SlideShare a Scribd company logo
1 of 30
Download to read offline
TORRENT TECHNOLOGY
BY- HARSHVARDHAN MALPANI
HARSHMALPANI.COM
CONTENTS
• Introduction
• Working
• Terminology
• Features
• Drawbacks
• Countermeasures
INTRODUCTION
• What are Torrents ?
• tor·rent (/ˈtôrənt/)
• In the BitTorrent file distribution system, a torrent file is a computer file that
contains metadata about files and folders to be distributed, and usually also a
list of the network locations of trackers, which are computers that help
participants in the system find each other and form efficient distribution
groups called swarms.
• A torrent file does not contain the contentto be distributed; it only contains
information about those files, such as their names, sizes, folder structure,
and cryptographic hash values for verifying file integrity. Depending on
context,a torrent may be the torrent file or the referenced content.
STRUCTURE OF A TORRENT FILE
• A torrent file is a specially formatted binary file. It always contains a list of files, integrity metadata about all the
pieces, and an optional list of trackers.
• A torrent file is a bencoded dictionary with the following keys:
• Announce : The URL of the tracker
• Info : this maps to a dictionary whose keys are dependenton whether one or more files are being shared:
• Name : suggested file/directory name where the file(s) is/are to be saved
• Piece length : number of bytes per piece. This is commonly 28KiB = 256 KiB = 262,144 B.
• Pieces : a hash list. That is, a concatenation of each piece's SHA-1 hash. As SHA-1 returns a 160-bit hash, pieces will be a string
whose length is a multiple of 160-bits
• Length : size of the file in bytes (only when one file is being shared)
• Files : a list of dictionaries each corresponding to a file (only when multiple files are being shared). Each dictionary has the
following keys:
• Path : a list of strings corresponding to subdirectory names, thelastof which is the actual file name
• Length: sizeof the file in bytes.
All strings must be UTF-8 encoded.
SAMPLE DE-BENCODED TORRENT FILE
• Here is what a de-bencoded torrent file (with piece length 256 KiB = 262144 bytes) for a file debian-
503-amd64-CD-1.iso (whose size is 647 MiB = 678301696 bytes) might look like:
WORKING
HOW IT WORKS !?!
• When we uploada torrent on a tracker’s site, Its tracks the transfers of the files happeningbetween the
uploaderand the persons who downloadthe torrents from that site. The connectionsare announcedto
all the peers and TCP connectionsare setup.
• A seeder to leecher ratio is maintainedand feedbacks are stored for further downloads.
TERMINOLOGY
• Client : The program that enablesp2p file sharing via the BitTorrent protocol.Examples of clients
include µTorrent and Vuze.
• Fake : A fake torrentis a torrent that does not containwhat is specified in its name or description (e.g. a
torrent is said to contain a video, but it containsonly a snapshot of a moment in the video, or in some cases a
virus).
• Health : Health is shown in a bar or in % usually next to the torrent’sname and size, on the site where .torrent
is hosted. It shows if the pieces of the torrentare available to download (i.e. 50% means that only half of the
torrent is available). A torrent with higher number of seeds will be healthier.
• Index : An index is a list of .torrent files (usually includingdescriptionsand other information) managed
by a website and availablefor searches. An index website can also be a tracker.
• Leech : Leech has two meanings. Often, leecher is synonymouswith downloader(see above): simply
describinga peer or any client that does not have 100% of the data. The term also refersto a peer (or
peers) that has a negative effect on the swarmby having a very poor share ratio, downloadingmuch
more than they upload. Leeches may be on asymmetric internet connections or do not leave their
BitTorrent client open to seed the file after their download has completed.However, some leeches
intentionallyavoid uploadingby using modified clients or excessively limiting their upload speed.
• Peer : A peer is one instanceof a BitTorrent client running on a computer on the Internet to which other
