Speed)

  • CPU (Processor)

  • RAM (Memory)

  • GPU (Graphics)

  • Drives (HDDs and SSDs)


To measure processor speed improvements, the benchmarking tools NovaBench, PerformanceTest and GeekBench performed CPU stress tests. During these, the PCs each performed compression, encryption, floating point arithmetic, integer arithmetic and MD5 hashing tests.



Make your computer safe, fast and optimize it for peak performance with System Mechanic 17 Pro. The freeware version is also available. Discover System Mechanic Free at http://www.iolo.com/promo/smfree.

Download Now

Optimize Your Hard Drive for a PC That Keeps Up with You

System Mechanic continues to evolve to improve functionality and performance. It includes new optimization features for Windows 10, designed to increase privacy and reduce internet bandwidth demands. This artice shows the results of iolo Labs comprehensive and reproducible benchmark testing.



Results

  • The UltraBook's HDD averaged performance gains of over 44%.

  • The high-performance nature of the Desktop's state-of-the-art SSD contributed to its limited improvement.

  • The lower-end SSD- and HDD-based systems saw more significant increases.

  • The aggregate score (across all PCs) for Drive Performance was: 18% improved.


For separate hard drive results for each of the PCs, see the chart below.

Drive (Primary Storage) Performance Improvement (%) after running System Mechanic



The following tools within System Mechanic were designed to help contribute to this increased hard drive performance:

Program Accelerator uses patented calibration technology to realign program data for the fastest possible access. The result is quicker program launches and more responsive drive performance.

Disk Defragmenter consolidates scattered file fragments on your hard drive, boosting file access speed and further increasing drive efficiency.

AcceleWrite writes data to the hard disk in contiguous batches to avoid fragmentation before it can occur, resulting in increased read/write speeds and faster program behavior.

All-in-One PC Cleanup combines many tools in one to perform a deep cleaning of the hard drive by safely removing all Windows, internet and registry junk with one click.



Methods

To measure gains in drive speed after installing System Mechanic, PerformanceTest 9.0 by PassMark Software and NovaBench 3 by Novawave Inc. tested disk read, write and seeks within disk files as well as input-output operations per second.

Four computers were subjected to the tests five times each before installation of System Mechanic and five times each after. The highest and lowest scores were removed from the sample set, and the remaining three scores averaged to calculate final scores.



Overall, the results of the iolo Labs benchmark tests make clear that System Mechanic can demonstrably improve the performance of the principal components of a PC. Among the wide array of tasks that can be improved are gaming, rendering, streaming, graphic design, office tasks and more.



System Mechanic Pro fixes over 30,000 different problems and errors. It's the complete solution to the root causes of PC slowdown, making it the easiest way to keep your PC performing like new. Visit http://www.iolo.com/products/system-mechanic-professional and get System Mechanic Pro now!

Download Now

Elcomsoft Phone Breaker 8, New Apple Devices and iOS 11

With all attention now being on new iPhone devices, it is easy to forget about the new version of iOS. While new iPhone models were mostly secret until announcement, everyone could test iOS 11 for months before the official release. In this article we'll cover what you can and what you cannot do with an iOS11 device as a forensic expert. We'll talk about which acquisition methods still works and which don't, what you can and cannot extract compared to iOS10, and what you need to know in order to make the job don't.


Physical Acquisition


With no jailbreak on the horizon, physical acquisition remains unavailable. Even when an iOS11 jailbreak appears, you still have to wait for us to update Elcomsoft iOS Forensic Toolkit.


What you need to perform physical acquisition of an iOS11 device?

1. A working jailbreak

2. Device passcode

3. iOS Forensic Toolkit

5. Passcode (again)


Logical Acquisition


There are 2 steps in logical acquisition: acquiring a local backup from the iOS device and accessing information stored in that backup. While in previous versions of iOS logical acquisition was possible once you unlocked the device with whatever methods, iOS11 requires you to enter device passcode in order to pair it with a computer.


