You are on page 1of 36

Revised: 8.7.2010.

The Free
Software Guide

1 of 36
Revised: 8.7.2010.
Table of Contents
Introduction ................................................................................................................................... 3
Why is free software nice? ...................................................................................................... 3
My opinion regarding Open Source/Net Neutrality and ............................................... 4
Big content/censorship ............................................................................................................. 4
Programs you need in order to acquire free software .................................................. 6
Programs that, are nice to have............................................................................................ 6
What is BitTorrent? ..................................................................................................................... 7
BitTorrent clients ......................................................................................................................... 7
P2P trackers .............................................................................................................................. 7
P2P metadata download sites ................................................................................................ 7
Expectations of a responsible torrenter ............................................................................. 8
"How Do I Speed Up My Torrent Download?" .................................................................. 8
1.) How To Speed Up Torrents with Low Seeders...................................................... 8
2.) Opening ports .................................................................................................................. 10
3.) Buy a faster connection. ............................................................................................. 10
Choosing movies ................................................................................................................... 11
The pirate city......................................................................................................................... 11
Server download ........................................................................................................................ 12
Binary Newsgroups (proprietary) ............................................................... 12
Top Usenet Providers................................................................................ 12
Free FLV Converter ................................................................................................................. 13
Youtube Downloader HD ....................................................................................................... 13
Server Sync ................................................................................................................................. 13
Dropbox (Sync/Share Files Easily) ................................................................................. 13
Plunder: file hosting and download................................................................................ 15
Computer Safety Tips .............................................................................................................. 16
Antivirus ........................................................................................................................................ 17
Video Help .................................................................................................................................... 18
Sneakernet: File sharing over local storage medium ................................................. 18
DVD backups ............................................................................................................................... 19
Unblocking websites ................................................................................................................. 21
Keys & serials ............................................................................................................................. 23
Covering your Arse ................................................................................................................... 23
Different needs for Anonymity and Deniability ............................................. 23
Deniability ................................................................................................................................ 24
Anonymous addressing ....................................................................................................... 24
Firewalled LAN network ............................................................................ 25
Be As Anonymous and Private As Possible Online ......................................... 25
Safe Sneakernetting ................................................................................. 26
Questions? ................................................................................................................................... 27
Posting Questions .................................................................................... 27
Personal assistants ................................................................................... 27
Links ............................................................................................................................................... 27
Glossary ........................................................................................................................................ 28
Authentication ......................................................................................... 34
File-sharing guides and e-books ......................................................................................... 36
2 of 36
Revised: 8.7.2010.

Disclaimer: This is for educational purposes only. This is not an endorsement for
ILLEGAL FILE SHARING. I do not support, condone, or take responsibility for the
illegal downloading of copyrighted material without the consent of the original
copyright holders. Now, have fun and explore the legal side of file sharing!

Introduction
I have made this guide because in my experience you get more out of software when you
know how to use it.

I am a Windows user, and so by default this guide will apply to Windows.

You may be able to get a newer version of the guide here: www.scribd.com
If you have a printed version of the guide you might want to get the PDF version so you can
click the links like it was intended in stet of having to type in the URL.

This guide is Open source. You can freely copy, distribute and develop it. So if you have a PDF
version you can get a word .doc version by sending an e-mail to privateinfringer@gmail.com
If you would like to contribute a question (and presumably the answer as well), please send
me a e-mail and by all means contribute.

As an IT-supporter I hear a lot of stories of woe from PC-users. One


that struck me particularly was the story of a first time software
Salesman
shopper. He was going to buy an antivirus for his PC since His PC was
of critical importance for his studies.

At the store a friendly looking salesman greeted Him. And convinced


him to buy the most expensive antivirus on sale (Norton) for 549 kr.
Which was quite expensive for him being a student of few means. He
went home and installed it. And for 30 days it worked fine and then it
stopped working. He went back to the store and asked why the
antivirus had stopped working? The salesman said with a smile it’s an
expensive but good antivirus that only lasts for 30 days you have to
buy a new one. And pointed at the shelf with antivirus products. “Just trying to make
money”
He then came to me because he couldn't believe that he got 30 days
for 549 kr. I explained to him that the trial period was 30 days and typed in the serial from
the CD-cover. The antivirus updated and worked. He hadn’t read the license agreement which
was for ½ a year.

Was he upset?
Well he was happy that his antivirus worked.
But he was furious over the salesman attempting to swindle him!

Why is free software nice?

GNU General Public License


At: http://www.gnu.org/licenses/gpl.html

3 of 36
Revised: 8.7.2010.

In the world of software there


are different levels of license
freedom and limitations.

Freedom Limitation
Open source > freeware > abandonware 0 shareware/trialware > commercial software
Social Capitalist

My opinion regarding Open Source/Net Neutrality and


Big content/censorship
1. It’s my opinion that all software should be Open source and financed by private
(companies) and public (government) wealth. Not by individuals of few means.

2. I'm against long copyright terms and


the way Big Content wants to further
take away your rights as a consumer. I
figure 1-20 years for most mass
produced works should be enough to
provide a significant enough profit
motivation and compensation for
people to create new
music/software/content. See:
http://blogs.telegraph.co.uk/technology/shanerich
mond/100005044/copyright-is-300-how-long-
before-copyright-terms-reach-300-years

3. Copyright is unenforceable in a digital


world. Period. Exclamation point. At no
time in history has any individual,
company, or industry been able to stop
file-sharing. No country or law has
been able to stop it. No technology has
been able to stop it. Which brings us
to...

4. People want to share files. There is this


much file sharing going on for a
reason. It's what people want. Fighting
piracy is fighting human nature. This is
a battle no one can win. Getting your
undies in a bunch at the thought of
someone copying your e-book is a
waste of a good ulcer. Worry about some problem that eventually will be solved. Like
world hunger. Or cancer. Or war. Those will be conquered before file sharing is.

4 of 36
Revised: 8.7.2010.

5. There is ZERO reliable evidence that file-sharing hurts sales. A shared file does not
equal a lost sale, any more than someone reading a library book is a lost sale.

6. The more people who know who you are the better. File sharing certainly helps spread
brand awareness and name recognition, and it does so without any effort on your part.
http://jakonrath.blogspot.com/2010/05/piracy-again.html

7. I'm against DRM and the elimination of the first sale doctrine.

8. I'm pro "Fair-Use": recording TV is legal because of old Fair-Use (17 USC 107)
precedents.

9. I'm against content producers releasing a product on one zone first and on a different
zone weeks after. I'm against DVD regions.

10. I'm against Amazon, Hulu, iTunes and even Steam refusing to take Mexican people’s
money for products they want because they have a Mexican IP address.

11. I'm against Big Content wanting the tax payer to pay for their crusade. Graduate
response laws are bullshit. The public need is to not have a critical utility cut off
because a large dying industry is lashing out violently, trying to hit anyone it can,
deluded that each successful hit prevents its slide into oblivion. (See every effort
worldwide to implement a three strikes/graduated response law to disconnect people
accused of copyright infringing from the internet.)

12. I believe in paying for my programs, movies, music and books through taxes.
There is also a need to compensate the copyright holder for their work. Let's
not forget that.

13. I don't believe Big Content should care about what I do with a DVD once I have it in
my house.

14. I believe the existence of Open source is of more benefit for the community than
having Big Content further trample on our rights and liberties and wanting to preserve
their obsolete business model through legislation.

15. There is a fundamental difference between a tangible and an intangible economy. The
first one is an economy of scarcity, the second one an economy of abundance. Sharing
a tangible good means divide it. Sharing an intangible good means multiply it.
Therefore, the economic laws which govern the sales of pizza are totally different from
the one which govern sales of a music file. In order to have a strong economy it is
necessary to remove bottlenecks. See:
http://emoglen.law.columbia.edu/publications/maine-speech.html

16. From Big Content’s perspective even putting a CD in a player should be a crime. I
mean, you're taking data on the disc and putting it right into the air, where anyone
can listen.

Sharing miens Caring.


Keep free software flowing!
5 of 36
Revised: 8.7.2010.

Programs you need in order to acquire free software


If you don’t have these programs, get them from www.download.com
1. Antivirus. See page 16.
ESET NOD32 is good (Norton- and AVG antivirus stink in comparisons. all Norton
programs really lag your computer)

2. A BitTorrent client. See page 7.

3. WinRAR 3.80 or BitZipper 5.1


4. SMAC MAC Address Changer 2.0.5 or newer

5. Nero Burning Rom or ImgBurn 2.5.1

6. VLC Media Player


Plays 99% of all file types so you don’t have to worry about codec packs

7. Daemon Tools Lite 4 or Alcohol 120% .


Alcohol 120% is for XP not Vista.

Programs that, are nice to have


1. AdAware
AdAware Is an antispyware that comes highly recommended!
Control your privacy Erase tracks left behind while surfing the Web.

2. DVDShrink or AoA DVD Ripper v5.1.9 or newer


AoA DVD Ripper http://www.aoamedia.com/dvd_ripper.htm
DVDShrink http://www.afterdawn.com/guides/archive/how_to_copy_dvd_with_dvd_shrink.cfm

3. Free FLV Converter 6.7.8 See page 13

4. Dropbox See page 13


5. Privacy Guardian 4.1.0.37
6. The Blocklist Manager
7. Firefox Internet Browser

CNET
Security, privacy, and control
We test all software products submitted to us against a
comprehensive set of criteria. In addition to screening for
common viruses and spyware, we also look for other
threats that might interfere with our users' security,
privacy, and control. We consider publisher Web sites,
publisher conduct, and our own experience with a
particular product.
http://reviews.cnet.com/1991-13403_7-6722448-1.html
http://www.download.com/
Download.com is a safe and legitimate software download site where you can download programs
without the risk of getting a virus, In contrast to P2P downloading. Download.com works well
together with: http://serials.ws/ if you have found a program you want that requires a serial.

6 of 36
Revised: 8.7.2010.
What is BitTorrent?
BitTorrent is a peer-to-peer file sharing protocol used to distribute large amounts of data. The initial
distributor of the complete file or collection acts as the first seed. Each peer who downloads the data also
uploads them to other peers.
Seeders are people who have downloaded a torrent-file and are still letting it be up loaded from
there computer and leachers are people now downloading it so you look for a torrent with
high seeds and low leachers.

BitTorrent clients
To download with P2P you need to have a BitTorrent client installed on your Pc. A BitTorrent
client is a piece of software that acts as the vehicle between your computer and the
BitTorrent network. You can download a client from www.download.com. A few examples of
BitTorrent clients are:
• µTorrent is an Open source program that is compact but with lots of
features - a good place to start.
• Azureus - now called Vuze is more complex, requires Java, lots of
features. Very nice if you run multiple torrents on a newer computer -
might not work well on older computers.