clientsconnect and transfer data. Usually a peer does not have the complete file, but only parts of it.
However, in the colloquialdefinition,"peer" can be used to refer to any participantin the swarm (in this
case, it's synonymouswith "client").
• Piece : This refers to the torrented files being dividedup into equalspecific sized pieces (e.g. 64kB,
128kB, 512KB, 1MB, 2MB or 4MB). The pieces are distributedin a random fashionamong peers in order
to optimize trading efficiency.
• Seed : A Seed refers to a peer possessing 100% of the data. When a leech obtains100% of the data,that
peer by definitionbecomes a Seed. Seedingsolenmly refers to leavinga peer's connection availablefor
other peers, i.e. leeches, to downloadfrom. Normally, a peer should seed more data than leech.
However, whether to seed or not, or how much to seed, is dependent on the availabilityof leeches and
the choice of the peer at the seeding end.
• Tracker : A tracker is a server that keeps track of which seeds and peers are in the swarm. Clientsreport
information to the tracker periodicallyand in exchange, receive information about other clientsto
which they can connect. The tracker is not directly involvedin the datatransfer and does not have a
copy of the file.
FROM WHERE TO GET TORRENTS
FEATURES
• Full Selectivity : There is full selectivity of files.
We can choose the files which we need and ignore the junk
files from a torrent.
LOGGING OF EVENTS
FULL MONITORING
STATISTICS
BANDWIDTH MANAGEMENT
CHAT ENVIRONMENT
MORE FACTS AND FEATURES
• Torrents with high seeds to peer ratioscan achieve up to 30MB/s of downloadingspeeds which is not
frequently possible for a single server.
• Torrents work at no profit no loss. Not even a single person is benefittedat all by sharing torrents.
• Basicallyit’s a free service and wealth is only generatedby advertisements.
• Torrents work on P2P connectionsand thus are not dependent of any particularclient or server.
• Bit-Torrent networks use maximum bandwidthand they have increased internet usage 20 to 30 % data
annually.
PROBLEMS AND DRAWBACKS
Piracy is the major drawback of torrents. Torrents include billionsof piratedsoftware.
Distributionof copyright contentis very easy on Torrent directories and are a big threat to Companies
and firms.
MISGUIDING ADVERTISEMENTS
Advertisements sometimes confuse a user and once clicked, One has to pay for that mistake.
Those scripts run Maliciousand Infected Programs on the machine and force the user to download
junky material.
CRACKS AND KEYGENS
PIRACY AND CYBER LAWS
• All these cracks are a means of piracy on the internet.
• Using crack softwares is a crime in many countries and the penalty dependsupon the nations’Cyber
Law.
• According to Section 63 of the Act 1994 of Indian Cyber Law, there is a minimum jail term of 6 months
for copyright infringement.
• The section also provides for fines up to Rs. 2,00,000 and jail term up to three years or both. Any person
or company who indulges in unauthorizedcopying, sale, downloadingor loading of software is
punishableunder this section.
• Distributionof pirated softwares is also a punishableoffence. All such people are committing offences
under Section 66 of Information TechnologyAct, 2000 and are therefore punishableunder Section 66 of
the Information Technology Act
VULNERABILITIES AND KEYHOLES
• Torrents works on specific ports, So a hacker can step into our machine by those ports by following
methods :
• He can intrude as a seeder of a torrent which contain a Trojan
• Through chat rooms of torrent clients, He can get valuable information
• Cracked and Pirated softwares frequently containa virus thus infected users can be used as bots.
• Downloadedfiles may not containthe files mentionedin the description So fake torrents are a waste of
time and money as well.
SECURITY AND COUNTERMEASURES
• Never trust any crack or keygen
• Ensure the reputationof the file
• Check the links before clicking
• Downloadtorrents from verified and trusted sites only
• Use original Softwares, So prefer buying them
• Be aware in the social chat groups
THANK YOU
Harshvardhan Malpani
B.Tech 2nd year student
MaharajaAgrasen Institute of Technology
Affiliatedto GGSIPU
August 2013
Summer Training(Cyber Security, i3indya)