To perform logical acquisition, you need:

1. Device passcode OR valid pairing record (lockdown file)

2. iOS Forensic Toolkit


If the user specified a backup password, you need to recover that password first in order to decrypt the content of the backup. The recovery is only possible by running a brute-force or dictionary attack; there are no known weaknesses in iOS11 backups that would allow to bypass the password. Note that password attacks are extremely slow for iOS11 backups. Elcomsoft Phone Breaker supports backups produced by iOS11 devices:

1. You need Elcomsoft Phone Breaker to attack backup passwords and/or decrypt the backup

2. Elcomsoft Phone Viewer 4.0 will be soon updated to support iOS11 backups, you need this version or newer to view and analyze iOS11 backups


Keychain Acquisition


There are still 2 possible methods allowing experts to obtain information stored in iOS11 Keychain:

1. Logical acquisition > Password-protected backup > decrypted keychain

2. iCloud Keychain


In order to access the keychain via logical acquisition, do the following:

1. In Elcomsoft iOS Forensic Toolkit, use option "B" (Backup)

2. If backup password is empty, EIFT will temporarily use "123" as a password

3. If backup password is present and it is not known, use Elcomsoft Phone Breaker to recover that password

4. Open the backup in Elcomsoft Phone Breaker

5. In EPB, select "Keychain Explorer" and provide path to the location of the backup

6. Enter backup password to allow the tool to decrypt the backup

7. Now you are able to view, analyze or export keychain items


Cloud Acquisition


iOS11 continues supporting cloud backups. They are still stored in iCloud Drive and are still not accessible without specialized tools such as Elcomsoft Phone Breaker. While internally iOS11 made a number of changes to iCloud backups, the acquisition process still looks familiar except for one thing: Two-Step Verification is no longer supported. All Apple ID accounts that used Two-Step Verification before will be automatically migrated to the much stronger Two-Factor Authentication once the user updates at least one of their devices to iOS11 or macOS High Sierra. Therefore, the acquisition process will look as follows.


No Two-Factor Authentication

1. Apple ID and password or valid iCloud authentication token

2. Elcomsoft Phone Breaker


Two-Factor Authentication

1. Apple ID and password or valid iCloud authentication token

2. If using Apple ID and password: access to trusted device

3. Elcomsoft Phone Breaker


No Notifications in Backups


In iOS11, notifications are no longer part of any backups, local or iCloud. With no iOS11 jailbreak, we have no way to verify whether notifications older than 7 days are still stored on the device or not.


Synced Data


Little has changed in regards to synced data. You still have access to everything you could access in iOS10, and there are no new bits of data added to the synced set. You can still fetch synced call logs, Safari browsing history and bookmarks from iCloud accounts. Contacts, calendars, notes, reminders and mail remain accessible.


In order to obtain synced data from the user's Apple Account, you need the following:

1. Elcomsoft Phone Breaker

2. Apple ID and password or iCloud authentication token

3. If Apple ID/password are used and Two-Factor Authentication enabled: access to a trusted device is required

Download Now

VyprVPN: Set It and Forget It

Online privacy threats are everywhere! There are many risks to your privacy, whether you're out and about with your mobile device or using the Internet at home. Which is why it's essential to secure your connection and protect your privacy online at all times. But it can be a challenge remembering to protect your privacy every single time you grab your phone or sit down at your computer.



Luckily VyprVPN makes it easy to stay secured, with a variety of automatic settings that are quick to configure and use. Simply set them up once and you're good to go! You won't have to actively think about your privacy or remember to enable settings after that. Features include:

  • Connect on Untrusted Wi-Fi: Connects automatically on ALL Wi-Fi networks except those you have marked as "trusted" (these would be safe networks, like your home).

  • Kill Switch: Kills all Internet traffic if VyprVPN isn't enabled, so you'll never be left vulnerable while browsing. Ever!

  • Connection Per App: Allows you to control behavior on a per app basis, so you can set VyprVPN to always work with certain apps (think about those you'd definitely want security on - like a banking app or anything connected to the Internet, for example).

  • Block Malicious Sites: Automatically blocks all malicious sites, so you cannot mistakenly access those that may be harmful to you.



These features make it quick and easy for everyone to stay protected whenever necessary and desired, without having to remember or go through the effort of manually connecting every time. Be sure to visit the settings within your VyprVPN app to get set up.