The following BitTorrent clients act as spyware: Kazaa, (DEFUNCT: eDonkey), (DEFUNCT: Grokster),
(DEFUNCT: AudioGalaxy), LimeWire, SongSpy, iMesh, eMule, BearShare, TrustyFiles.
http://en.wikipedia.org/wiki/Comparison_of_file_sharing_applications
Best advice I can give you is to stay the hell away from spyware or adware related programs.
All downloads with eMule are assisted and registered by centralized servers. If a server is
seized by the police you can be located.
Using decentralized Bittorrent clients like µTorrent they can’t find you so easily because you
are always in a little user group. You aren’t using official and big servers. It works especially
well if you go trackerless. See page 11.

P2P trackers
The tracker is a server which assists in the communication between peers using the BitTorrent
protocol. It is also, in the absence of extensions to the original protocol, the only major critical
point, as clients are required to communicate with the tracker to initiate downloads. Clients
that have already begun downloading also communicate with the tracker periodically to
negotiate with newer peers. After the initial reception of peer data, peer communication can
continue without a tracker.

P2P metadata download sites


BitTorrent sites like The Pirate Bay (TPB) are sites the original file like a MP3 is uploaded to.
You can then download the metadata that is a smaller file between 14-250 KB from the site to
your computer. Your BitTorrent client should then pick up the metadata right away and start
the download of the MP3 or whatever you’re trying to download.
A few examples of P2P metadata download sites are:

http://btjunkie.org www.torrenthound.com
http://thepiratebay.org http://www.seedpeer.com
http://isohunt.com http://scrapetorrent.com
http://openbittorrent.com http://www.torrentz.com/
(www.demonoid.com private tracker) http://www.torrentreactor.net/

You might need to unblock DNS to get in to one or more of these homepages. See page 21.
Private trackers are known for their high speed downloads and are considered to be “safer”

7 of 36
Revised: 8.7.2010.

than public trackers in terms of not having viruses as well as having better privacy.
Be careful, there are also a lot of sites out there that are NOT reputable. That means files could
contain viruses or other malicious content. Be sure to read the comments usually provided with
the torrents to check if anyone encountered problems with it.
P2P is good for downloading video, music pictures and text files. Not programs you can
download 100% virus free from www.download.com. And if you want music videos download
them with Free FLV Converter: see page 13.

Expectations of a responsible torrenter


The problem with most P2P networks is that many people just don't like to share.
They open up their program, download their files, and then close the program before
they can help anyone else. It's called leeching.
EVERY BitTorrent user should always seed files 100%. That means if a file you
downloaded was 700Mb, you shouldn’t stop letting people upload from you until you
have uploaded 700Mb.
If you are the last seed, don't leave the others hanging! The only way files have a
good lifespan is if people do their part for the community. Think of other people
before stopping the torrent.
As a backup plan, BitTorrent built in the other half of trading you probably learned as
a kid: tit-for-tat. That is, if you give me one piece, I'll give you one piece back.
BitTorrent will give you a few pieces of the file for free to help you get started, but
after that you need to start giving some pieces back if you want to keep
downloading. If you don't share, eventually everyone else will stop talking to you.
Just like when you were a kid with your toys on the playground. In fact, BitTorrent
goes one step further and actually starts to favor the people who share the most.
This means that the more you upload, the faster you'll download.
Because people that don’t upload 100% “leechers” have a detrimental effect on
swarms, some people resort to vigilante tactics and block connections to leechers.

Because of the very nature of BitTorrent, speeds are not guaranteed for any given
torrent swarm. While you may get great speeds in one swarm, you might not in
another. This is due to the fact that BitTorrent is a P2P protocol, so it depends on the
upload speeds of the other peers you are connected to to generate your download
speeds. A common misconception held by many people is that torrent swarms that
contain more seeds and peers are faster than those with less. This is not always the
case. There can be a swarm with only a few seeds and/or peers on fast Internet
connections, and you'll be able to get great speeds from them, while a swarm with
many more seeds and/or peers might contain mostly people with slow, dial-up
Internet connections, will get you terrible speeds from them. In the same vein,
connecting to more seeds and/or peers does not equate to greater speeds, and
seeds don't necessarily give better speeds than normal peers.

"How Do I Speed Up My Torrent Download?"


1.) How To Speed Up Torrents with Low Seeders
Here’s a ridiculously easy tip to squeeze out as many users as you can on a dead
or dying torrent. It’s particularly handy when a torrent stops near the end, and/or
the seed count is listed as zero. Having said that, I’ve also noticed that it helps to
increase download speeds from healthy torrents, as well.

8 of 36
Revised: 8.7.2010.

NOTE: Do not attempt this trick with private torrents - it’ll only get you banned
from the tracker. Use this tip with torrents you find at isohunt, thepiratebay, etc.
How it works: Simple. Just copy/paste this list of public trackers into your torrent’s
tracker list.
http://www.torrent-downloads.to:2710/announce
http://www.sumotracker.com/announce
http://open.tracker.thepiratebay.org/announce
http://inferno.demonoid.com:3400/announce
http://tracker.publicbt.com:80/announce
udp://tracker.publicbt.com:80/announce
http://tracker.openbittorrent.com:80/announce
udp://tracker.openbittorrent.com:80/announce
http://tracker2.istole.it:60500/announce
http://inferno.demonoid.com:3407/announce
http://vip.tracker.thepiratebay.org/announce
http://track.sextorrent.to:2710/announce
http://tracker.deluxebits.to:3552/announce
http://tracker.thepiratebay.org/announce
http://tracker.torrentbox.com:2710/announce
http://tracker.hexagon.cc:2710/announce
http://tracker.torrent.to:2710/announce
http://axxo.sladinki007.net:6500/announce
http://220.162.244.175:53880/announce
http://tpb.tracker.prq.to/announce
http://open.tracker.thepiratebay.org/announce
http://eztv.sladinki007.net:60500/announce
http://tv.tracker.prq.to/announce
http://218.145.160.136:8080/announce
http://tracker.prq.to/announce
http://tracker.torrenty.org:6969/announce
http://tpb.tracker.thepiratebay.org/announce
http://t.ppnow.net:2710/announce
http://www.torrentvideos.com:6969/announce
http://tracker.bitebbs.com:6969/announce
http://www.torrent-downloads.to:2710/announce
http://eztv.sladinki007.eu:60500/announce
http://www.ipmart-forum.com:2710/announce
http://tracker.ydy.com:83/announce
http://bt1.the9.com:6969/announce
http://tracker.sladinki007.net:6500/announce
http://tracker.ydy.com:102/announce
http://tracker.paradise-tracker.com:12000/announce
http://moviesb4time.biz/announce.php
http://tracker.deadfrog.us:42426/announce
http://mpggalaxy.mine.nu:6969/announce
http://www.sumotracker.org/announce

Applying the trackers to uTorrent:


In particular, this is a ‘µTorrent-compatible’ list, so
that’s where I’ll show the example.
Open µTorrent, and right-click on the suspiciously-slow
torrent. Select "Properties…".

In the first window


box, the "General"
tab should be open,
and there should
already be a list of
existing trackers (or
perhaps just one).
‘Copy’ the list from
above, and ‘paste’
them into the
window.

You should now be


left with what looks like this. Be sure to click "OK" to save
the changes.

9 of 36
Revised: 8.7.2010.

While you’re at it, make sure that “Enable DHT” and “Peer Exchange” have checks in them,
too. Now, if there are ANY public users on that torrent, you’ll be sure to find them.

2.) Opening ports


Increase download speeds by opening TCP port 6881; the "dedicated lane" for torrent file
downloads.
If you are a Bit Torrent downloader, you know what slow download speeds are like...frustrating
and annoying, to say the least. Instead of getting your music or movie within a couple of hours,
your software predicts it will take 2 to 4 days.

Now, while many of the speed factors involved are out of your control, there is at least one
thing you can do at your receiving end to improve this speed. It is called "Port Forwarding", or
"opening your specific TCP ports". This is how it works.

That blue or green network cable coming out of your computer/modem/router is


actually a busy highway comprised of 65,536 tiny electronic lanes (yes, over sixty-five
thousand little lanes for your electrons). Each lane is called a "port", and each port is designed
to allow only specific types of information through. Many ports are assigned in a semi-
standardized way.

Here are some example port assignments:

• HTML pages: port 80


• FTP file transferring: port 21
• World of Warcraft: port 3724
• POP3 email: port 110
• MSN Messenger: port 6901 and ports 6891-6900
• Bit Torrents: port 6881

Bit torrents, by default, first look for port 6881 to enter/exit your computer. If port
6881 is closed for whatever reason, torrents then go to port 6882, then 6883, and so on, until it
eventually tries port 6999 before giving up.

Every ISP, and every home router, can optionally block any of these ports with the
intention of preventing hackers and controlling the network.

If you tell your own personal router and firewall at home to open (aka "forward") port
6881 and port 6882, then your bit torrents will find their way into your computer that much
faster. Sometimes up to 5x faster.

Yes, opening ports does increase the possibility of getting hacked by unwanted bad guys, but
there are means to reduce that threat while still getting fast torrent download speeds.

3.) Buy a faster connection.


Broadband is expensive, faster broadband is more expensive. Your connection can only be as
fast as your account, so especially if you use DSL, buy a faster pipe.

10 of 36
Revised: 8.7.2010.

How to Avoid Spies on BitTorrent

Most anti-piracy outfits and other organizations that track BitTorrent users rely on information
they obtain from BitTorrent trackers.
This is an easy and convenient technique
to gather info, but also one that can be
circumvented.
Let’s assume you want to download
‘Steal This Film’ without being spied on
by third parties that monitor the
download. Impossible? Not really…
Pretty much all BitTorrent clients allow
users to remove the trackers from a
torrent before downloading. In uTorrent
you can do so by clicking the advanced
button in the torrent opening dialog box.
You’ll then see the trackers included in
the torrent plus some other info.

Trackerless
If you want to go trackerless you’ll have
to delete the trackers and make sure
that the DHT, Peer Exchange and Local
Peer Discovery boxes (see screenshot)
are checked otherwise you you won’t be
able to download at all.

That’s it…
I have to note that it’s by no means
impossible to track people who download
without a tracker. It’s just harder to do
so and thus far we haven’t seen evidence
that DHT tracking is being used.

Choosing movies
The pirate city Streaming video
Full Streaming Movies to help you choose
http://filesharefreak.com/2008/02/25/the-best-online-streaming-movie-sites-on-the-net
or here:
http://blog.buttermouth.com/2007/06/top-25-places-to-watch-free-movies-and.html

The Internet Movie Database: (IMDB)


Movie revues to help you choose: http://www.imdb.com/

Subbiee is a great crawler searching 22 subtitle servers.


www.subbiee.com
Cdcovers.cc
World's Largest CD Covers and DVD Covers Album Art Archive
http://www.cdcovers.cc/covers

11 of 36
Revised: 8.7.2010.

