SlideShare una empresa de Scribd logo
1 de 30
Descargar para leer sin conexión
TORRENT TECHNOLOGY
BY- HARSHVARDHAN MALPANI
HARSHMALPANI.COM
CONTENTS
• Introduction
• Working
• Terminology
• Features
• Drawbacks
• Countermeasures
INTRODUCTION
• What are Torrents ?
• tor·rent (/ˈtôrənt/)
• In the BitTorrent file distribution system, a torrent file is a computer file that
contains metadata about files and folders to be distributed, and usually also a
list of the network locations of trackers, which are computers that help
participants in the system find each other and form efficient distribution
groups called swarms.
• A torrent file does not contain the contentto be distributed; it only contains
information about those files, such as their names, sizes, folder structure,
and cryptographic hash values for verifying file integrity. Depending on
context,a torrent may be the torrent file or the referenced content.
STRUCTURE OF A TORRENT FILE
• A torrent file is a specially formatted binary file. It always contains a list of files, integrity metadata about all the
pieces, and an optional list of trackers.
• A torrent file is a bencoded dictionary with the following keys:
• Announce : The URL of the tracker
• Info : this maps to a dictionary whose keys are dependenton whether one or more files are being shared:
• Name : suggested file/directory name where the file(s) is/are to be saved
• Piece length : number of bytes per piece. This is commonly 28KiB = 256 KiB = 262,144 B.
• Pieces : a hash list. That is, a concatenation of each piece's SHA-1 hash. As SHA-1 returns a 160-bit hash, pieces will be a string
whose length is a multiple of 160-bits
• Length : size of the file in bytes (only when one file is being shared)
• Files : a list of dictionaries each corresponding to a file (only when multiple files are being shared). Each dictionary has the
following keys:
• Path : a list of strings corresponding to subdirectory names, thelastof which is the actual file name
• Length: sizeof the file in bytes.
All strings must be UTF-8 encoded.
SAMPLE DE-BENCODED TORRENT FILE
• Here is what a de-bencoded torrent file (with piece length 256 KiB = 262144 bytes) for a file debian-
503-amd64-CD-1.iso (whose size is 647 MiB = 678301696 bytes) might look like:
WORKING
HOW IT WORKS !?!
• When we uploada torrent on a tracker’s site, Its tracks the transfers of the files happeningbetween the
uploaderand the persons who downloadthe torrents from that site. The connectionsare announcedto
all the peers and TCP connectionsare setup.
• A seeder to leecher ratio is maintainedand feedbacks are stored for further downloads.
TERMINOLOGY
• Client : The program that enablesp2p file sharing via the BitTorrent protocol.Examples of clients
include µTorrent and Vuze.
• Fake : A fake torrentis a torrent that does not containwhat is specified in its name or description (e.g. a
torrent is said to contain a video, but it containsonly a snapshot of a moment in the video, or in some cases a
virus).
• Health : Health is shown in a bar or in % usually next to the torrent’sname and size, on the site where .torrent
is hosted. It shows if the pieces of the torrentare available to download (i.e. 50% means that only half of the
torrent is available). A torrent with higher number of seeds will be healthier.
• Index : An index is a list of .torrent files (usually includingdescriptionsand other information) managed
by a website and availablefor searches. An index website can also be a tracker.
• Leech : Leech has two meanings. Often, leecher is synonymouswith downloader(see above): simply
describinga peer or any client that does not have 100% of the data. The term also refersto a peer (or
peers) that has a negative effect on the swarmby having a very poor share ratio, downloadingmuch
more than they upload. Leeches may be on asymmetric internet connections or do not leave their
BitTorrent client open to seed the file after their download has completed.However, some leeches
intentionallyavoid uploadingby using modified clients or excessively limiting their upload speed.
• Peer : A peer is one instanceof a BitTorrent client running on a computer on the Internet to which other
