HOME





Opentracker
Opentracker is a free (licensed as beerware) BitTorrent peer tracker software (a special kind of HTTP or UDP server software) that is designed to be fast and to have a low consumption of system resources. Features Several instances of opentracker may be run in a cluster, with all of them synchronizing with each other. Besides the Hypertext Transfer Protocol (HTTP) opentracker may also be connected to via User Datagram Protocol (UDP), which creates less than half of the tracker traffic HTTP creates. It supports IPv6, gzip compression of full scrapes, and blacklists of torrents. Because there have already been cases of people being accused of copyright violation by the fact that their IP address was listed on a BitTorrent tracker, opentracker may mix in random IP address numbers for the purpose of plausible deniability. Technology It runs completely in RAM, accounting for much of its speed advantage over other tracker software. It is written in C and based on the librar ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

The Pirate Bay
The Pirate Bay, commonly abbreviated as TPB, is a free searchable online index of Film, movies, music, video games, Pornographic film, pornography and software. Founded in 2003 by Swedish think tank , The Pirate Bay facilitates the connection among users of the peer-to-peer BitTorrent, torrent protocol, which are able to contribute to the site through the addition of Magnet URI scheme, magnet links. The Pirate Bay has consistently ranked as one of the most visited torrent websites in the world. Over the years the website has faced several server raids, shutdowns and domain seizures, switching to a series of new web addresses to continue operating. In multiple countries, Internet service providers (ISPs) have been ordered to block access to it. Subsequently, Internet censorship circumvention#Mirrors, caches, and copies, proxy websites have emerged to circumvent the blocks. In April 2009, the website's founders Fredrik Neij, Peter Sunde and Gottfrid Svartholm were found guilty ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Comparison Of BitTorrent Tracker Software
The following is a list of notable software for running a BitTorrent tracker. References

{{BitTorrent BitTorrent Network software comparisons, BitTorrent tracker software File sharing software ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


BitTorrent Tracker
A BitTorrent tracker is a special type of server that assists in the communication between peers using the BitTorrent protocol. In peer-to-peer file sharing, a software client on an end-user PC requests a file, and portions of the requested file residing on peer machines are sent to the client, and then reassembled into a full copy of the requested file. The "tracker" server keeps track of where file copies reside on peer machines, which ones are available at time of the client request, and helps coordinate efficient transmission and reassembly of the copied file. Clients that have already begun downloading a file communicate with the tracker periodically to negotiate faster file transfer with new peers, and provide network performance statistics; however, after the initial peer-to-peer file download is started, peer-to-peer communication can continue without the connection to a tracker. Modern BitTorrent clients may implement a distributed hash table and the peer exchange ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Plausible Deniability
Plausible deniability is the ability of people, typically senior officials in a formal or informal chain of command, to deny knowledge or responsibility for actions committed by or on behalf of members of their organizational hierarchy. They may do so because of a lack of evidence that can confirm their participation, even if they were personally involved in or at least willfully ignorant of the actions. If illegal or otherwise disreputable and unpopular activities become public, high-ranking officials may deny any awareness of such acts to insulate themselves and shift the blame onto the agents who carried out the acts, as they are confident that their doubters will be unable to prove otherwise. The lack of evidence to the contrary ostensibly makes the denial plausible (credible), but sometimes, it makes any accusations only unactionable. The term typically implies forethought, such as intentionally setting up the conditions for the plausible avoidance of responsibility for o ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