More Related Content

What's hot

Bit Torrent presentation
Bit Torrent presentationBit Torrent presentation
Bit Torrent presentation
Avula Jagadeesh
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technology
guestc67adeb
 
BitTorrent - sharing files has never been easier
BitTorrent - sharing files has never been easierBitTorrent - sharing files has never been easier
BitTorrent - sharing files has never been easier
Mohd253
 
Bit torrent documentation
Bit torrent documentationBit torrent documentation
Bit torrent documentation
Avula Jagadeesh
 
Torrent Protocol
Torrent ProtocolTorrent Protocol
Torrent Protocol
Harsht2888
 

What's hot (20)

BitTorrent
BitTorrentBitTorrent
BitTorrent
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocol
 
Bittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshiBittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshi
 
Bit Torrent presentation
Bit Torrent presentationBit Torrent presentation
Bit Torrent presentation
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technology
 
Bit Torrent technology
Bit Torrent technology Bit Torrent technology
Bit Torrent technology
 
Bit torrent-technology
Bit torrent-technologyBit torrent-technology
Bit torrent-technology
 
Bittorrent final seminar
Bittorrent final seminarBittorrent final seminar
Bittorrent final seminar
 
Bit torrent
Bit torrentBit torrent
Bit torrent
 
Bit torrent protocol by milan varia
Bit torrent protocol by milan variaBit torrent protocol by milan varia
Bit torrent protocol by milan varia
 
Bit torrent ppt
Bit torrent pptBit torrent ppt
Bit torrent ppt
 
UNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTUNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENT
 
Bit Torrent Protocol Report
Bit Torrent Protocol ReportBit Torrent Protocol Report
Bit Torrent Protocol Report
 
BitTorrent - sharing files has never been easier
BitTorrent - sharing files has never been easierBitTorrent - sharing files has never been easier
BitTorrent - sharing files has never been easier
 
Bit torrent documentation
Bit torrent documentationBit torrent documentation
Bit torrent documentation
 
Torrent Protocol
Torrent ProtocolTorrent Protocol
Torrent Protocol
 
Torrent
TorrentTorrent
Torrent
 
Introduction to the Bittorrent Protocol
Introduction to the Bittorrent ProtocolIntroduction to the Bittorrent Protocol
Introduction to the Bittorrent Protocol
 
Bittorrent Basics
Bittorrent BasicsBittorrent Basics
Bittorrent Basics
 
Bit torrent and tracker
Bit torrent and trackerBit torrent and tracker
Bit torrent and tracker
 

Viewers also liked

Basic Linux Security
Basic Linux SecurityBasic Linux Security
Basic Linux Security
pankaj009
 
Linux Operating System Vulnerabilities
Linux Operating System VulnerabilitiesLinux Operating System Vulnerabilities
Linux Operating System Vulnerabilities
Information Technology
 

Viewers also liked (20)

Linux security
Linux securityLinux security
Linux security
 
Linux Security best Practices with Fedora
Linux Security best Practices with FedoraLinux Security best Practices with Fedora
Linux Security best Practices with Fedora
 
Linux security (outline)
Linux security (outline)Linux security (outline)
Linux security (outline)
 
Game cih
Game cihGame cih
Game cih
 
Linux security-fosster-09
Linux security-fosster-09Linux security-fosster-09
Linux security-fosster-09
 
Linux Security Myth
Linux Security MythLinux Security Myth
Linux Security Myth
 
Ethical hacking Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
Ethical hacking   Chapter 9 - Linux Vulnerabilities - Eric VanderburgEthical hacking   Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
Ethical hacking Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
 
Linux security introduction
Linux security introduction Linux security introduction
Linux security introduction
 
linux security: interact with linux
linux security: interact with linuxlinux security: interact with linux
linux security: interact with linux
 
Introduction To Linux Security
Introduction To Linux SecurityIntroduction To Linux Security
Introduction To Linux Security
 
How Many Linux Security Layers Are Enough?
How Many Linux Security Layers Are Enough?How Many Linux Security Layers Are Enough?
How Many Linux Security Layers Are Enough?
 