clientsconnect and transfer data. Usually a peer does not have the complete file, but only parts of it.
However, in the colloquialdefinition,"peer" can be used to refer to any participantin the swarm (in this
case, it's synonymouswith "client").
• Piece : This refers to the torrented files being dividedup into equalspecific sized pieces (e.g. 64kB,
128kB, 512KB, 1MB, 2MB or 4MB). The pieces are distributedin a random fashionamong peers in order
to optimize trading efficiency.
• Seed : A Seed refers to a peer possessing 100% of the data. When a leech obtains100% of the data,that
peer by definitionbecomes a Seed. Seedingsolenmly refers to leavinga peer's connection availablefor
other peers, i.e. leeches, to downloadfrom. Normally, a peer should seed more data than leech.
However, whether to seed or not, or how much to seed, is dependent on the availabilityof leeches and
the choice of the peer at the seeding end.
• Tracker : A tracker is a server that keeps track of which seeds and peers are in the swarm. Clientsreport
information to the tracker periodicallyand in exchange, receive information about other clientsto
which they can connect. The tracker is not directly involvedin the datatransfer and does not have a
copy of the file.
FROM WHERE TO GET TORRENTS
FEATURES
• Full Selectivity : There is full selectivity of files.
We can choose the files which we need and ignore the junk
files from a torrent.
LOGGING OF EVENTS
FULL MONITORING
STATISTICS
BANDWIDTH MANAGEMENT
CHAT ENVIRONMENT
MORE FACTS AND FEATURES
• Torrents with high seeds to peer ratioscan achieve up to 30MB/s of downloadingspeeds which is not
frequently possible for a single server.
• Torrents work at no profit no loss. Not even a single person is benefittedat all by sharing torrents.
• Basicallyit’s a free service and wealth is only generatedby advertisements.
• Torrents work on P2P connectionsand thus are not dependent of any particularclient or server.
• Bit-Torrent networks use maximum bandwidthand they have increased internet usage 20 to 30 % data
annually.
PROBLEMS AND DRAWBACKS
Piracy is the major drawback of torrents. Torrents include billionsof piratedsoftware.
Distributionof copyright contentis very easy on Torrent directories and are a big threat to Companies
and firms.
MISGUIDING ADVERTISEMENTS
Advertisements sometimes confuse a user and once clicked, One has to pay for that mistake.
Those scripts run Maliciousand Infected Programs on the machine and force the user to download
junky material.
CRACKS AND KEYGENS
PIRACY AND CYBER LAWS
• All these cracks are a means of piracy on the internet.
• Using crack softwares is a crime in many countries and the penalty dependsupon the nations’Cyber
Law.
• According to Section 63 of the Act 1994 of Indian Cyber Law, there is a minimum jail term of 6 months
for copyright infringement.
• The section also provides for fines up to Rs. 2,00,000 and jail term up to three years or both. Any person
or company who indulges in unauthorizedcopying, sale, downloadingor loading of software is
punishableunder this section.
• Distributionof pirated softwares is also a punishableoffence. All such people are committing offences
under Section 66 of Information TechnologyAct, 2000 and are therefore punishableunder Section 66 of
the Information Technology Act
VULNERABILITIES AND KEYHOLES
• Torrents works on specific ports, So a hacker can step into our machine by those ports by following
methods :
• He can intrude as a seeder of a torrent which contain a Trojan
• Through chat rooms of torrent clients, He can get valuable information
• Cracked and Pirated softwares frequently containa virus thus infected users can be used as bots.
• Downloadedfiles may not containthe files mentionedin the description So fake torrents are a waste of
time and money as well.
SECURITY AND COUNTERMEASURES
• Never trust any crack or keygen
• Ensure the reputationof the file
• Check the links before clicking
• Downloadtorrents from verified and trusted sites only
• Use original Softwares, So prefer buying them
• Be aware in the social chat groups
THANK YOU
Harshvardhan Malpani
B.Tech 2nd year student
MaharajaAgrasen Institute of Technology
Affiliatedto GGSIPU
August 2013
Summer Training(Cyber Security, i3indya)