Please note, features and settings vary by platform. You can find more information about VyprVPN for Mac here: http://www.goldenfrog.com/vyprvpn/mac

Download Now

Best Internet Radio Live Broadcast Software

Internet radio live broadcast software is a godsend for radio DJs, widening the scope of your internet radio broadcasting abilities without putting pressure on your time and resources. It's made online radio live broadcasting more accessible for millions of broadcasters around the world.



SAM Broadcaster Cloud is one of the brightest lights in the audio cosmos: a true emblem of what makes internet radio live broadcasting software so fantastic and adaptable. To ready you for the next best tool in your radio DJ arsenal, we've picked four traits that define what you'll be capable of...



You're never offline

Internet connections can be pernicious. Your home server, while pushing itself to glory on most occasions, may slow to a crawl, or go temporarily offline for no discernible reason. This isn't a major issue for most people, but internet radio DJs will be tearing their hair out at a bad signal, especially if it's beyond their ability to fix.



Happily, though, cutting-edge internet radio streaming software functions on a remote, Cloud-based server. It runs at peak efficiency 24/7, meaning your station is never banished from the web.



Multiple streaming formats with Internet radio live broadcast software

MP3, ACC-HE, Ogg... Reading through a list of streaming methods can seem like you're peering at hieroglyphs, vaguely aware that they mean something important, yet without a clue as to their true value.



Thankfully, SAM Broadcaster Pro grants you over half a dozen streaming formats to translate your audio content. However listeners choose to absorb your programming, they'll have options to suit their preferred web player. Add-ons like SAM Cast let you broadcast a show live in several formats at once!



On-air audio processing

After you've managed to create an internet radio station, there should be a guarantee that it'll sound crisp, balanced and free of pops from your microphone. AGC (Automatic Gain Control) is able to take a virtual pickaxe to your audio edifice, sharpening its overall quality in real-time.



How so? Well, it modulates volume so nothing is too loud or quiet, and cuts select frequencies out of your station's blueprint. Set it up to your liking - it'll then add 'equalizer' and 'compressor' effects to the channel, smoothing out any inconsistencies with your sound.



Add more radio DJs to your roster with your Internet radio live broadcast software

Hopefully, you'll nail a brilliant formula for the station, picking up more listeners each month. The time may eventually come when you have to expand your radio DJ team, dispersing the hosting duties to people you trust.



With top-notch Internet radio live broadcast software , you can add more and more DJs as the years drift by, helping your brand grow with demand. SAM Broadcaster Cloud, for instance, caters for 15 additional DJs in the Gold Package, which'll set you up nicely for the future.



Internet radio live broadcast software is packed with great stuff; all it takes is a few clicks on your part to explore what's out there! Head to the SAM products page for more information on the skills, thrills and musical spills you can mop up with Spacial products.

Download Now

Obtaining Detailed Information about iOS Installed Apps

Accessing the list of apps installed on an iOS device can give valuable insight into which apps the user had, which social networks they use, and which messaging tools they communicate with. While manually reviewing the apps by examining the device itself is possible by scrolling a potentially long list, we offer a better option. Elcomsoft Phone Viewer can not just display the list of apps installed on a given device, but provide information about the app's version, date and time of acquisition (first download for free apps and date and time of purchase for paid apps), as well as the Apple ID that was used to acquire the app. While some of that data is part of iOS system backups, data on app's acquisition time must be obtained separately by making a request to Apple servers. Elcomsoft Phone Viewer automates such requests, seamlessly displaying the most comprehensive information about the apps obtained from multiple sources.


In this how-to guide, we'll cover the steps required to access the list of apps installed on an iOS device.



Step 1: Create a password-protected backup or download an iCloud Backup


In order to access the list of apps installed on the device, you may use either a local backup or a backup downloaded from iCloud.



Local Backups


While we always recommend creating a password-protected backup as such backups allow accessing a wider range of data compared to non-protected backups, the list of apps is available in unprotected backups as well.


We recommend using Elcomsoft iOS Forensic Toolkit for making the backup (use the "B - Backup" option in the main menu). However, Apple iTunes can be also used.



Important: if you are a mobile forensic expert, using a specialized tool such as iOS Forensic Toolkit is recommended for making a backup. While iTunes can be used, Apple's tool may introduce unwanted artefacts by synchronizing the device to the computer. iOS Forensic Toolkit does not attempt to "sync" iOS devices; instead, it invokes a single function of making a backup.


