Torrent file sharing is one of the best thing ever to be made, it made sharing files of that are in the Gigabytes range effortless. One of the best features it has is its resume capabilities, this means should you lose internet connection for a moment or day (God forbid) it will resume on the progress it already made. I know you have the same questions that I have, if gravity stops things from falling into space but what’s stopping earth to float away, just kidding, I know the answer but how does torrent do this, traditionally you would download a file from one source/server, but torrent makes it possible you to download from multiple sources, using Peer to Peer technology (P2P).
Seeding: after you’ve finished your download to help distribute it (you distribute the file while downloading, but it’s even more helpful if you continue to distribute the full file even after you have finished downloading). Chances are that most of the data you got was from seeds, the client will continue seeding until the torrent is removed (right-click the torrent, then hit Remove). Proper practice is to seed until the ratio of upload:download is at least 1.00. Remember it’s all up to you whether you want to seed or not, but your download was made faster by someone who seeded, how about we return the favor right. And this means that when a file has no seeds, two lifetimes won’t even matter, you cannot download that file.
So, to answer the question you are not asking because you don’t want to offend anybody, Seeding does not harm your computer.
As they are referred to in torrenting terms, leechers, are those who are downloading and uploading at the same time.
Hope you found this helpful, and if you like clicking buttons click subscribe and share 🙂
Distributed Denial of Service (DDos)
It is a destructive attack make an online service unavailable by overwhelming it with traffic from multiple sources. It is generally used to target a variety of important resources, ranging from banks, newspaper websites up to personal blogs. This attack is sorely based on breaking access to online information or services between businesses and clients. Many times companies/victims bounce back by putting their servers back online but at that time the damage in costs as a result of down time has been already done.
- Low Orbit Ion Cannon (LOIC) – LOIC Download here
- R-U-Dead-Yet – Download Rudy Here
- Tor’s Hammer – Tor’s Hammer Download here
- DDOSIM—Layer 7 DDOS Simulator – Download DDOSIM here
- XOIC – Download XOIC here
- HULK (HTTP Unbearable Load King) – Download HULK here
- PyLoris – Download PyLoris
- GoldenEye HTTP Denial Of Service Tool – Download Golden eye here
- DAVOSET – Download DAVOSET here
- OWASP – Download OWASP here
- Block/Blacklist rapidly repeating IP’S
- Create multiple layers
BitLocker is a full disk encryption feature that comes free with Windows operating systems, it is designed to help protect your data in all your drives. From USB’s to local disks, and if you have partitioned your drives, the new volume drive too.
However it should be noted that I DO NOT RECOMMEND THAT YOU USE IT ON YOUR MP3 PLAYER OR ANY OTHER MUSIC ONLY PLAYING DEVICES (I tried it on my MP3 player and on my way to school I wanted to play music, it was all encrypted, I had to decrypt it first but the files were intact. So let’s get started.
- Click the start button and then search “BitLocker Drive Encryption” This is the shorter way, you can still find it if you go to control panel. Double click on it
- All you drives will show here, make sure your USB is plugged in before opening the program, now choose the drive you want to encrypt. I have chosen drive “G:”
- The next screen will prompt you to choose unlock method, for now lets choose password, and type in that password (Remember that Password Yo will use it to unlock your drive every time).
- On the next screen I would suggest you save that recovery key as a text file, and store it somewhere not on that drive. You will use it some day when you forgot your password to recover that password.
- Choose a folder to save your recover key
- This is what your recovery key looks like, but yours will be different.
- Next screen click on start Encryption, you might want to move all your files in your USB to your computer before encryption because it will lessen the encryption time, and move them back when you are done with encryption. But if you are encrypting you local disk, grab pop corns cause you will be there for a while 🙂
- After the encryption has finished, this is what you will see the next time you try accessing files on that USB. Depending on your trust issues you can check the block where it says” Automatically unlock drive on this computer” then only that computer will not require password to unlock it, other computers will have to get in line for the password.
Enjoy and don’t forget to share and subscribe
As in my previous post we will also be using IDM to download videos. First you need to download and install IDM. Here is the link Internet Download Manager
After you have installed IDM on your computer and your browser. Open your YouTube video. Go to the address bar and copy the link. Unlike the previous post, do not click on the Download this videos pop up on the corner because IDM will download low quality .flv file that is currently being displayed, sometimes these .flv files do not have audio.
After copying the link, go to your google search engine and search for keepvid, or you can type in the address in the address bar in a new tab, savefrom.net. There are a lot of these YouTube converting websites, I trust savefrom.net; keepvid.com; clipconverter.cc but choose whichever one you like.
If you are using “savefrom.net” paste your video link in the green box and click on the arrow to the far right. After your video has loaded click on the red box to view a drop down of all the available pixels available, my guess is you want high quality click on 1080p or 720p if available.