Más contenido relacionado

La actualidad más candente

Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocolD bipul lomga
 
Bittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshiBittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshidhananjaypardeshi13
 
Bit Torrent presentation
Bit Torrent presentationBit Torrent presentation
Bit Torrent presentationAvula Jagadeesh
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technologyguestc67adeb
 
Bit Torrent technology
Bit Torrent technology Bit Torrent technology
Bit Torrent technology Parth Akbari
 
Bit torrent-technology
Bit torrent-technologyBit torrent-technology
Bit torrent-technologyabhipesit
 
Bittorrent final seminar
Bittorrent final seminarBittorrent final seminar
Bittorrent final seminarChirodeep Das
 
Bit torrent protocol by milan varia
Bit torrent protocol by milan variaBit torrent protocol by milan varia
Bit torrent protocol by milan variaMilan Varia
 
UNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTUNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTSudhansu Dash
 
Bit Torrent Protocol Report
Bit Torrent Protocol ReportBit Torrent Protocol Report
Bit Torrent Protocol ReportSridharBR
 
BitTorrent - sharing files has never been easier
BitTorrent - sharing files has never been easierBitTorrent - sharing files has never been easier
BitTorrent - sharing files has never been easierMohd253
 
Bit torrent documentation
Bit torrent documentationBit torrent documentation
Bit torrent documentationAvula Jagadeesh
 
Torrent Protocol
Torrent ProtocolTorrent Protocol
Torrent ProtocolHarsht2888
 
Introduction to the Bittorrent Protocol
Introduction to the Bittorrent ProtocolIntroduction to the Bittorrent Protocol
Introduction to the Bittorrent Protocoltmont
 

La actualidad más candente (20)

BitTorrent
BitTorrentBitTorrent
BitTorrent
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocol
 
Bittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshiBittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshi
 
Bit Torrent presentation
Bit Torrent presentationBit Torrent presentation
Bit Torrent presentation
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technology
 
Bit Torrent technology
Bit Torrent technology Bit Torrent technology
Bit Torrent technology
 
Bit torrent-technology
Bit torrent-technologyBit torrent-technology
Bit torrent-technology
 
Bittorrent final seminar
Bittorrent final seminarBittorrent final seminar
Bittorrent final seminar
 
Bit torrent
Bit torrentBit torrent
Bit torrent
 
Bit torrent protocol by milan varia
Bit torrent protocol by milan variaBit torrent protocol by milan varia
Bit torrent protocol by milan varia
 
Bit torrent ppt
Bit torrent pptBit torrent ppt
Bit torrent ppt
 
UNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTUNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENT
 
Bit Torrent Protocol Report
Bit Torrent Protocol ReportBit Torrent Protocol Report
Bit Torrent Protocol Report
 
BitTorrent - sharing files has never been easier
BitTorrent - sharing files has never been easierBitTorrent - sharing files has never been easier
BitTorrent - sharing files has never been easier
 
Bit torrent documentation
Bit torrent documentationBit torrent documentation
Bit torrent documentation
 
Torrent Protocol
Torrent ProtocolTorrent Protocol
Torrent Protocol
 
Torrent
TorrentTorrent
Torrent
 
Introduction to the Bittorrent Protocol
Introduction to the Bittorrent ProtocolIntroduction to the Bittorrent Protocol
Introduction to the Bittorrent Protocol
 
Bittorrent Basics
Bittorrent BasicsBittorrent Basics
Bittorrent Basics
 
Bit torrent and tracker
Bit torrent and trackerBit torrent and tracker
Bit torrent and tracker
 

Destacado

Linux security (outline)
Linux security (outline)Linux security (outline)
Linux security (outline)R.Harish Navnit
 
Ethical hacking Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
Ethical hacking   Chapter 9 - Linux Vulnerabilities - Eric VanderburgEthical hacking   Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
Ethical hacking Chapter 9 - Linux Vulnerabilities - Eric VanderburgEric Vanderburg
 
Linux security introduction
Linux security introduction Linux security introduction
Linux security introduction Mohamed Gad
 
linux security: interact with linux
linux security: interact with linuxlinux security: interact with linux
linux security: interact with linuxAmmar WK
 
Introduction To Linux Security
Introduction To Linux SecurityIntroduction To Linux Security
Introduction To Linux SecurityMichael Boman
 
How Many Linux Security Layers Are Enough?
How Many Linux Security Layers Are Enough?How Many Linux Security Layers Are Enough?
How Many Linux Security Layers Are Enough?Michael Boelen
 