Kernel Recipes 2013 - Linux Security Modules: different formal concepts
Kernel Recipes 2013 - Linux Security Modules: different formal conceptsKernel Recipes 2013 - Linux Security Modules: different formal concepts
Kernel Recipes 2013 - Linux Security Modules: different formal concepts
 
Basic Linux Security
Basic Linux SecurityBasic Linux Security
Basic Linux Security
 
Linux Security Scanning with Lynis
Linux Security Scanning with LynisLinux Security Scanning with Lynis
Linux Security Scanning with Lynis
 
Security of Linux containers in the cloud
Security of Linux containers in the cloudSecurity of Linux containers in the cloud
Security of Linux containers in the cloud
 
Linux Hardening
Linux HardeningLinux Hardening
Linux Hardening
 
Linux Security, from Concept to Tooling
Linux Security, from Concept to ToolingLinux Security, from Concept to Tooling
Linux Security, from Concept to Tooling
 
Linux Security Overview
Linux Security OverviewLinux Security Overview
Linux Security Overview
 
The Perfect Linux Security Firewalls
The Perfect Linux Security Firewalls The Perfect Linux Security Firewalls
The Perfect Linux Security Firewalls
 
Linux Operating System Vulnerabilities
Linux Operating System VulnerabilitiesLinux Operating System Vulnerabilities
Linux Operating System Vulnerabilities
 

Similar to Torrent technology

Bit Torrent Protocol
Bit Torrent ProtocolBit Torrent Protocol
Bit Torrent Protocol
Ali Habeeb
 
Project_report_BitTorrent
Project_report_BitTorrentProject_report_BitTorrent
Project_report_BitTorrent
Srikanth Vanama
 
Bit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay RBit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay R
Sanjay Ravishankar
 

Similar to Torrent technology (20)

Bittorrent
BittorrentBittorrent
Bittorrent
 
BitTorrent
BitTorrent BitTorrent
BitTorrent
 
Bit Torrent Protocol
Bit Torrent ProtocolBit Torrent Protocol
Bit Torrent Protocol
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Project_report_BitTorrent
Project_report_BitTorrentProject_report_BitTorrent
Project_report_BitTorrent
 
Filesharing using bittorrent protocol
Filesharing using bittorrent protocolFilesharing using bittorrent protocol
Filesharing using bittorrent protocol
 
Peer to peer(p2 p)
Peer to peer(p2 p)Peer to peer(p2 p)
Peer to peer(p2 p)
 
Copy Of Part 4
Copy Of Part 4Copy Of Part 4
Copy Of Part 4
 
(130316) #fitalk bit torrent protocol
(130316) #fitalk   bit torrent protocol(130316) #fitalk   bit torrent protocol
(130316) #fitalk bit torrent protocol
 
Bit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay RBit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay R
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Peer to Peer networks and piracy
Peer to Peer networks and piracyPeer to Peer networks and piracy
Peer to Peer networks and piracy
 
BitTorrent Protocol
BitTorrent ProtocolBitTorrent Protocol
BitTorrent Protocol
 
Lesson 1. General Introduction to IT and Cyber Security.pptx
Lesson 1. General Introduction to IT and Cyber Security.pptxLesson 1. General Introduction to IT and Cyber Security.pptx
Lesson 1. General Introduction to IT and Cyber Security.pptx
 
Detecting BitTorrents Using Snort
Detecting BitTorrents Using SnortDetecting BitTorrents Using Snort
Detecting BitTorrents Using Snort
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocol
 