Note: if you are using iOS Forensic Toolkit to produce a backup, the tool will automatically set a temporary backup password. The password will be "123"; you will need to use this password when opening the backup with Elcomsoft Phone Viewer.



iCloud Backups


If you choose to download an iCloud backup, use Elcomsoft Phone Breaker and select Download from iCloud - Backups.



Step 2: Recover backup password


This step is only required if the backup is protected with an unknown password. If you know the password (or specified one during the first step), skip this step and go directly to Step 3.


If you are using a cloud backup, skip this step and go directly to Step 3.


To recover the password, do the following:


1. Open Elcomsoft Phone Breaker

2. Password recovery wizard | Choose source | iOS device backup

3. The list of available backups will be displayed. At this point, you may select an existing backup from the current PC.If you are processing the backup extracted on a different computer or created with iOS Forensic Toolkit, select "Choose another" and specify path to the manifest.plist

4. Default attack settings will be available. If you are content with default attack settings, you may begin the attack by clicking the "Start recovery" button

5. Once the password is discovered, it will be displayed



Once the password is recovered, you may optionally decrypt the backup in Elcomsoft Phone Breaker. Alternatively, you may open the backup in Elcomsoft Phone Viewer, in which case it will be decrypted automatically (although you will need to supply the backup password).



Step 3: Open the backup in Elcomsoft Phone Viewer


In order to access the list of Wi-Fi networks and view the list of installed apps, you will need to use Elcomsoft Phone Viewer 3.50 or newer.


1. In Elcomsoft Phone Viewer, open the backup

2. If the backup is encrypted, provide backup password in order to decrypt the backup

3. Once the backup is opened, select "Applications". The list of installed apps along with all additional details will be displayed



A working Internet connection is required to pull additional details such as the app's first install date. If no Internet connection is present, the list displayed will lack some details. If you are analyzing a cloud backup downloaded from iCloud or iCloud Drive, very little data will be initially available. Elcomsoft Phone Viewer automatically retrieves additional properties for each app from the list. This operation is performed in a background thread, and starts immediately after you open the Applications view. While the data is downloading, you may continue analyzing the data available in other sections.

Download Now

Don't Use Public Wi-Fi Without Protection. Ever.

The Internet is abuzz with news of the latest Internet vulnerability, this time in a ubiquitous place - Wi-Fi Networks. While we already knew just how insecure Wi-Fi networks were, this latest discovery is raising alarm bells for a great deal of people.



What Happened?

It was recently discovered and reported that WPA2 networks (Wi-Fi Protected Access 2 - the current industry standard that encrypts traffic on Wi-Fi networks) are vulnerable to cryptographic attack. As described by Wired, "A flaw in WPA2's cryptographic protocols could be exploited to read and steal data that would otherwise be protected... vulnerability even leaves room for an attacker to manipulate data on a Wi-Fi network, or inject new data in." This means hackers can intercept information of users on these networks including passwords, data and other sensitive details like financial information. The hacker must be within proximity of the Wi-Fi network to obtain this information, but considering the large number of WI-Fi networks worldwide there is certainly a widespread risk.

The vulnerability is being referred to specifically as KRACK (Key Reinstallation Attack), and comes as a weak point that occurs in the "four way handshake." This article provides some helpful detail on the technical specifics.



What It Means for You

Not all devices are impacted - iOS and Windows are not vulnerable because of how WPA2 is implemented - and Windows has reportedly already fixed the vulnerability. The problem here is not fixing the bug, but fixing it on a grand scale on all impacted devices. Inevitably, a great deal of them will never be patched considering the huge number of IoT items, smartphones, routers and other devices in existence. While some users have automatic updates turned on many do not, leaving users responsible for implementing fixing manually - a practice that is never consistently implemented.



What Can You Do?

Unfortunately, some typical "quick fixes" will not address the issue. Common user actions like changing your password or purchasing a new router will not remedy the situation. In this case, the manufacturers or developers are responsible for releasing patches and applying.