Kernel Recipes 2013 - Linux Security Modules: different formal concepts
Kernel Recipes 2013 - Linux Security Modules: different formal conceptsKernel Recipes 2013 - Linux Security Modules: different formal concepts
Kernel Recipes 2013 - Linux Security Modules: different formal conceptsAnne Nicolas
 
Basic Linux Security
Basic Linux SecurityBasic Linux Security
Basic Linux Securitypankaj009
 
Linux Security Scanning with Lynis
Linux Security Scanning with LynisLinux Security Scanning with Lynis
Linux Security Scanning with LynisMichael Boelen
 
Security of Linux containers in the cloud
Security of Linux containers in the cloudSecurity of Linux containers in the cloud
Security of Linux containers in the cloudDobrica Pavlinušić
 
Linux Security, from Concept to Tooling
Linux Security, from Concept to ToolingLinux Security, from Concept to Tooling
Linux Security, from Concept to ToolingMichael Boelen
 
Linux Security Overview
Linux Security OverviewLinux Security Overview
Linux Security OverviewKernel TLV
 
The Perfect Linux Security Firewalls
The Perfect Linux Security Firewalls The Perfect Linux Security Firewalls
The Perfect Linux Security Firewalls david rom
 
Linux Operating System Vulnerabilities
Linux Operating System VulnerabilitiesLinux Operating System Vulnerabilities
Linux Operating System VulnerabilitiesInformation Technology
 

Destacado (20)

Linux security
Linux securityLinux security
Linux security
 
Linux Security best Practices with Fedora
Linux Security best Practices with FedoraLinux Security best Practices with Fedora
Linux Security best Practices with Fedora
 
Linux security (outline)
Linux security (outline)Linux security (outline)
Linux security (outline)
 
Game cih
Game cihGame cih
Game cih
 
Linux security-fosster-09
Linux security-fosster-09Linux security-fosster-09
Linux security-fosster-09
 
Linux Security Myth
Linux Security MythLinux Security Myth
Linux Security Myth
 
Ethical hacking Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
Ethical hacking   Chapter 9 - Linux Vulnerabilities - Eric VanderburgEthical hacking   Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
Ethical hacking Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
 
Linux security introduction
Linux security introduction Linux security introduction
Linux security introduction
 
linux security: interact with linux
linux security: interact with linuxlinux security: interact with linux
linux security: interact with linux
 
Introduction To Linux Security
Introduction To Linux SecurityIntroduction To Linux Security
Introduction To Linux Security
 
How Many Linux Security Layers Are Enough?
How Many Linux Security Layers Are Enough?How Many Linux Security Layers Are Enough?
How Many Linux Security Layers Are Enough?
 
Kernel Recipes 2013 - Linux Security Modules: different formal concepts
Kernel Recipes 2013 - Linux Security Modules: different formal conceptsKernel Recipes 2013 - Linux Security Modules: different formal concepts
Kernel Recipes 2013 - Linux Security Modules: different formal concepts
 
Basic Linux Security
Basic Linux SecurityBasic Linux Security
Basic Linux Security
 
Linux Security Scanning with Lynis
Linux Security Scanning with LynisLinux Security Scanning with Lynis
Linux Security Scanning with Lynis
 
Security of Linux containers in the cloud
Security of Linux containers in the cloudSecurity of Linux containers in the cloud
Security of Linux containers in the cloud
 
Linux Hardening
Linux HardeningLinux Hardening
Linux Hardening
 
Linux Security, from Concept to Tooling
Linux Security, from Concept to ToolingLinux Security, from Concept to Tooling
Linux Security, from Concept to Tooling
 
Linux Security Overview
Linux Security OverviewLinux Security Overview
Linux Security Overview
 
The Perfect Linux Security Firewalls
The Perfect Linux Security Firewalls The Perfect Linux Security Firewalls
The Perfect Linux Security Firewalls
 
Linux Operating System Vulnerabilities
Linux Operating System VulnerabilitiesLinux Operating System Vulnerabilities
Linux Operating System Vulnerabilities
 

Similar a Torrent technology (20)