C (programming Language)
C (''pronounced'' '' – like the letter c'') is a general-purpose programming language. It was created in the 1970s by Dennis Ritchie and remains very widely used and influential. By design, C's features cleanly reflect the capabilities of the targeted Central processing unit, CPUs. It has found lasting use in operating systems code (especially in Kernel (operating system), kernels), device drivers, and protocol stacks, but its use in application software has been decreasing. C is commonly used on computer architectures that range from the largest supercomputers to the smallest microcontrollers and embedded systems. A successor to the programming language B (programming language), B, C was originally developed at Bell Labs by Ritchie between 1972 and 1973 to construct utilities running on Unix. It was applied to re-implementing the kernel of the Unix operating system. During the 1980s, C gradually gained popularity. It has become one of the most widely used programming langu ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Gzip
gzip is a file format and a software application used for file compression and decompression. The program was created by Jean-loup Gailly and Mark Adler as a free software replacement for the compress program used in early Unix systems, and intended for use by GNU (from which the "g" of gzip is derived). Version 0.1 was first publicly released on 31 October 1992, and version 1.0 followed in February 1993. The decompression of the ''gzip'' format can be implemented as a streaming algorithm, an important feature for Web protocols, data interchange and ETL (in standard pipes) applications. File format gzip is based on the DEFLATE algorithm, which is a combination of LZ77 and Huffman coding. DEFLATE was intended as a replacement for LZW and other patent-encumbered data compression algorithms which, at the time, limited the usability of the compress utility and other popular archivers. "gzip" also refers to the gzip file format (described in the table below). In sho ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Chaos Communication Congress
The Chaos Communication Congress is an annual hacker conference organized by the Chaos Computer Club. The congress features a variety of lectures and workshops on technical and political issues related to security, cryptography, privacy and online freedom of speech. It has taken place regularly at the end of the year since 1984, with the current date and duration (27–30 December) established in 2005. It is considered one of the largest events of its kind, alongside DEF CON in Las Vegas. History The congress is held in Germany. It started in 1984 in Hamburg, moved to Berlin in 1998, and back to Hamburg in 2012, having exceeded the capacity of the Berlin venue with more than attendees. Since then, it attracts an increasing number of people: around attendees in 2012, over in 2015, and more than in 2017. From 2017 to 2019 it has taken place at the Trade Fair Grounds in Leipzig, since the Hamburg venue (CCH) was closed for renovation in 2017 and the existing space was not ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Norwegian Broadcasting Corporation
The Norwegian Broadcasting Corporation (), commonly known by its initialism NRK, is a Norwegian state-run, government-influenced radio and television public broadcasting company. The NRK broadcasts three national TV channels and thirteen national radio channels on digital terrestrial television, digital terrestrial radio and subscription television. They also offer an online video on-demand and podcast streaming service, and produce online and broadcast news. The NRK is a founding member of the European Broadcasting Union and a member of the Norwegian Press Association. Financing Until the start of 2020, about 94% of NRK's funding came from a mandatory annual licence fee payable by anyone who owns or uses a TV or device capable of receiving TV broadcasts. The remainder came from commercial activities such as programme and DVD sales, spin-off products, and certain types of sponsorships. NRK's license income in 2012 was more than 5 billion NOK. In the autumn of 2015, the ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


TorrentFreak
__NOTOC__ TorrentFreak (TF) is a blog dedicated to reporting the latest news and trends on the BitTorrent protocol and file sharing, as well as on copyright infringement and digital rights. The website was started in November 2005 by a Dutchman using the pseudonym "Ernesto van der Sar". He was joined by Andy "Enigmax" Maxwell and Ben Jones in 2007. Regular contributors include Rickard Falkvinge, founder of the Pirate Party. The online publication eCommerceTimes, in 2009, described "Ernesto" as the pseudonym of Lennart Renkema, owner of TorrentFreak. TorrentFreak's text is free content under a Creative Commons Attribution-NonCommercial version 3.0 license. Their lead researcher and community manager was the Pirate Party activist Andrew Norton, from 2007 to 2022. TorrentFreak is incorporated in the Netherlands, with an office in Groningen and a mailing address in Manchester, United Kingdom. Specialist areas According to Canadian law scholar Michael Geist, TorrentFreak " ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Library (computing)
In computing, a library is a collection of System resource, resources that can be leveraged during software development to implement a computer program. Commonly, a library consists of executable code such as compiled function (computer science), functions and Class (computer programming), classes, or a library can be a collection of source code. A resource library may contain data such as images and Text string, text. A library can be used by multiple, independent consumers (programs and other libraries). This differs from resources defined in a program which can usually only be used by that program. When a consumer uses a library resource, it gains the value of the library without having to implement it itself. Libraries encourage software reuse in a Modular programming, modular fashion. Libraries can use other libraries resulting in a hierarchy of libraries in a program. When writing code that uses a library, a programmer only needs to know how to use it not its internal d ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Blacklist
Blacklisting is the action of a group or authority compiling a blacklist of people, countries or other entities to be avoided or distrusted as being deemed unacceptable to those making the list; if people are on a blacklist, then they are considered to have done something wrong, or they are considered to be untrustworthy. As a verb, blacklist can mean to put an individual or entity on such a list. A blacklist is synonymous with a list of banned persons or organizations, and is the opposite of a whitelist. Origins of the term The English dramatist Philip Massinger used the phrase "black list" in his 1639 tragedy ''The Unnatural Combat''. After the Stuart Restoration, restoration of the English monarchy brought Charles II of England to the throne in 1660, a List of regicides of Charles I, list of regicides named those to be punished for the Execution of Charles I, execution of his father. The state papers of Charles II say "If any innocent soul be found in this black list, let him ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


User Datagram Protocol
In computer networking, the User Datagram Protocol (UDP) is one of the core communication protocols of the Internet protocol suite used to send messages (transported as datagrams in Network packet, packets) to other hosts on an Internet Protocol (IP) network. Within an IP network, UDP does not require prior communication to set up communication channels or data paths. UDP is a connectionless protocol, meaning that messages are sent without negotiating a connection and that UDP does not keep track of what it has sent. UDP provides checksums for data integrity, and port numbers for addressing different functions at the source and destination of the datagram. It has no Handshake (computing), handshaking dialogues and thus exposes the user's program to any Reliability (computer networking), unreliability of the underlying network; there is no guarantee of delivery, ordering, or duplicate protection. If error-correction facilities are needed at the network interface level, an applica ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]