Server download
Binary Newsgroups (proprietary)
Using the newsgroups for file sharing has become easier than ever thanks to new newsreaders.

UseNext
UseNeXT software gives you especially easy access to and a good overview of the data in the
Usenet, enabling you to find precisely the data you are
looking for and download it at high speed.
Free Download Mode: Download as much as you
want, up to 1,000 kbps (about 150GB in 2 weeks).

Since you are downloading directly from their server,


there are no "cracked" versions! (Unless someone can
share their paid account with you.)

You are limited to 5000MB full speed download at


50Mbit/s in the trial. You are only allowed to use their own proprietary client (newsreader).

UseNeXT is anonymous and ad-free access to over 200 terabytes worth of MP3s, videos, games,
pictures, and software. UseNeXT users never need to upload
anything and with direct access to the high-speed Usenet servers Trial cancellation:
you'll be able to search for and download files faster. The tailor
If you would like to cancel the
made browser automatically unpacks and repairs failed downloads, UseNeXT trial simply do so
and the built in media player allows you to preview play files before within the 14 day free trial
downloading even when archived. period.

To get the free trial offer enter your e-mail when starting UseNeXT 1. Log into the member area
for the first time and you will get your access information for the 2. Click on "Cancellation"
free trial immediately. But you however have to sign an online 3. Follow instructions to confirm
contract first, where you have to register your credit card or cancellation.
PayPal.

http://downloadnext.wordpress.com/2009/05/14/usenext-tutorial/

Top Usenet Providers Newsgroup Selection Criteria


• Binary retention rate
• 1. UseNeXT • Completion rate
• 2. Usenet.net • Download speed
• 3. Newzbin • Anonymous downloading and posting
• Uncensored newsgroups
• Secure (SSL or SSH available)
• Alternate ports
• Free Usenet Trial
• Free or discounted newsreaders
• Special Offers

http://www.usenet-newsgroup.net/
Newsgroup downloads are in large proprietary in comparison to P2P download and
require grate skill to handle with optimal results. But have a much faster download
speed.

12 of 36
Revised: 8.7.2010.

Free FLV Converter 6.7.8


Publisher's description of Free FLV Converter
Get your favorite online videos easier than ever with this free software. You will be able to
search videos without opening your browser and watch them using the built-in video player.
This freeware can convert FLV files to AVI, iPod (MPEG4 or H.264), iPhone, 3GP, PSP, or MP3
audio only. Supported Web sites: YouTube, DailyMotion, Google Videos, Metacafe, Spike, iFilm,
Veoh, Yahoo, Crackle, Broadcaster, ZippyVideos, MySpace, Revver, LiveLeak, EyeSpot,
CollegeHumor, SevenLoad, Break, CrunchyRoll, Blip.tv, lulu.tv, archive.org, TinyPic,
EbaumsWorld, Uncut AOL, Guba, Youku, Tudou, Reuters, BBC News, vh1. This software can also
convert all your videos (DivX, XviD, MpeG, DVD, AVI) to FLV video (Flash video) with an
automatic HTML page creation.
Editor's review of Free FLV Converter
Lightweight and effective, this program is a great way to convert video files from Flash formats
into something useful beyond Web pages. Specializing in formats meant for portable devices,
Free FLV Converter also supports AVI and can download embedded SWF or FLV vids directly
from the Internet when you punch in the URL.
The app can also perform local searches for vids as well as convert to FLV. Hitting either
conversion tab will automatically open a file browser so you can choose your victim. From there,
a conversion window opens up, and you can change the basics such as settings, including
output format, quality, and destination directory, as well as more advanced options like the
codec, aspect ratio, and the frame rate. Tap convert at the bottom of the window when you're
ready, and the Free FLV Converter works smoothly and without interfering with other programs.
Free FLV Converter does have one annoyance: When you install it, be sure to opt out of the
Dealio toolbar. It's no more than a minor drawback, though, and doesn't cause problems later
on. Seeing as how the app ran smoothly in the background, it's definitely a must-use piece of
freeware.

Youtube Downloader HD
Download your favorite music videos and video clips from http://www.youtube.com/ before
there removed from the homepage. Sometimes the video contains an audio track that has not
been authorized by WMG. And then just the audio is disabled from the video. And what’s the
point of having the video up if there's no sound? Bring back the music!
Get Youtube Downloader HD here: http://www.youtubedownloaderhd.com/download.html

Server Sync
Dropbox (Sync/Share Files Easily)
After installing Dropbox, there is a folder placed in your My
Documents named “My Dropbox”. To sum the service up in 1
sentence: any files placed into this folder will both be uploaded to the
Dropbox servers, and will be synchronized with any other clients in
your account.

Dropbox is an excellent service that allows you to sync and share files
with extreme ease. Dropbox offers 2GB of free storage space upon
signing up, which can be bumped up to a total of 5GB of free space
depending on how many other people you invite (and that actually sign up and install the
software). The Dropbox software works on both Windows and Mac and they even have an
iPhone app that will allow you to access your files on the go.

13 of 36
Revised: 8.7.2010.

How do I link to files in my Dropbox?

Dropbox designates a unique internet link


to each file in your Dropbox Public folder.
You can send these links to anyone by
pasting them into your emails, instant
messages, web pages… Any method you
like.

First, you'll have to make the file available


to anyone by moving the file you want to
share to the Public folder located in your
Dropbox. Now that you’ve copied a link to
your file to your computer’s clipboard, you
can paste it wherever you want as many
times as you like! Links are re-usable as
long as you haven’t moved or renamed
your file since you copied the link.

Another nice feature of Dropbox is that you


can easily share files with other Dropbox
users by simply inviting them to a specific
folder in your Dropbox. This is great if you are working on a group project and need to allow
multiple people to access specific files at once. Additionally, Dropbox will notify you in realtime
when someone makes a creates, deletes, or modifies a file so you always know what’s going
on. The Dropbox web-based control panel will also allow you to track recent activity in your
Dropbox and even details the exact files created, deleted, or modified.

The web-based control panel is also another way you can access your files. It provides the same
functionality as the application does on your desktop. Overall, Dropbox is a solid service which I
highly recommend you check out.
Dropbox in the same account.
Installing Dropbox is easy and after the installation, there is nothing to manage. Files placed
into this folder are sent to the Dropbox servers in a secure manner, and once they are there
they are encrypted. Dropbox currently uses Amazon S3 storage system “in the cloud” for their
data storage.

This creates a nice way to send files to and fro – my old method was either a) email to myself
or b) put them on my USB keychain. Although those old methods work, Dropbox makes the
process of transferring files to and from work absolutely effortless.

So, in a single computer situation, this Dropbox folder is effectively a backup solution. If you
have more than one PC in the account, any files placed into this folder on one computer will
automatically be synchronized onto all others running

14 of 36
Revised: 8.7.2010.

Plunder: file hosting and download


Plunder.com is a remote file hosting service, and a very easy to use one too, as
you don’t even have to register to use it.

Here’s how it works: select the file you want to share and press the upload
button, and that’s it: you’ll get
a direct link to the page from
where you can download it.
There’s a gazillion sites offering
this, and Plunder’s difference is
that it will allow users to
preview it online and only then
choose whether to download it
or not, plus you can email the
link directly from the site to up
to five e-mail addresses without
waiting long, blocking your local
e-mail server, or leaving traces.
You can also set the page to be
public or private, and add a little message (up to 500 characters). Even better,
you’ll get the HTML code for your file, just in case you want to embed it in your
site and a forum code as well. Plunder supports most regularly used text, media
and image formats, and also zips and exes, with up to 30 MB for unregistered
users, who can expand storage space by signing up to the site, also for free.

Coins
You earn one Piece of Eight when somebody downloads one of the files in your
profile. Once you have 8 Piece of Eight coins you earn a Doubloon .
Values
= 1 download
=8

Doubloons will be used to purchase items from our online shop.

How is my rank calculated?


Rank is calculated by the total coins you have earnt including any you have
spent.

How much space can I use?


There are no space limits. However, in order to preserve disk space we may
delete files that have not been accessed for over 1 month. If you are a
registered user this only applies if you are over your current disk space
allowance. Your disk space allowance can be increased from the shop.

15 of 36
Revised: 8.7.2010.

Computer Safety Tips


1. Make sure that all anti-malware definitions in your antispyware- and antivirus program are
always up-to-date. Most antivirus software can be configured to do this automatically.
2. Have Windows and your application programs fully updated.
3. Always have a recent full backup of your system.
4.
Password-protected files
Have you downloaded a password-protected file? If a file is password-protected it almost always
means that it’s a virus. Delete the password-protected file right away.

Making backups
Backup important files on a regular basis and store the backups in a safe place. (Preferably off
site.) You can backup files by saving copies to a network shared drive or save smaller files by
sending them to your Gmail account. Unfortunately, it's not a matter of "if" you'll lose files one
way or another; it's a matter of "when".

Other popular ways to backup files include connecting an external hard disk to your computer
(so if your computer dies, you can just plug the external hard drive into another computer and
transfer all of your files), storing files on a CD or DVD, or capturing your files, operating system,
and operating system settings as a disc image file. By backing up your entire hard disk to a disc
image file, you can restore your entire computer, operating system settings, files, and
programs, to a new hard disk within minutes. Some popular programs that can save your hard
disk as a disc image include Norton Ghost (http://www. symantec.com) and SecurePC
(http://www.farstone.com).

Use caution when opening email attachments


Email attachments are a common tool for attackers because forwarding email is so simple.
Users often open attachments that appear to come from someone they know or an organization
they do business with. Almost any type of file can be attached to an email message, so
attackers have more freedom with the types of viruses they can send. If your email program
includes an option to automatically download email attachments, DON'T take it. Doing so could
immediately expose your computer to any viruses included in the email attachments.

Take control of your email.


Avoid opening email attachments received unexpectedly - no matter who appears to have sent it.
Remember that most worms and trojan-laden spam try to spoof the sender's name. And make sure your
email client isn't leaving you open to infection. Reading email in plain text offers important security
benefits that more than offset the loss of pretty colored fonts.

Keep abreast of Internet scams.


Criminals think of clever ways to separate you from your hard earned cash. Don't get fooled by emails
telling sad stories, or making unsolicited job offers, or promising lotto winnings. Likewise, beware of email
masquerading as a security concern from your bank or other eCommerce site.

Don't fall victim to virus hoaxes.


Dire sounding email spreading FUD about non-existent threats serve only to spread needless alarm and
may even cause you to delete perfectly legitimate files in response.

Using separate computers


The safest way to protect your data is to use two separate computers: one for your ordinary,
everyday activities, such as tracking your finances and writing letters, and a second one to
download files from file sharing networks. Whenever you download a new file, check it for
viruses or Trojan horses on your second computer, and if the file appears safe, then copy it to
your main computer. If a virus or tenacious spyware/adware program causes problems, just
wipe clean the hard disk on your downloading computer, reinstall your operating system, and
start from scratch. Almost any computer of recent vintage will do you can probably pick up a
suitable Pentium III or similar system for a few hundred dollars or less.