So aside from sit around and wait for your device maker to offer an update or patch, what can you do? Here are a few ideas:

  • Use HTTPS whenever browsing: HTTPS indicates a secured connection so even if there is issue with your WPA2 encryption this will protect you

  • Ensure you update your devices and software regularly and enable auto-updates when possible (this is a good practice in general)

  • Use a VPN! A VPN encrypts your internet connection, so even if your WPA2 connection is insecure it provides another level of protection to keep your information secure at all times



Additional Thoughts

While this discovery is certainly alarming, it is not really anything new. Public Wi-Fi networks are frequently insecure, and statistically about 1 in 4 of them area not secured. While vulnerabilities are never positive, this latest discovery only draws attention to the larger issue - the insecurity of our connections and our willingness to use these connections in general. We have always recommended people take precautions while using public Wi-Fi - whether that be using a VPN, or avoiding public networks altogether - they have always come with risks.

Find more how VyprVPN protects your privacy at http://www.goldenfrog.com/vyprvpn/windows

Download Now

Discover your family history with the MyHeritage Mobile App

With the MyHeritage mobile app, it is now easier than ever to explore and share your family history on the go. Capture and share family photos and memories right from your mobile device, invite family members to contribute to your family tree and update your tree at family get-togethers. It is vailable for iOS and Android, for smartphones and tablets.



We're happy to announce an updated version of our mobile app with many new and useful features as well as a new menu which makes the app easier to navigate. Here's a list of the significant improvements in the new version of the MyHeritage mobile app.



Easy navigation tools



We added a new menu that can be accessed from anywhere in the app making navigation throughout the app more intuitive and predictable. The new menu can be accessed by tapping on the three horizontal lines icon in the top left corner of the app. This navigation method is one of the most popular mobile navigation patterns allowing you to focus on the main screen, while having all areas of the app within quick reach.



Improved research capabilities



We recently launched new powerful research capabilities in our mobile app to find your ancestors in our collection of over 8 billion historical records. These capabilities bring the mobile app to par with the full version of the website. You are now able not just to search all collections at once, but also to search within any specific collection of historical records. You can perform a general search or search within a specific category such as Census & Voters Lists, Family Trees, Birth, Marriage & Death and more. If you want to narrow it down even further, you can search within subcategories such as U.S. Census. U.K. & Ireland Census, and Nordic Census. You are also able to search within a specific collection like the 1940 United States Federal Census or Ellis Island and other New York Passenger Lists, 1820-1957.



Advanced search capabilities



We also added the powerful ability to perform an advanced search. Tap "Advanced search" and a few additional fields will open on the search form that will improve the resolution of the search. The advanced fields are unique per selected category or collection. For example, when searching through All Collections, tapping "Advanced search" will add general fields like gender, events type and date, and relatives. Relatives is very powerful, as it allows you to search for people and their relatives, for example, to find any ancestor named John Windham whose spouse was called Wilma or whose mother's maiden name was Miller. When searching for birth records, the advanced search adds extra fields that are specific to birth records, such as full birth date. As another example, for photo records, the advanced search adds some additional fields such as photo date and media types.



Invite multiple family members via email or text message



Building your family tree and discovering your roots is more fun when you do it with the help of your family members. Therefore, we created a whole new section in the mobile app dedicated to inviting family members to your family tree. The new section is titled "Invite members" and it is very easy to use. After entering the "Invite members" section from the app's main menu, you will see a list of all of your close relatives who appear in the family tree that you can invite. Thanks to a sophisticated sync mechanism, the app matches your device's contacts with your family tree relatives. All you need to do is decide who you want to invite via text message or email and tap to invite them.


Your invited relatives will receive a text message or an email with a link that lets them join your family tree and begin contributing. Once they accept your invitation and download the MyHeritage mobile app, they will automatically be associated with the relevant family tree profile and will become a MyHeritage user who is a member of your family site. This also holds true if your relative accepts your invitation on a desktop computer (Family Tree Builder for Windows and Mac is available at http://www.myheritage.com/family-tree-builder). If they are already a MyHeritage member, once they accept your invitation, they will have access to the family tree that they were invited to, as well as their original family site.


We recommend you invite family members, whom you trust, to access and contribute to your family site using the mobile app, or via the browser on their computer. Newly invited members will be welcomed to explore the family tree and contribute by adding facts, photos, people, and help you advance your family's research.



With the MyHeritage App, you'll never miss an exciting discovery. Download it now and begin using it today. We have many more new features planned, so stay tuned!

Download Now