Hi All,
Now a days using http,ftp and torrent for download .So let's know some thing about torrent.
Torrent is a very small file whose file name ends with ".torrent" extension. It contains all the information about the file to be downloaded like file name, file size, date of creation and some other information. A torrent file also contains a list of trackers. You can download very large files like games, movies, videos etc very easily using torrents. You can also use torrents to share files with your friends instead of sharing files through messengers.
What is a tracker ?
A tracker is a computer on the internet. It comes into action as soon as you open the .torrent file using a torrent client. Tracker manages the torrent file on the internet. Tracker also allows the parts of the file to be downloaded from more than one server.
What is a seeder ?
A seeder is a person who has more than 0% of the file associated with the torrent file.
What is a leecher ?
A leecher is a person who is attempting to download the files through torrent.
The downloading time will depend on the number of seeders and leechers. More the seeders, lesser the time and more the leechers, more the time.
How to download files using torrent ?
It is very easy to download through torrents. First of all download and install a torrent client software. You need this software to open torrent files. uTorrent , bit torrent ,bit comment etc. Now find a file that you want to download from a torrent search engine. After you find the desired file, the torrent search engine will allow you to download a .torrent file. Download that torrent file. Now open this torrent file using Torrent software and it will start download the file for you.
Saturday, November 13, 2010
Subscribe to:
Post Comments (Atom)
Popular Posts
-
H i All, In comparison to the logical structure, which performs administrative tasks, the Active Directory physical structure checks when ...
-
Hi All, guess who is this guy ? He is Jonathan James born in 1983 December 12 turned out to be the worlds most threatening and biggest...
-
Hi All, Most of the hackers are using this tool for finding vulnerablities in the network.Mostly the penetrating tester are using this t...
-
Hi All, HACK your friend's keyboard and make him type "You are a FOOL" simultaneously: First open a note pad and copy the ...
-
Hi All, Want to have a look at the tools which Jester (the one who did a Ddos distributed denial of service) attack against Wikileaks ? j...
-
Hi All, If you are using Internet Explorer, Outlook or any Application, you can get Dr .Watson Postmortem Debugger error. You can also obse...
-
Hi All, In computer storage devices are devided in to 2 types . Those are 1. primary storage devices . 2. secondary storage devices. ...
-
Hi All, Navigating Google search results with keyboard keys is a long awaited feature. Shortcuts will save your time and speed up your wo...
-
Hi All, This list offers hundreds of operating system product and project names, many of them are based on the same operating system more ...
Followers
Disclaimer
All Data and Information Provided on This BLOG is only for Education purposes only.If you done any thing else these in real time the blog is not Responsible.Try all those on your own risk.
IF you find any thing else here as per in violation of copyright law .mail me on srinathceh@gmail.com as soon as possible action will be taken.
IF you find any thing else here as per in violation of copyright law .mail me on srinathceh@gmail.com as soon as possible action will be taken.
No comments:
Post a Comment