16 of 36
Revised: 8.7.2010.

Using Removable hard disks


Not everyone has the space or money to afford a second computer, even if they buy a used one. As
another alternative, install removable hard disks in your computer. Removable hard disks are nothing
more than trays that slide in and out of your computer, and inside each tray is an ordinary hard disk. That
way you can have one removable hard disk holding your important data, and a second removable hard
disk that contains all the files you download from the Internet. And if you've got a removable hard disk,
you can just yank it out and hide it if the police start banging on your door.

Antivirus
ESET NOD32 Antivirus
If your user/pass has been blacklisted and your NOD32 Antivirus as a result can’t update then please
take serials for NOD32 products using this homepage http://serials.ws/
You might need to unblock DNS to get in to the homepage. See page 12.
ESET NOD32 Antivirus 4
This product delivers the best proactive protection against increasingly
sophisticated threats and is known for being fast and unnoticeable. The
software uses a powerful combination of advanced heuristic technologies and
automatic updates of malware signature databases, detecting and eliminating a
rapidly growing number of unknown threats. Its proactive capabilities protect
your computer and data even against never before seen malicious code.

Avast! Antivirus is a good product because they serials are almost never blacklisted.
ALWIL Software offers a special discount program for all avast! Antivirus
products for non-profit and charity institutions. Please take serials for avast
products using this homepage http://serials.ws/
avast! antivirus software represents complete virus protection, offering full
desktop security including a resident shield. Daily automatic updates ensure
continuous data protection against all types of malware and spyware. avast!
Antivirus is certified by both ICSA Labs and West Coast Labs.

Kaspersky Antivirus is the best antivirus but it is difficult to get or keep the
license-key/crack for it. Therefore Kaspersky is not supported by this guide.
Stay away from the hugely commercial products like MacAfee and Norton. Go with something
light weight and browse smart, always. With regular anti-virus scans you'll be fine.
Scratch Norton firewall off the list, it gave me allot of trouble when I wanted to torrent.

2009 AntiVirus Software Product Comparisons


To help you select your antivirus
http://anti-virus-software-review.toptenreviews.com/

Stopping a Trojan horse


A Trojan horse masquerades as one program but really contains a secret payload. Sometimes
this secret payload can be a message, a silly picture, or more commonly, a hidden program
known as a remote access Trojan (RAT).
Once a RAT sneaks onto your computer, it can open a port and allow someone anywhere in the
world to access your computer and control it. While many antivirus programs can detect and
remove Trojan horses, you might want to use a dedicated anti-Trojan horse program in addition
to any antivirus programs you may be using.

Ad-Aware Free - Anniversary Edition


Control your privacy Erase tracks left behind while surfing the Web - Ad-Aware
deletes keyloggers, spyware and tracking cookies.
17 of 36
Revised: 8.7.2010.

Video Help
There are a number of reasons why a movie won't play:

1) There is audio but no picture. You are not using the right video codec. Get the latest from
www.free-codecs.com
2) There is picture but no audio. You are not using the correct audio codec. Get the latest from
www.free-codecs.com
3) File won't play. You are possibly using a bad media player. Download the best multi-platform
media player at www.videolan.org
4) For some reason your computer won’t play a particular codec. Convert the file using the free
Super Converter from www.erightsoft.com/SUPER.html
5) You get two audio tracks at the same time, or you hear a foreign soundtrack when you want
to hear English. Select the correct audio channel. This is easier when using VLC. It is not
easy to get it to work on WMP.
6) Video refuses to play with funny errors. This is possibly because the filename and path is too
long. Rename the file to something simpler, or move the file into a simpler directory e.g.
c:\movies
7) All SiRiUs sHaRe movies have been tested on two or more machines. If you have followed
the above steps and still have problems, find an IT genius who can assist you further.

Sneakernet: File sharing over local storage medium


Do you have a friend with files that you want? You won’t know till you ask.
There are four main storage mediums that are good in a sneakernet: CD, DVD, USB Flash
Drives and external hard disks.
One of the easiest and most common ways for people to increase their music collections is also the most
anonymous: borrow a CD from a friend and copy it on your computer. Because most computers come with
CD burners, and nearly every office−supply store sells blank CDs, empty CD cases, and precut blank CD
cover labels, all you need to do is use a popular CD burner such as Easy Media Creator
(http://www.roxio.com) or Nero (http://www.nero.com). Making a copy of a CD has never been easier. Of
course, no matter how many friends you may have, you probably don't have access to all the CDs you
want to copy. Many people turn to another music source: the public library. Besides offering books and
magazines, many libraries also offer records, CDs, and videotapes. For example, the Phoenix Public
Library's online card catalog (http://www.phoenixpubliclibrary.org) lists several thousand CDs available for
checkout, including some of the latest music, such as Outkast's 2004 Grammy winner,
Speakerboxxx/ The Love Below

The libraries in most large cities allow you to check out popular music CDs.
Most libraries in large cities allow CDs to be reserved online, or to be shipped from one branch to
another, effectively letting users borrow any CD from any library in the city. Today's libraries not
only carry classics of jazz, opera, and classical music, but are surprisingly well stocked with popular music,
as well. Of course, borrowing and copying CDs does take time and patience. Many libraries don't acquire a
CD until it's several months old, and sometimes you have to wait until someone else returns the CD you
want. Despite these obstacles, borrowing from libraries is one of the most anonymous and
risk−safe ways for people to increase their CD collections.

In Denmark at least the local library will often be the place where you can find the greatest
amount of music on old CD’s without copy protection schemes, such as SafeDisc and
SecuROM. You can borrow a DVD or CD for free, go home and make a copy for yourself if
you want to. And the local university campus will often be a good place to get to know
people so as to start your sneakernet.

When mailing by post a sufficiently large hard drive or a spindle of DVDs, the throughput
(amount of data per unit time) may compete favorably with other methods of data transfer. It is always
faster to transfer files over USB den over the internet. USB’s data transfer rate is 480 Mbit/s. And your
friends might have software you want that hasn’t been available on the internet in a long time.

18 of 36
Revised: 8.7.2010.

Never underestimate the bandwidth of a station wagon full of DVD’s hurtling down the highway.
Fun, fast and free!

DVD backups
Want to make backups of all your DVD movies with 100% free software? You can!
Take the 5-step
All you need is a Windows machine, lots of free gigabytes, a DVD writer and lots of time.
This software may be old, but it's free, it works on any XP+DVD machine and is an (so far)
unbeatable combination!

Step 1: The ripping process.


To rip a DVD download and install RipIt4Me 1.7.1.0 and DVD Decrypter 3.5.4.0.
Follow the built-in instructions and proceed ripping the DVD.
(Time: about half an hour*)
This will work with even the latest DVD movies if you follow the instructions carefully!

Step 2: The shrinking process.


To reduce the output of step 1 to an acceptable size (4.5 Gigs DVD writable) you use
DVDShrink.
(Time: about two hours*)
If DVDShrink failed to recompress the DVD to an acceptable size (usually huge DTS tracks),
then just process it despite the warning.
Then do another DVD Shrink over the processed files!

Step 3: Writing the backup


Use BurnAware Free Edition to write the ouput of step 2.
(Time: about half an hour*)

Step 4: Divx/xVid.
Need Xvid avi instead of DVD format? Use the output of step 2 with AutoGK.
(Time : about three hours*)

Step 5: Portable players.


Need to play your movies on your favourite portable MP4 player? Use the output of step 4 with
MediaCoder.
(Time: about half an hour*)
*: Time duration depends on hardware and the used settings.

Tips:
Tips for step 1: Check if you can enhance the ripping speed of your DVD writer by using
alternative firmware.

Tips for step 2: Perform deep analysis and use maximum sharpness. It takes longer, but looks
better.

Tips for step 3: Use verify or use DVD+RW discs if you're not sure it will work.

Tips for step 4: AutoGK standard uses only xVid. Players like VLC player work perfectly with the
xVid format. Your Xbox 360 or PS3 also can handle xVid. Please for the love of all that is
good read the documentation. Experiment with the CTRL-F9 options. If you feed AutoGK a
lot of different movies it can batch-process them for you overnight, even with automatic
shutdown of your system.

Tips for step 5: MediaCoder can do a LOT. If you want the maximum potential of MediaCoder,
install FireFox and read all the documentation carefully.

19 of 36
Revised: 8.7.2010.

General tips: Experiment, but read the manuals/instructions! If the download links do not
work, use Google!

Other software combinations than the above can be used.

Built-in Windows burning tools


How do I use the built-in CD burning in Windows XP?
See here: http://www.annoyances.org/exec/show/article01-110
Windows XP doesn't contain built-in support for burning DVDs. For burning DVDs get imgBurn.
ImgBurn is a free lightweight CD/DVD/HD-DVD/Blu-ray burning application.

Vista built-in CD/DVD burning tools


See here: http://www.windows-vista-tips-and-tricks.com/vista-burn-dvd.html

You don’t have too bye, download or install expensive software unless you have Windows 2000 or older.

Daemon Tools
The format that Daemon Tools supports is called ISO also known as a disk
image. You can download ISO’s from http://isohunt.com. Then you mount
the ISO as a virtual drive with Daemon Tools and install the program as you
wood with a CD/DVD.
Program discs and many other applications generally require the original
disc to be in the computer's CD-ROM drive. This restricts the amount of
people who can have access to the same software at the same time without
the cost of additional discs. Alcohol's virtual drives resolve that problem
for you. No more hunting around the stores for that elusive disc you Daemon Tools is for Windows
95/Me/2000/XP/Vista/7
need to run the application, everything you require is just a click away.
Daemon Tools lets you store your most used CDs as images on your computer, so you can call
them up at the click of a button.

With Daemon Tools you can simply and quickly run your Disc image at around
200 times faster than that of a conventional CD-ROM drive.

Alcohol 120%
Alcohol is popular for its ripping speeds.
Alcohol 120%'s image recording feature is capable of bypassing certain copy
protection schemes, such as SafeDisc, SecuROM, and Data Position
Measurement (DPM). It can also create images from PlayStation and PlayStation
2 file systems. Certain copy protection schemes require burner hardware that is
capable of passing along the copy protection.
Some software manufacturers employ software blacklist methods to prevent
Alcohol 120% from copying the software. There are third party tools available
that attempt to counteract the blacklist methods, such as Anti-blaxx and
CureROM.
The program does not back up DVD titles encrypted with the Content Alcohol 120% is for Windows
Scramble System. Alcohol Soft cites present legal restrictions for the 95/Me/2000/XP.
Does not work with Vista.
decision not to include this feature.

20 of 36
Revised: 8.7.2010.