Bit torrent
Bit torrentBit torrent
Bit torrent
 
P2 p
P2 pP2 p
P2 p
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Torrent technology

  • 1. TORRENT TECHNOLOGY BY- HARSHVARDHAN MALPANI HARSHMALPANI.COM
  • 2. CONTENTS • Introduction • Working • Terminology • Features • Drawbacks • Countermeasures
  • 3. INTRODUCTION • What are Torrents ? • tor·rent (/ˈtôrənt/) • In the BitTorrent file distribution system, a torrent file is a computer file that contains metadata about files and folders to be distributed, and usually also a list of the network locations of trackers, which are computers that help participants in the system find each other and form efficient distribution groups called swarms. • A torrent file does not contain the contentto be distributed; it only contains information about those files, such as their names, sizes, folder structure, and cryptographic hash values for verifying file integrity. Depending on context,a torrent may be the torrent file or the referenced content.
  • 4. STRUCTURE OF A TORRENT FILE
  • 5. • A torrent file is a specially formatted binary file. It always contains a list of files, integrity metadata about all the pieces, and an optional list of trackers. • A torrent file is a bencoded dictionary with the following keys: • Announce : The URL of the tracker • Info : this maps to a dictionary whose keys are dependenton whether one or more files are being shared: • Name : suggested file/directory name where the file(s) is/are to be saved • Piece length : number of bytes per piece. This is commonly 28KiB = 256 KiB = 262,144 B. • Pieces : a hash list. That is, a concatenation of each piece's SHA-1 hash. As SHA-1 returns a 160-bit hash, pieces will be a string whose length is a multiple of 160-bits • Length : size of the file in bytes (only when one file is being shared) • Files : a list of dictionaries each corresponding to a file (only when multiple files are being shared). Each dictionary has the following keys: • Path : a list of strings corresponding to subdirectory names, thelastof which is the actual file name • Length: sizeof the file in bytes. All strings must be UTF-8 encoded.
  • 6. SAMPLE DE-BENCODED TORRENT FILE • Here is what a de-bencoded torrent file (with piece length 256 KiB = 262144 bytes) for a file debian- 503-amd64-CD-1.iso (whose size is 647 MiB = 678301696 bytes) might look like:
  • 8. HOW IT WORKS !?! • When we uploada torrent on a tracker’s site, Its tracks the transfers of the files happeningbetween the uploaderand the persons who downloadthe torrents from that site. The connectionsare announcedto all the peers and TCP connectionsare setup. • A seeder to leecher ratio is maintainedand feedbacks are stored for further downloads.
  • 9. TERMINOLOGY • Client : The program that enablesp2p file sharing via the BitTorrent protocol.Examples of clients include µTorrent and Vuze.
  • 10. • Fake : A fake torrentis a torrent that does not containwhat is specified in its name or description (e.g. a torrent is said to contain a video, but it containsonly a snapshot of a moment in the video, or in some cases a virus). • Health : Health is shown in a bar or in % usually next to the torrent’sname and size, on the site where .torrent is hosted. It shows if the pieces of the torrentare available to download (i.e. 50% means that only half of the torrent is available). A torrent with higher number of seeds will be healthier.
  • 11. • Index : An index is a list of .torrent files (usually includingdescriptionsand other information) managed by a website and availablefor searches. An index website can also be a tracker. • Leech : Leech has two meanings. Often, leecher is synonymouswith downloader(see above): simply describinga peer or any client that does not have 100% of the data. The term also refersto a peer (or peers) that has a negative effect on the swarmby having a very poor share ratio, downloadingmuch more than they upload. Leeches may be on asymmetric internet connections or do not leave their BitTorrent client open to seed the file after their download has completed.However, some leeches intentionallyavoid uploadingby using modified clients or excessively limiting their upload speed.
