Theory behind torrent downloads

BitTorrent well they are known as  peer to peer file sharing protocol which are used for distributing large amounts of data,these are one of the most common protocols used for transferring large files,and these are estimated that it accounts for roughly 25-60% of all Internet traffic these values varies depending on geographical location.It was designed by a programmer from UNITED STATES name Bram Cohen in April 2001 and released a first implementation on 2 JULY 2001.

This protocol  initially works when a file provider make his file or groups of files available to the network which are known as SEED and the other as PEERS, the work of SEED and PEERS  are such that SEED allows to connect to the file and PEERS helps in downloading the file.Each PEERS who download a part of data makes it available to other PEERS to download. After the file is successfully downloaded by a peer,may continue to make the data available,becoming additional SEED.This distributed nature leads to a viral spreading of file throughout peers.

IF YOU WANT TO CREATE AND PUBLISH TORRENT THEN THIS IS HOW YOU HAVE TO START:

 The peer distributing a data file treats the file as a number of identically sized pieces, usually with byte which sizes a power of 2,and it lies typically between 32 KB  and 4 MB each. These peer creates a hash(A hash function is any well defined procedure or mathematical function that converts a large, possibly variable-sized amount of data into a small datum, usually a single integer that may serve as an index to an array.) for each single piece by using SHA-1(cryptographic hash function) hash function which helps to record it in torrent file.The pieces which are greater thn 512 KB will help in reducing the size of a torrent file for a very lagre payload,but is claimed to reduce the efficiency of the protocol. When another peer later receives a particular piece, the hash of the piece is compared to the recorded hash to test that the piece is error-free.

The correct and exact information contained in the torrent file depends on the version used in the BIT TORRENT protocol.The torrent files has the extension as .torrent. Torrent files have an “announce” section, which specifies the URL of the tracker, and an “info” section, containing (suggested) names for the files, their lengths, the piece length used, and a SHA-1 hash code for each piece, all of which are used by clients to verify the integrity of the data they receive.

For publishing a torrent files we need to have a web site and we must have to register it with atleast one tracker.The tracker keeps the record of the client participating in torrent.

Downloading torrents and sharing files:

Users browse the web to find a torrent of interest, download it, and open it with a BitTorrent client. The client connects to the tracker(s) specified in the torrent file, from which it receives a list of peers currently transferring pieces of the file(s) specified in the torrent. The client connects to those peers to obtain the various pieces. If the swarm contains only the initial seeder, the client connects directly to it and begins to request pieces.

Clients incorporate mechanisms to optimize their download and upload rates; for example they download pieces in a random order to increase the opportunity to exchange data, which is only possible if two peers have different pieces of the file. The effectiveness of this data exchange depends largely on the policies that clients use to determine to whom to send data. Clients may prefer to send data to peers that send data back to them  which encourages fair trading. But strict policies often result in suboptimal situations, such as when newly joined peers are unable to receive any data because they don’t have any pieces yet to trade themselves or when two peers with a good connection between them do not exchange data simply because neither of them takes the initiative. To counter these effects, the official BitTorrent client program uses a mechanism called “optimistic unchoking”, whereby the client reserves a portion of its available bandwidth for sending pieces to random peers (not necessarily known good partners, so called preferred peers) in hopes of discovering even better partners and to ensure that newcomers get a chance to join the swarm.

The community of BitTorrent users frowns upon the practice of disconnecting from the network immediately upon success of a file download, and encourages remaining as another seed for as long as practical, which may be days – especially when there are a lot of downloading peers and when the ratio of seeders to downloading peers is low.

Increase your Internet Speed

Here’s how you increase your Internet Speed by limiting the reserved bandwidth.

1.) log on as Administrator.

2.) start – run – type gpedit.msc

3.) expand “local computer policy”

4.) then expand “administrative templates”

5.) then expand “network branch”

6.) Highlight the “QoS Packet Scheduler”

7.) on right window double click “limit reservable bandwidth”

8.) on setting tab check the “enabled”

9.) change “Bandwidth limit %” to 0

You’re done.It would be a good idea to reboot after this.

Cracking and hacking Internet Download Manager (IDM)

I am explaining the manual hacking method because most of my users said that patch and keygen contain viruses. This hack also works for trail IDM that means download a trail IDM from site and register the professional i.e. full version of IDM with your credentials for free using This hack.

NO MORE FAKE SERIAL KEY WARNING MESSAGE

Step 1: Download the IDM trial or If you already have IDM installed Update it by going to Help then to check for Updates.If you don’t wanna update your version, Just click on Registration.

Step2: When you click on registration, Now a new dialog(window) appears that is asking for Name, Last Name, Email Address and Serial Key.

Step3: Now Enter you name, last name, email address and in field of Serial Key enter any of the following

Keys:
RLDGN-OV9WU-5W589-6VZH1
HUDWE-UO689-6D27B-YM28M

UK3DV-E0MNW-MLQYX-GENA1
398ND-QNAGY-CMMZU-ZPI39
GZLJY-X50S3-0S20D-NFRF9
W3J5U-8U66N-D0B9M-54SLM
EC0Q6-QN7UH-5S3JB-YZMEK
UVQW0-X54FE-QW35Q-SNZF5
FJJTJ-J0FLF-QCVBK-A287M
And click on ok to register.

Step4: After you click ok, it will show an error message that you have registered IDM using fake serial key and IDM will exit. Now here the hack starts.

Step5: Now Go to START => Then go to RUN and type the following text and click enter:

notepad %windir%system32driversetchosts

Step6: Now right click on hosts file and go to its properties, then go to security tab and then select your admin account, just below u will see an edit button (in front of change permissions), Now give the user full control and write and read rights and then click on apply and then click on Ok, now u will be able to edit the hosts file and save changes in it.
Detail Note about Granting Permission In Windows7:
For Windows 7 users, due to security reasons you will not be able to save hosts file.so follow this steps :
First of all go to C:/ drive then go to Windows Folder and then go to System32 folder and then go to Drivers folder and then go to Etc Folder, in the Etc folder you will see the hosts file.
Now right click on hosts file and go to its properties then go to Security tab select Users under Group or user names and click on edit button,Permission For Host Window will get open, in that window select Users account and grant permission in bellow section which is “Permission for SYSTEM” by clicking all checkbox under “Allow” Name and press Ok.Dnt click on any Deny check box.
Note : if  you have login through admin then skip this step6 .Its just for granting permission for editing file.

Step7: Now a notepad file appears something like this as shown below:
add code in the hosts file idm
Now copy the below lines of code and add to hosts file as shown above image box :

127.0.0.1 tonec.com
127.0.0.1 www.tonec.com
127.0.0.1 registeridm.com
127.0.0.1 www.registeridm.com
127.0.0.1 secure.registeridm.com
127.0.0.1 internetdownloadmanager.com
127.0.0.1 www.internetdownloadmanager.com
127.0.0.1 secure.internetdownloadmanager.com
127.0.0.1 mirror.internetdownloadmanager.com
127.0.0.1 mirror2.internetdownloadmanager.com

After adding these piece of code, save the notepad file. And exit from there. Now start your Internet download manager, and now you IDM has been converted to full version and specially when you update next time, your registration will not expire.That means it will remain full version for life time and you can update it without any problem in future. Proof of Successfully Hacking IDM:

I hope you are now able to convert your Trial version of IDM into Full Version. 🙂