Unblocking websites
DNS Modification - This is the most common
With DNS control way for ISPs to block a lot of sites. DNS is
1. Go to start and then the way that computers and networks
click ‘Control Panel’. translate the domain name.

When you type in a homepage name a


“domain name” your computer then searches
locally for a DNS-servers it has setup in its
networking configuration to get the IP
address.

It then uses the result to connect to that


site. Now this all works GREAT except when
the DNS server is setup to return a false
result for some domains.

To get around this may be difficult as the


network may not let you use an alternative
DNS server. If you know the IP address you

XP can simply type it in the address bar directly


and the DNS block method is rendered
useless.

2. Click ’Network Connections’

3. Click ‘Local Area Connections’

21 of 36
Revised: 8.7.2010.

4. Click Properties button.

5. Highlight Internet Protocol (TCP/IP) and


select Properties.

6. Change it to Use the following DNS server


addresses.

Free fast Public DNS Servers List


This is my list of better, fast public DNS servers
and free DNS server (as compare to your ISP / DSL
/ ADSL / cable DNS service providers DNS servers).
Service provider:dnsadvantage
Dnsadvantage free dns server list:
156.154.70.1
156.154.71.1

Service provider: ScrubIt Service provider:OpenDNS You can find guides for Vista, Mac
Public dns server address: OpenDNS free dns server list: and other operating system at:
67.138.54.100 208.67.222.222 http://theos.in/windows-xp/free-
207.225.209.66 208.67.220.220 fast-public-dns-server-list/

And surf Free

22 of 36
Revised: 8.7.2010.

Keys & serials


Unlocks the world
http://serials.ws/
A good homepage if you have
forgotten or lost your serial.
This homepage gives serials in a text format that are
therefore safe to use.
You can then copy & paste the serial to a notepad.
For the serial to work it is best that it is rated as over
50% success in use.
The homepage also generates some annoying but
harmless advertisement popups.

What is www.keygen.ms? I heard that it is a website that gives key and codes for
products. AVG says it’s a keycode site and that it is dangerous. Is it?
Well for starters it's ILLEGAL to try and get keycodes for software.
And yes, if AVG says it's dangerous, it probably is. That's because most keygen software has
Trojan viruses embedded in them.
It’s dangerous because you could end up getting their products for free… lol.
They do tend to have a majority of their, downloads being viruses and spyware too.
When you have http://serials.ws you don’t need keygens.
www.keygen.ms has one IP record. keygen.cc, serials.be, cracktop.com, www.keygen.cc and at
least 13 other hosts point to the same IP. keygen.ms.

Crack Serial Keygen


“CSK provides only clean results; they do not index sites with spyware, adware or viruses.”
http://www.crackserialkeygen.com/

Covering your Arse


Different needs for Anonymity and Deniability
In general, and especially in the case of IT-networks, a person usually
tries to hide:
• Who they are (Their identity)
• What information they acquire/share (The content they
download/upload)
• Who they talk to (The people they communicate with)
• What they do (That they participate at all)
The main reason a person is trying to hide one of the things mentioned above is because the
society as a whole, certain groups in society or the local legal system is considering the content
or the information they share/download either amoral or illegal. Downloading e.g. Cat Stephen’s
Song "Peace train” could get you in trouble for different reasons.
In Germany or the USA, you’d probably be infringing copyright. In Iran, the ruling government
simply wouldn’t want you to listen to that kind of music.

23 of 36
Revised: 8.7.2010.

Deniability
The fundamental concept is that a given data element, which contains controversial or censored
content, is also associated with neutral-content material. Hence, even a powerful adversary
capable of monitoring all communication in the network and viewing the internal state of
participating hosts is unable to prove a link between censored content and a user.
• The communication overhead required to retrieve a document is only four times greater
than what is needed in a standard network.
• The storage required for a document is only twice as large as the document itself.
Deniability is an elegant alternative to user anonymity in P2P file sharing networks. Systems
that provide anonymity for users typically require greater overhead and do not guarantee
anonymity against powerful, real-world adversaries.

Two programs you need for good storage deniability is Privacy Guardian 4 and TrueCrypt 6.2.
Privacy Guardian works well together with TrueCrypt. TrueCrypt is the best way of hiding files
on your PC and Privacy Guardian deletes all traces from snooping eyes.
Recommended literature on storage deniability:
Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications

Anonymous networking technologies have been developed to allow the exchange of data
between computers and users in a way that obscures either the user and its network location or
the destination of a data access, or both. A popular method is the
onion routing concept, prominently implemented in the tor network or
virtual private network (VPN). Such methods are often used to transfer
contentious or illegal material and copyrighted works in violation of
legal or acceptable use policies. Many current implementations incur
high overhead, making them slow or hard to use. However, in
locations where very fast Internet access is common, a number of
anonymous file-sharing programs have already reached high
popularity.

Anonymous addressing
Avoid giving away your address if you can. There are two types of address physical and logical.
Logical addresses are IP- and TCP port addresses. You have to give them in order to get data
over the internet. So they should be changed at every system startup. Dynamic Host
Configuration Protocol (DHCP) is the most common IP-addressing system where a DHCP-server
gives you a new IP-address every time you turn on your computer. And most good BitTorrent
clients will randomize the TCP port on system startup. So make sure you in a network that uses
DHCP and make sure to have a good BitTorrent client!!!

You can have several e-mail accounts. For good anonymity keep your personally identifiable e-
mail and messaging address/account separate from your file-sharing address/account.

The simplest way to keep your email address a secret is to never share it with anyone you don't
trust. An email address can identify either the company that you work for (such as
billgates@microsoft.com), the Internet service provider (ISP) you use (such as
jsmith@aol.com), or the company that hosts your email account (such as
bigman1239@lycos.com).

Many people skirt this problem by using a free email account on Hotmail
(http://www.hotmail.com) or Yahoo! (http://www.yahoo.com). Unlike ordinary email accounts
that can link you to a specific company or ISP, web−based email accounts can be created

24 of 36
Revised: 8.7.2010.

anonymously (just type in a false name and address when you create the initial email account)
and can be accessed by any computer (such as a public Internet kiosk), anywhere in the world.
To ensure their anonymity, many file sharers abandon their free email accounts periodically and
create new ones.

Physical address
Change your MAC address. You might be asking yourself what is a MAC address. Well it’s the
address that goes along with your network card. There are programs out there that can do this
for you. Macmakeup and SMAC to name a few. If you have DRM installed on your PC changing
your MAC address will activate it. Just as changing any hardware in the PC.

Firewalled LAN network


If you’re LAN DHCP-server doesn’t have a firewall then get a wireless router with a built in
proxy firewall. A proxy firewall effectively hides the true network addresses.

Be As Anonymous and Private As Possible Online


Avoid giving away your name.
Microsoft's .NET Passport is a threat to your anonymity. NET Passport is a digital ID.
Windows Messenger XP's shiny new client for chat automatically displays an icon in the
notification area.
This icon appears with a 'broken' symbol (a white X on a red circle) until you add a
.NET Passport to XP and configure Messenger. (You can also specifically hide the
notification area icon for Messenger, but-human nature being what it is-most people
will click the icon to find out what's wrong.)

If you want to avoid your usage of the Internet being monitored, you have to take active steps,
such as those mentioned in this list:
• For browsing, you can go through a service such as http://www.proxyfornerds.com. This
service uses various encryption and redirection techniques to remove identifiers from your
requests, prevent cookies from landing on your computer while letting you enjoy the benefits of
cookies during surfing sessions, block scripts, and sanitize downloads.
• For e-mail, you can use a Web-based service that offers encrypted e-mail, such as HushMail
www.hushmail.com, use encryption technology such as Pretty Good Privacy (PGP) with Outlook
Express or another conventional client, or use a digital certificate to encrypt e-mail using
Outlook Express or another client. Anonymizer.com also offers anonymous e-mail.
• For secure document transfer, you can use a point-to-point solution, such as NetMeeting, or a
Web-based secure-transfer solution, such as ZipLip www.ziplip.com. Your ISP will have details
of the connections you've made, so it'll know that, for instance, you've spent three hours each
day at Anonymizer.com, sending this number of bytes and receiving that number of bytes, but
it won't be able to tell what those bytes contained.

Using BitTorrent is legal, downloading copyrighted material isn’t.


So read “The BitTorrent Bible” Section 11, Covering your Arse.

Other recommended literature on secure file sharing:

1. The XP Files-Windows' Hidden Tools for Secure Sharing, Communication, and Collaboration
2. The current state of anonymous file-sharing. Bachelor Thesis: By Marc Seeger. July 22, 2008
3. Software Piracy Exposed.(2005)
See the last page.

25 of 36
Revised: 8.7.2010.

Safe Sneakernetting
The main drawback with file trading through sneakernetting is that it's easy for the recording
industry (such as the RIAA in the United States) or the government to find out who's running a
specific sneakernet and come after you.
Offering copyrighted files through a sneakernet can blatantly advertise your law−breaking activities
in much the same way as selling illegal drugs from your front porch in full view of the neighbors.
Someone is going to turn you in.

To get past the first meeting, use questions to discover the right level of information to
give a potential file sharing partner. It is always legitimate to ask people what kind of
music and movies they like. People that can’t afford expensive software like students
are more likely to be interested in free software like Linux and OpenOffice. Talk about
the copy-technique, not about what you are going to do with it.

Of course, few people freely give away their collection of files without expecting
something in return. Many such smart people will only let you copy a file if you first give them some
files in return and for good reason. No one that has them self participated in the file-sharing will turn
you in to the authorities.

“Careless talk costs lives so be careful”: Admitting that you've illegally downloaded movies/songs and
need help to process/burn is sometimes comparable to robbing a bank, and walking into the bank
the next day holding the bags of money to deposit them into your account. Don't be surprised if
people laugh at you when you make the headlines.

We are talking about leaps and bounds in both technology and economics. So everybody will not
understand the data freedom ideals in file sharing. In the words of Cristobal Colomb:
"Nothing that results from human progress is achieved with unanimous consent.
Those who are enlighten before the others are condemned to pursue that light despite the others."

And in the words of Benjamin Franklin:


People willing to trade their freedom for temporary security deserve neither and will lose both.

26 of 36
Revised: 8.7.2010.

Questions?
If you have questions then do a search on Google first. The internet is immense and most questions have
been answered on it. A question might be “How do I use µTorrent?” All it takes is good spelling and
grammar. Remember the question mark at the ending of the sentence. Theory and manuals are good but
Test before you assume.

Posting Questions
Post your question to:
Yahoo! Answers
http://answers.yahoo.com/dir/index?sid=396545660
or
Club CD Freaks - Knowledge is Power
http://club.cdfreaks.com

Personal assistants
If you have followed the above steps and still have problems, find a local IT genius who can assist you
further. Sometimes it is necessary have someone sit down and patiently teach the technique. Ask a person
you can trust. It might be a person in your sneakernet. If you don't ask, you won't know!