  • 12. • Peer : A peer is one instanceof a BitTorrent client running on a computer on the Internet to which other clientsconnect and transfer data. Usually a peer does not have the complete file, but only parts of it. However, in the colloquialdefinition,"peer" can be used to refer to any participantin the swarm (in this case, it's synonymouswith "client"). • Piece : This refers to the torrented files being dividedup into equalspecific sized pieces (e.g. 64kB, 128kB, 512KB, 1MB, 2MB or 4MB). The pieces are distributedin a random fashionamong peers in order to optimize trading efficiency.
  • 13. • Seed : A Seed refers to a peer possessing 100% of the data. When a leech obtains100% of the data,that peer by definitionbecomes a Seed. Seedingsolenmly refers to leavinga peer's connection availablefor other peers, i.e. leeches, to downloadfrom. Normally, a peer should seed more data than leech. However, whether to seed or not, or how much to seed, is dependent on the availabilityof leeches and the choice of the peer at the seeding end.
  • 14. • Tracker : A tracker is a server that keeps track of which seeds and peers are in the swarm. Clientsreport information to the tracker periodicallyand in exchange, receive information about other clientsto which they can connect. The tracker is not directly involvedin the datatransfer and does not have a copy of the file.
  • 15. FROM WHERE TO GET TORRENTS
  • 16. FEATURES • Full Selectivity : There is full selectivity of files. We can choose the files which we need and ignore the junk files from a torrent.
  • 22. MORE FACTS AND FEATURES • Torrents with high seeds to peer ratioscan achieve up to 30MB/s of downloadingspeeds which is not frequently possible for a single server. • Torrents work at no profit no loss. Not even a single person is benefittedat all by sharing torrents. • Basicallyit’s a free service and wealth is only generatedby advertisements. • Torrents work on P2P connectionsand thus are not dependent of any particularclient or server. • Bit-Torrent networks use maximum bandwidthand they have increased internet usage 20 to 30 % data annually.
  • 23. PROBLEMS AND DRAWBACKS Piracy is the major drawback of torrents. Torrents include billionsof piratedsoftware. Distributionof copyright contentis very easy on Torrent directories and are a big threat to Companies and firms.
  • 24. MISGUIDING ADVERTISEMENTS Advertisements sometimes confuse a user and once clicked, One has to pay for that mistake. Those scripts run Maliciousand Infected Programs on the machine and force the user to download junky material.
  • 26. PIRACY AND CYBER LAWS • All these cracks are a means of piracy on the internet. • Using crack softwares is a crime in many countries and the penalty dependsupon the nations’Cyber Law. • According to Section 63 of the Act 1994 of Indian Cyber Law, there is a minimum jail term of 6 months for copyright infringement. • The section also provides for fines up to Rs. 2,00,000 and jail term up to three years or both. Any person or company who indulges in unauthorizedcopying, sale, downloadingor loading of software is punishableunder this section. • Distributionof pirated softwares is also a punishableoffence. All such people are committing offences under Section 66 of Information TechnologyAct, 2000 and are therefore punishableunder Section 66 of the Information Technology Act
  • 27. VULNERABILITIES AND KEYHOLES • Torrents works on specific ports, So a hacker can step into our machine by those ports by following methods : • He can intrude as a seeder of a torrent which contain a Trojan • Through chat rooms of torrent clients, He can get valuable information • Cracked and Pirated softwares frequently containa virus thus infected users can be used as bots. • Downloadedfiles may not containthe files mentionedin the description So fake torrents are a waste of time and money as well.
  • 28. SECURITY AND COUNTERMEASURES • Never trust any crack or keygen • Ensure the reputationof the file • Check the links before clicking • Downloadtorrents from verified and trusted sites only • Use original Softwares, So prefer buying them • Be aware in the social chat groups
  • 30. Harshvardhan Malpani B.Tech 2nd year student MaharajaAgrasen Institute of Technology Affiliatedto GGSIPU August 2013 Summer Training(Cyber Security, i3indya)