Don't give up too easily; persistence pays off in the end.


If at first you don’t succeed TRY and TRY AGAIN.

Links
[Sub ITA] Steal This Film 1&2 Don't call it DRM: Microsoft explains
www.youtube.com/watch?v=vkRlRbaKFOM&feature=Pl new gaming piracy tech
ayList&p=B58061E9DA2EE998&index=0 http://arstechnica.com/gaming/news/2009/03/microso
ft-1.ars ¨
BitTorrentFAQ Wiki - A Wiki for BT
information Researchers conclude piracy not stifling
http://wiki.etree.org/index.php?page=BitTorrent content creation
http://arstechnica.com/media/news/2009/06/research
Timeline of file sharing ers-conclude-piracy-not-stifling-content-creation.ars
http://en.wikipedia.org/wiki/Timeline_of_file_sharing
TorrentFreak: A weblog dedicated to
Comparison of file sharing applications bringing the latest news about BitTorrent
http://en.wikipedia.org/wiki/Comparison_of_file_sharin http://torrentfreak.com
g_applications
Chapter I - Statute of Anne vs.
WARDRIVING TO STAY ANONYMOUS Trademark of Anne
http://www.i-hacked.com/content/view/101/75/
http://privateinfringer.blogspot.com/2006/06/chapter-
i-statute-of-anne-vs-trademark.html
Freeware-guide. Top quality freeware
http://www.freeware-guide.com/
Digital rights management (DRM)
http://en.wikipedia.org/wiki/Digital_rights_management
Sneakernet
http://en.wikipedia.org/wiki/Sneakernet Top 10 Ways to Lock Down Your Data
http://lifehacker.com/5113886/top-10-ways-to-lock-
Jon Lech Johansen “DVD Jon” down-your-data
http://en.wikipedia.org/wiki/Jon_Lech_Johansen

How I’d Hack Your Weak Passwords


100 years of Big Content fearing http://lifehacker.com/5505400/how-id-hack-your-
technology—in its own words weak-passwords?skyline=true&s=i
http://arstechnica.com/tech-policy/news/2009/10/100-years-
of-big-content-fearing-technologyin-its-own-words.ars
FileShareFreak
http://filesharefreak.com
Brian's BitTorrent FAQ and Guide
http://www.dessent.net/btfaq
Streaming Movie Sites review and list
http://filesharefreak.com/2008/02/25/the-best-online-
streaming-movie-sites-on-the-net/

27 of 36
Revised: 8.7.2010.

Glossary
Especially if you're new to BitTorrent or file sharing in general, there are probably many new and
unfamiliar terms used throughout this manual (and in many other BitTorrent-related places). To help
"clue" you in on the new vocabulary, this glossary can be of great help.

A
announce: The act of connecting to a tracker to update it on your status, and to obtain information from it
as well, including (but not limited to) an updated peer list.

availability: The number of complete copies of the torrent contents there are distributed in the part of the
swarm you're connected to. The amount of the torrent contents you currently have is included in the
availability count. A swarm with no seed and with availability below 1.0 will likely be unable to finish
transferring the complete torrent contents.
B
Big Content (also called Big Copyright) is a pejorative term used to refer collectively to the major content-
owning businesses, typified by such groups as the MPAA and the
RIAA, and their counterparts outside of the United States. It may
also be used to include the Association of American Publishers, and
individual corporations such as Disney, Viacom, and Sony. The term
is based on the model of established pejorative terms such as Big
Tobacco or Big Oil.
The term Big Content originated due to the similar techniques of the
MPAA and RIAA in defending their current business models, which
are being challenged by piracy in the digital age. Websites such as
Ars Technica and Techdirt use the terms to decry the tactics of these organizations, which include such
methods as using their significant lobbying power with governments to pass laws (such as the DMCA and
repeated extensions of the length of copyright terms), pressuring police to take action against large-scale
copyright violators (such as the raid in Sweden on the bittorrent-indexing website The Pirate Bay), and
bringing large numbers of John Doe lawsuits against individual filesharers based on a harvested IP
address. Big Content is also known for public relations campaigns which have been criticized as
propaganda meant to indoctrinate children and others with an incorrect understanding of copyright (such
as Captain Copyright, and feeding the media inflated estimates of losses due to piracy and file sharing).
Detractors of these groups consider them to be abusing the original intention of copyrights, and abusing
their customer base in an effort to protect outdated business models. The organizations constituting Big
Content have been in the news recently for creating another lobbying group, known as The Copyright
Alliance, advocating stronger copyright laws

block: The units of data that comprise a piece. Because blocks do not directly affect whether torrent
contents finish transferring, it is not considered an appreciable unit of data with regards to BitTorrent like
the piece is.

byte: A unit used for measuring the size of data on a computer storage device. Many people confuse
"byte" for "bit" when referring to speeds. A byte is composed of 8 bits, so there is a clear distinction, and
terminology should not be confused when referring to bytes.
broadcatching: The act of downloading content from an RSS feed.
C
choked: This word describes the state of a BitTorrent connection. When a connection is choked, it means
the person who is supposed to be doing the uploading on the connection does not want to send anything.
This generally happens when the uploader's upload slots are full.

client: The application a user is using when connected to a swarm.

Commercial Software Using the definition of commercial from the dictionary it indicates "Having profit as a
chief aim". This makes Commercial Software to simply be software used in a commercial environment, or
software developed that has "profit as a chief aim".
Many people are incorrectly using this phrase interchangeably with "Proprietary Software", and are trying
to perpetuate the myth that the only way to make money in the software world is to make the software
proprietary. This definition of the word "commercial" does not specify a specific way of making money, and
anyone in
28 of 36
Revised: 8.7.2010.

the "Free Software", "Open Source" or similar movements know that there is more than just a single way
to make money in the software world.
Phrases such as "Free Software", "Open Source Software", or "Proprietary Software" are totally
independent of whether or not the software is commercial or not. Software can be licensed with the GPL or
BSD License, and yet have profit as a chief aim, such as with Red Hat Software. There is also going to be
proprietary software which is given away for free (Internet Explorer and Netscape are two popular
examples) where profit is not the aim of the software, but other motivations such as market control or
advertising or Internet Portals.
D
DHCP (Dynamic Host Configuration Protocol): A protocol that allows networked devices to be assigned an
unique IP address automatically from a pool of unused IP addresses.
DHCP was developed to handle the problem of dealing with large numbers of IP addresses. You DON’T
want to have to go to every machine on the network and manually put in the IP Address, subnet mask,
WINS server address, DNS server address, and default gateway address. That would take a long time and
be very inefficient.
The DHCP process is pretty straightforward:
1. On a client machine, rather than manually assigning a IP address information, you set up the client to
obtain its IP addressing information (IP address, subnet mask, WINS, DNS, Default Gateway) from the
DHCP server.
2. When the DHCP client starts up, it doesn’t have any IP addressing information, and its needs this
information if it’s going to participate on a TCP/IP network. At system startup, it will “call out” to all
machines on the network (broadcast) asking for a DHCP server anywhere to give it an IP address.
3. ALL DHCP servers within “earshot” will answer this PC’s request. However, the client machine will only
accept the offer made by the first machine to respond to the request for IP addressing information.
4. The client will accept the offer of an IP address from this first machine that answers.
5. Once the client machine has its IP addressing information, it can fully initialize (start up) its TCP/IP and
“stack” (all the things required to make TCP/IP work correctly). Now that it has its TCP/IP information,
it can fully participate in network activities over an TCP/IP network.

DHT (Distributed Hash Table): A distributed tracker that works similarly to a regular tracker in that you
announce to it and get back a list of peers that are transferring the same .torrent file as you. Because DHT
is distributed, there is no single point of failure, so even if a single node disconnects from DHT, the tracker
will continue to work (unlike with normal trackers, where if the server goes down, it becomes unusable).
DHT can be thought of as a backup tracker.

disk cache: A feature that makes use of available memory to stores data for quicker access as well as ease
disk thrashing. The use of a disk cache will cause an increase in memory usage in return for improved
performance.

disk thrashing: When a storage disk gets accessed very frequently. Extended disk thrashing may lead to
hard drive wear and tear, shortening a drive's life.

Domain Name System (DNS), Internet system to translate names into IP addresses

double NAT: A situation where the network device is behind more than one NAT devices (generally
routers). In this situation, forwarding ports from just one of those NAT devices is generally insufficient,
and more actions need to be taken as described in
http://portforward.com/help/doublerouterportforwarding.htm.

download: The act of transferring data from another server or computer onto your own.
E
encryption: The obfusication (concealing) of data behind seemingly random data in order to hide its true
identity.

endgame mode: A change in the piece requesting strategy that occurs when a download is near
completion during which the client requests pieces from all connected peers rather than requesting a piece
from one peer at a time in the normal operating mode. Endgame mode is used because download rates
often slow down considerably as a torrent job nears completion due to the tendency for the remaining
pieces to be downloaded from peers with saturated connections. By requesting data from all peers rather
than waiting for a single peer, such a bottleneck can be bypassed. This mode is not used during normal
operating modes because of the large amount of overhead it potentially generates in sending requests to
all peers.
29 of 36
Revised: 8.7.2010.

F
firewall: is a part of a computer system or network that is designed to block unauthorized access while
permitting outward communication. It is also a device or set of devices configured to permit, deny,
encrypt, decrypt, or proxy all computer traffic between different security domains based upon a set of
rules and other criteria.
Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are
frequently used to prevent unauthorized Internet users from accessing private networks connected to the
Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall,
which examines each message and blocks those that do not meet the specified security criteria.
There are several types of firewall techniques:
• Packet filter: Looks at each packet entering or leaving the network and accepts or rejects it based
on user-defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult
to configure. In addition, it is susceptible to IP spoofing.
• Application gateway: Applies security mechanisms to specific applications, such as FTP and Telnet
servers. This is very effective, but can impose a performance degradation.
• Circuit-level gateway: Applies security mechanisms when a TCP or UDP connection is established.
Once the connection has been made, packets can flow between the hosts without further checking.
• Proxy server: Intercepts all messages entering and leaving the network. The proxy server
effectively hides the true network addresses.

Fear, Uncertainty, and Doubt: (FUD) is a tactic of rhetoric and fallacy used in sales, marketing, public
relations, politics and propaganda. FUD is generally a strategic attempt to influence public perception by
disseminating negative information designed to undermine the credibility of their beliefs. An individual
firm, for example, might use FUD to invite unfavorable opinions and speculation about a competitor's
product; to increase the general estimation of switching costs among current customers; or to maintain
leverage over a current business partner who could potentially become a rival. FUD techniques may be
crude and simple. Alternatively they may be very subtle, employing an indirect approach.
The term originated to describe disinformation tactics in the computer hardware industry and has since
been used more broadly. FUD is a manifestation of the appeal to fear.
G
GiB (gibibyte): A gibibyte is equal to 1024 MiB. Most people are referring to "gibibyte" when they say
"gigabyte," even though that is technically an incorrect usage of terms.
H
half-open connection: A connection that is not fully established on both ends. Half-open connections occur
when you attempt to connect to an IP address, but the IP address hasn't yet responded.

hash: A "fingerprint" of data assumed to be unique to the data. Because of the assumed uniqueness of the
data, it is used to verify that a piece of data is indeed uncorrupted (since the corrupted data's hash would
not match its expected hash).

hash check: The comparing of a piece of data's hash with a reference hash in order to verify the integrity
of the piece of data.

hashfail: When a piece fails the hash check used to verify data integrity.
I
index: A site that lists .torrent files available for download.
Initial Seeding (Super Seeding): A method of seeding that attempts to decrease the bandwidth load for the
initial seeder. With normal seeding methods, the initial seeder typically has to upload 150% to 200%, or
even more, of the original data in before a full copy of the data has been distributed into the swarm. With
initial seeding, the initial seed attempts to get the rarest pieces out instead of uploading identical pieces
repeatedly, often lowering the initial upload requirement to 105%. Initial seeding does not necessarily
improve upload speeds or decrease seeding time. It should be used only if you are the sole seeder on the
swarm, and if there are at least 2 peers connected. Generally, initial seeding should not be used by people
with high upload speeds.

IP address: A number used to uniquely identify devices on a network.

ISP (Internet Service Provider): The company providing for your Internet service.

ISP throttling: A term used to refer to the throttling of BitTorrent traffic by ISPs.

30 of 36
Revised: 8.7.2010.

K
KiB (kibibyte): A kibibyte is equal to 1024 bytes. Most people are referring to kibibyte when they say
"kilobyte," even though that is technically an incorrect usage of terms.

L
LAN (Local Area Network): A network of computers in a local area, such as a home.

LAN IP address: The private, internal IP address that locates a computer on a LAN. A LAN IP address is not
visible to users outside of the LAN. As described by RFC 1918, the following ranges are designated as
reserved IP addresses for private LANs: 10.0.0.0 - 10.255.255.255, 172.16.0.0 - 172.31.255.255,
192.168.0.0 - 192.168.255.255.

LPD (Local Peer Discovery): A method by which µTorrent attempts to discover new peers local relative to
your computer's network. Local Peer Discovery makes use of IP multicast.

leecher: A person who downloads, but fails to reciprocate the generosity of others by not sharing back.
The word "leecher" carrys a strong negative connotation. Some people use the words "leecher" and "peer"
interchangeably, though this practice is not recommended (as it may lead to word confusion).
M
MAC address: In computer networking, a Media Access Control address (MAC address), Ethernet Hardware
Address (EHA), hardware address, adapter address or physical address is a unique identifier assigned to
most network adapters or network interface cards (NICs) by the manufacturer for identification. If
assigned by the manufacturer, a MAC address usually encodes the manufacturer's registered identification
number. Although intended to be a permanent and globally unique identification, it is possible to change
the MAC address on most of today's hardware, an action often referred to as MAC spoofing. Unlike IP
address spoofing, where a sender spoofing their address in a request tricks the other party into sending
the response elsewhere, in MAC address spoofing (which takes place only within a local area network), the
response is received by the spoofing party. A host cannot determine from the MAC address of another host
whether that host is on the same OSI Layer 2 network segment as the sending host, or on a network
segment bridged to that network segment. In TCP/IP networks, the MAC address of a subnet interface can
be queried with the IP address using the Address Resolution Protocol (ARP) for Internet Protocol Version 4
(IPv4) or the Neighbor Discovery Protocol (NDP) for IPv6. On broadcast networks, such as Ethernet, the
MAC address uniquely identifies each node and allows frames to be marked for specific hosts. It thus forms
the basis of most of the Link layer (OSI Layer 2) networking upon which upper layer protocols rely to
produce complex, functioning networks.

Metadata: here means that the file contains information about the data you want to download, not the
data itself. This is what is sent to your computer when you click on a download link on a website. You can
also save the torrent file to your local system, and then click on it to open the BitTorrent download.

MiB (mebibyte): A mebibyte is equal to 1024 KiB. Most people are referring to "mebibyte" when they say
"megabyte," even though that is technically an incorrect usage of terms.
N
NAT (Network Address Translation): The changing of the source or destination IP address for a data
packet. This usually occurs when one is behind a firewall or router, where it translates IP addresses so that
multiple computers can exist on a LAN with while using the same WAN IP address.
O
Onion routing is a technique for anonymous communication over a computer network. Messages are
repeatedly encrypted and then sent through several network nodes called onion routers. Each onion router
removes a layer of encryption to uncover routing instructions, and sends the message to the next router
where this is repeated. This prevents these intermediary nodes from knowing the origin, destination, and
contents of the message. As of 2009, Tor is the predominant technology that employs onion routing.

Open source software (OSS) is defined as computer software for which the source code and certain other
rights normally reserved for copyright holders are provided under a software license that meets the Open
Source Definition or that is in the public domain. This permits users to use, change, and improve the
software, and to redistribute it in modified or unmodified forms. It is very often developed in a public,
collaborative manner. Open source software is the most prominent example of open source development
and often compared to user-generated content. The term open source software originated as part of a
marketing campaign for free software. A report by Standish Group states that adoption of open source
software
31 of 36
Revised: 8.7.2010.

models has resulted in savings of about $60 billion per year to consumers.

optimistic unchoke: When a client tries to start a transfer on a previously choked connection in hopes that
the connection becomes unchoked.
P
P2P (peer-to-peer): The use of bandwidth of users using the same peer-to-peer service to perform the
functions of the peer-to-peer service or software. Centralized servers are not what keeps P2P networks
alive, but rather, the peers themselves.

PE (Protocol Encryption): A joint specification between Azureus and µTorrent designed to bypass throttling
and/or blocking of BitTorrent traffic by ISPs by encryption of the data. There are different methods of
encryption, ranging from full encryption of all of the data, to partial encryption of the data (header
encryption only, not unlike with PHE, although it's still not as easily detected as PHE).

peer: A user/client connected to the swarm. People sometimes refer to peers as "leechers," though they
also use the same word to refer to its more negative connotation. It's recommended that you use the word
"leecher" to strictly refer to people who don't share so to keep the distinction clear and confusion to a
minimum.

peer list: A list containing the IPs and ports of other peers.

PEX (Peer Exchange): A feature to exchange peer lists with other peers that support the same PEX
implementation (generally limited to peers using the same BitTorrent client). By exchanging peer lists, it's
possible to find peers not included in the peer list supplied by the tracker.

PHE (Protocol Header Encryption): An old method of encryption created by the BitComet developer that
encrypted only a part of the data (the header) in an attempt to bypass ISP throttling and/or blocking of
BitTorrent traffic. Because its specification was poorly developed, ISPs were able to detect it with little
trouble, rendering it useless.

piece: The smallest appreciable unit of data in BitTorrent. The size of pieces can be different depending on
the .torrent file in question.

piece distribution: The general distribution of the pieces across the swarm. BitTorrent is generally most
efficient when piece distribution is random, with minimal "clumping" of pieces available in the swarm.

poisoning: The act of intentionally feeding invalid data into the swarm, resulting in hashfails for peers
receiving the invalid data. Outfits with (or hired by other entiries with) anti-P2P agendas are the most
common sources of swarm poisoning.

port forwarding: The act of passing data on the forwarded port from one network device to another. In
most cases regarding BitTorrent, port forwarding refers to the forwarding of connections from a router to a
specific computer attempting to listen on that port.

'private' flag: A piece of information stored in a .torrent file that tells any BitTorrent client that recognizes
the flag to disable DHT, LPD, and PEX for that specific .torrent. The 'private' flag is typically used in
.torrent files served by private trackers as a method of keeping a swarm isolated from people who aren't
members of the private tracker.

private tracker: A tracker that requires users to log in to use it. Private trackers typically enforce ratio
requirements (by banning users whose ratios are too low) in order to prevent or minimize the leeching
that is prevalent on many public trackers.

protocol: A set of rules and description of how to do things. In the case of the BitTorrent protocol, it is a
set of rules describing how BitTorrent clients should communicate and transfer data with each other.

proxy: A computer that is told to make a connection to another computer, and relay the data transferred
between the two computers to the original computer that connected to the proxy. Essentially, using a
proxy is a way to make an indirect connection to another computer by way of the proxy computer.

public tracker: A tracker that is open for anyone to use (as opposed to private trackers, where only people
who hold accounts can use the tracker).
R
ratio: A number derived from the division of two other numbers. In the context of BitTorrent, people are
normally
32 of 36
Revised: 8.7.2010.

referring to share ratio when they speak of a ratio.

reseed: The act of rejoining a swarm with no seeds as a seed.

RSS feed: A file that is updated so that it delivers information and content in such a way that allows one to
track updates quickly and easily.
S
scrape: The grabbing of statistics (number of seeds and peers) from a tracker regarding a specific swarm.

seed: A peer with 100% of the data in the torrent contents.

seeding: The act of being connected to a swarm as a seed.

share ratio: The ratio of the amount of data you've uploaded to the amount of data you've downloaded.

Sneakernet: The oldest form of file sharing is Sneakernet (called such because people would physically
transfer files from one person to another by walking; using their sneakers). Before network file sharing
people would exchange files on Magnetic tape (including audio cassettes, 8-tracks, VHS, Betamax, etc.),
floppy disks and other removable media.

snubbed: This word describes the state of a BitTorrent connection. A connection is marked as snubbed
when the client has not received anything over the connection for an extended period of time.

SpyWare In general, spyware is any technology that aids in gathering information about a person or
organization without their knowledge. On the Internet, spyware is programming that is put in someone's
computer to secretly gather information about the user and relay it to advertisers or other interested
parties. Spyware can get in a computer as a software virus or as the result of installing a new program.
Data collecting programs that are installed with the user's knowledge are not, properly speaking, spyware,
if the user fully understands what data is being collected and with whom it is being shared.
The cookie is a well-known mechanism for storing information about an Internet user on their own
computer. However, the existence of cookies and their use is generally not concealed from users, who can
also disallow access to cookie information. Nevertheless, to the extent that a Web site stores information
about you in a cookie that you don't know about, the cookie mechanism could be considered a form of
spyware. DoubleClick, a leading banner ad serving company, changed its plans to combine cookie
information with database information from other sources to target ad campaigns directly to individuals
without their permission. DoubleClick's current policy is not to collect "personally-identifiable" information
about a user without their explicit permission or "opt-in." Aureate Media, which distributes free software on
the Web in exchange for the right to gather user information, is another company that has been criticized
for not plainly indicating what data it gathers and for making it difficult to remove its programming.
Spyware is part of an overall public concern about privacy on the Internet.

static IP address: An IP address that does not change (remains static) across multiple sessions. A static IP
address is necessary in port forwarding, as ports are usually forwarded to a specific IP address, where the
rule does not change even if the computer's IP address does.

Super-seeding: is a feature of some BitTorrent clients that attempts to minimize the amount of data which
must be uploaded by the original seed until the first completion of a downloading peer. The feature was
conceived by John Hoffman and first implemented in the BitTornado client in 2003. This feature is intended
to be used when there is only one seed. It is called initial seeding in µTorrent because it is only supposed
to be used when there is only one seeder. Super seeding is a change in the behavior of seeds and may be
implemented without violating the BitTorrent protocol.

One problem of Bittorrent is, that the original uploader of a given file will show up as the first node having
100% file availability and therefor losing a bit of anonymity. To keep nodes from showing up as "the
original uploader", "superseeding" is used, which results in the original client disguising as yet another
downloader. This is done is by simply having the uploading node lying about its own statistics and telling
other nodes that it’s also still missing files. To allow the distribution process to be completed, the client
varies the supposedly "missing" pieces over time, making it look as if itself was still in the process of
downloading. It has to be noted that this might only be of help if the tracker itself isn’t compromised and
being monitored by a third party.

swarm: The collective group of peers (which includes seeds) that are connected by a common .torrent file.

33 of 36
Revised: 8.7.2010.

T
throttle: A term used to refer to the intentional slowing down of transfer rates (download and/or upload),
typically used in the context of ISP throttling.

torrent: A small file containing metadata from the files it is describing. In other contexts, it is sometimes
used to refer to the swarm connected around that small file.

tracker: Something that a client connects to in order to share its IP and port, as well as obtain information,
including peer lists.
U
upload: The act of transferring data from your computer onto another.

UPnP (Universal Plug and Play): A protocol that allows devices on a network to communicate with each
other seamlessly. In the case of µTorrent, UPnP is used to forward a port on a router without the need to
open the port manually.
V
Virtual Private Network (VPN) is a network that uses a public Internet, to provide groups, offices or
individual users with secure access to their organization's network. It aims to avoid an expensive system
of owned or leased lines that can only be used by one organization. The goal of a VPN is to provide the
organization with the same, secure capabilities, but at a much lower cost.
It encapsulates data transfers between two or more networked devices not on the same private network
so as to keep the transferred data private from other devices on one or more intervening local or wide
area networks. There are many different classifications, implementations, and uses for VPNs.

Security Mechanisms
Secure VPNs use cryptographic tunneling protocols to provide confidentiality by blocking intercepts and
packet sniffing, allowing sender authentication to block identity spoofing, and provide message integrity by
preventing message alteration.
Secure VPN protocols include the following:
• IPsec (Internet Protocol Security) was originally developed for IPv6, which requires it. This
standards-based security protocol is also widely used with IPv4. L2TP frequently runs over IPsec.
• Transport Layer Security (SSL/TLS) can tunnel an entire network's traffic, as it does in the
OpenVPN project, or secure an individual connection. A number of vendors provide remote access
VPN capabilities through SSL. An SSL VPNr can connect from locations where IPsec runs into
trouble with Network Address Translation and firewall rules. However, SSL-based VPNs use
Transmission Control Protocol (TCP) and so may be vulnerable to denial-of-service attacks because
TCP connections do not authenticate.
• Datagram Transport Layer Security (DTLS), is used in Cisco's next-generation VPN product, Cisco
AnyConnect VPN, to solve the issues SSL/TLS has with tunneling TCP over TCP.
• Microsoft's Microsoft Point-to-Point Encryption (MPPE) works with their PPTP and in several
compatible implementations on other platforms.
• Microsoft introduced Secure Socket Tunneling Protocol (SSTP) in Windows Server 2008 and
Windows Vista Service Pack 1. SSTP tunnels Point-to-Point Protocol (PPP) or L2TP traffic through
an SSL 3.0 channel.
• MPVPN (Multi Path Virtual Private Network). Ragula Systems Development Company owns the
registered trademark "MPVPN".
• Secure Shell (SSH) VPN -- OpenSSH offers VPN tunneling to secure remote connections to a
network or inter-network links. This should not be confused with port forwarding. OpenSSH server
provides limited number of concurrent tunnels and the VPN feature itself does not support personal
authentication.

Authentication
Tunnel endpoints must authenticate before secure VPN tunnels can establish.
User-created remote access VPNs may use passwords, biometrics, two-factor authentication or other
cryptographic methods.
Network-to-network tunnels often use passwords or digital certificates, as they permanently store the key
to allow the tunnel to establish automatically and without intervention.

See here: http://computer.howstuffworks.com/vpn.htm

34 of 36
Revised: 8.7.2010.

W
WAN (Wide Area Network): A computer network that covers a large geographical area. A WAN connects
multiple LANs together. The Internet is an example of a WAN.

WAN IP address: The public, external IP address that users outside of your own network see your network
to be located at on the WAN. WAN IP addresses reveal nothing about internal IP address allocation on a
LAN located at the WAN IP address.

web interface (Web UI): An interface for a supported web browser that allows one to control an application
remotely.

web seed: A seed that is basically a regular web server hosting the requested file. BitTorrent clients that
support web seeds use them like any other seed, and can request data segments from the server much
like requesting pieces from an ordinary seed. The use of web seeds ensures that a torrent swarm will
never die as long as the file being seeded is left intact on the server and the server does not go down.

Warner Music Group (WMG) is the third-largest of the big four major record labels, the others being Sony,
EMI, and Universal.
Warner Music Group also has a publishing arm, Warner/Chappell Music, that dates back to 1929,
when Jack Warner, president of Warner Bros.
Pictures Inc., founded Music Publishers Holding Company (MPHC) to acquire music copyrights as a means
of providing inexpensive music for films. Among the historic compositions of which the publishing rights
are controlled by WMG are the works of Cole Porter, Richard Rodgers and Lorenz Hart. Its printed music
operation, Warner Bros. Publications, was sold to Alfred Publishing on 2005-06-01.

35 of 36
Revised: 8.7.2010.

File-sharing guides and e-books


1. The Current State of Anonymous Filesharing.pdf
http://dl.dropbox.com/u/5374109/File-sharing%20guides%20and%20e-books/The-Current-State-of-Anonymous-Filesharing.pdf

2. Steal-This-File-Sharing-Book-What-They-Wont-Tell-You-About-File-Sharing-Wallace-Wang-2004.pdf
http://dl.dropbox.com/u/5374109/File-sharing%20guides%20and%20e-books/Steal-This-File-Sharing-Book-What-They-Wont-
Tell-You-About-File-Sharing-Wallace-Wang-2004.pdf

3. Software Piracy Exposed.(2005).pdf


http://dl.dropbox.com/u/5374109/File-sharing%20guides%20and%20e-books/Software_Piracy_Exposed.%282005%29.pdf

4. The_BitTorrent_Bible_v1.1.pdf
http://dl.dropbox.com/u/5374109/File-sharing%20guides%20and%20e-books/The_BitTorrent_Bible_v1.1.pdf

5. The_XP_Files-Windows_Hidden_Tools_for_Secure_Sharing_Communication_and_Collaboration.pdf
http://dl.dropbox.com/u/5374109/File-sharing%20guides%20and%20e-books/The_XP_Files-
Windows_Hidden_Tools_for_Secure_Sharing_Communication_and_Collaboration.pdf

The-Big-Book-of-BitTorrent.pdf
http://dl.dropbox.com/u/5374109/File-sharing%20guides%20and%20e-books/The-Big-Book-of-BitTorrent.pdf

6. Why-My-Printer-Received-a-DMCA-Takedown-Notice.pdf
http://dl.dropbox.com/u/5374109/File-sharing%20guides%20and%20e-books/Why-My-Printer-Received-a-DMCA-Takedown-
Notice.pdf

7. Peers-Pirates-and-Persuasion-Rhetoric-in-the-PeertoPeer-Debates-by-John-Logie.pdf
http://dl.dropbox.com/u/5374109/File-sharing%20guides%20and%20e-books/Peers-Pirates-and-Persuasion-Rhetoric-in-the-
PeertoPeer-Debates-by-John-Logie.pdf

8. Wardriving-To-Stay-Anonymous.pdf
http://dl.dropbox.com/u/5374109/File-sharing%20guides%20and%20e-books/Wardriving-To-Stay-Anonymous.pdf

9. Komiteen.pdf
http://dl.dropbox.com/u/5374109/File-sharing%20guides%20and%20e-books/Komiteen.pdf

10. Defeating_Encrypted_and_Deniable_File_Systems.pdf
http://dl.dropbox.com/u/5374109/File-sharing%20guides%20and%20e-
books/Defeating_Encrypted_and_Deniable_File_Systems.pdf

11. the-pirates-dilemma-pirate_copy.pdf
http://dl.dropbox.com/u/5374109/File-sharing%20guides%20and%20e-books/the-pirates-dilemma-pirate_copy.pdf

12. Turning_file-sharing_legitimate.pdf
http://dl.dropbox.com/u/5374109/File-sharing%20guides%20and%20e-books/Turning_file-sharing_legitimate.pdf

13. How to copy DVDs with DVD Shrink.docx


http://dl.dropbox.com/u/5374109/Hallo%20course%20mates%2027.3.2010.doc

14. RIAA-v-The-People-Four-Years-Later.pdf
http://dl.dropbox.com/u/5374109/File-sharing%20guides%20and%20e-books/RIAA-v-The-People-Four-Years-Later.pdf

15. Ben-s-Guide-to-Protecting-File-Sharers-From-Going-to-Prisonv310.pdf
http://dl.dropbox.com/u/5374109/File-sharing%20guides%20and%20e-books/Ben-s-Guide-to-Protecting-File-Sharers-From-
Going-to-Prisonv310.pdf

16. A-Systemic-Analysis-of-Music-Distribution-Over-the-Internet.pdf
http://dl.dropbox.com/u/5374109/File-sharing%20guides%20and%20e-books/A-Systemic-Analysis-of-Music-Distribution-Over-
the-Internet.pdf

17. Compromising-Tor-Anonymity-Exploiting-P2P-Information-Leakage.pdf
http://dl.dropbox.com/u/5374109/File-sharing%20guides%20and%20e-books/Compromising-Tor-Anonymity-Exploiting-P2P-
Information-Leakage.pdf

18. Pirate-Philosophy-2-0.pdf
http://dl.dropbox.com/u/5374109/File-sharing%20guides%20and%20e-books/Pirate-Philosophy-2-0.pdf

19. Pirates-vs-Artists.pdf
http://dl.dropbox.com/u/5374109/File-sharing%20guides%20and%20e-books/Pirates-vs-Artists.pdf

20. Proxy-for-Torrent.pdf
http://dl.dropbox.com/u/5374109/File-sharing%20guides%20and%20e-books/Proxy-for-Torrent.pdf

36 of 36

You might also like