Bittorrent
BittorrentBittorrent
Bittorrent
 
BitTorrent
BitTorrent BitTorrent
BitTorrent
 
Bit Torrent Protocol
Bit Torrent ProtocolBit Torrent Protocol
Bit Torrent Protocol
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Project_report_BitTorrent
Project_report_BitTorrentProject_report_BitTorrent
Project_report_BitTorrent
 
Filesharing using bittorrent protocol
Filesharing using bittorrent protocolFilesharing using bittorrent protocol
Filesharing using bittorrent protocol
 
Peer to peer(p2 p)
Peer to peer(p2 p)Peer to peer(p2 p)
Peer to peer(p2 p)
 
Copy Of Part 4
Copy Of Part 4Copy Of Part 4
Copy Of Part 4
 
(130316) #fitalk bit torrent protocol
(130316) #fitalk   bit torrent protocol(130316) #fitalk   bit torrent protocol
(130316) #fitalk bit torrent protocol
 
Bit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay RBit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay R
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Peer to Peer networks and piracy
Peer to Peer networks and piracyPeer to Peer networks and piracy
Peer to Peer networks and piracy
 
BitTorrent Protocol
BitTorrent ProtocolBitTorrent Protocol
BitTorrent Protocol
 
Lesson 1. General Introduction to IT and Cyber Security.pptx
Lesson 1. General Introduction to IT and Cyber Security.pptxLesson 1. General Introduction to IT and Cyber Security.pptx
Lesson 1. General Introduction to IT and Cyber Security.pptx
 
Detecting BitTorrents Using Snort
Detecting BitTorrents Using SnortDetecting BitTorrents Using Snort
Detecting BitTorrents Using Snort
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocol
 
Bit torrent
Bit torrentBit torrent
Bit torrent
 
P2 p
P2 pP2 p
P2 p
 

Último

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Último (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Torrent technology

  • 1. TORRENT TECHNOLOGY BY- HARSHVARDHAN MALPANI HARSHMALPANI.COM
  • 2. CONTENTS • Introduction • Working • Terminology • Features • Drawbacks • Countermeasures
  • 3. INTRODUCTION • What are Torrents ? • tor·rent (/ˈtôrənt/) • In the BitTorrent file distribution system, a torrent file is a computer file that contains metadata about files and folders to be distributed, and usually also a list of the network locations of trackers, which are computers that help participants in the system find each other and form efficient distribution groups called swarms. • A torrent file does not contain the contentto be distributed; it only contains information about those files, such as their names, sizes, folder structure, and cryptographic hash values for verifying file integrity. Depending on context,a torrent may be the torrent file or the referenced content.
  • 4. STRUCTURE OF A TORRENT FILE
  • 5. • A torrent file is a specially formatted binary file. It always contains a list of files, integrity metadata about all the pieces, and an optional list of trackers. • A torrent file is a bencoded dictionary with the following keys: • Announce : The URL of the tracker • Info : this maps to a dictionary whose keys are dependenton whether one or more files are being shared: • Name : suggested file/directory name where the file(s) is/are to be saved • Piece length : number of bytes per piece. This is commonly 28KiB = 256 KiB = 262,144 B. • Pieces : a hash list. That is, a concatenation of each piece's SHA-1 hash. As SHA-1 returns a 160-bit hash, pieces will be a string whose length is a multiple of 160-bits • Length : size of the file in bytes (only when one file is being shared) • Files : a list of dictionaries each corresponding to a file (only when multiple files are being shared). Each dictionary has the following keys: • Path : a list of strings corresponding to subdirectory names, thelastof which is the actual file name • Length: sizeof the file in bytes. All strings must be UTF-8 encoded.
  • 6. SAMPLE DE-BENCODED TORRENT FILE • Here is what a de-bencoded torrent file (with piece length 256 KiB = 262144 bytes) for a file debian- 503-amd64-CD-1.iso (whose size is 647 MiB = 678301696 bytes) might look like:
  • 8. HOW IT WORKS !?! • When we uploada torrent on a tracker’s site, Its tracks the transfers of the files happeningbetween the uploaderand the persons who downloadthe torrents from that site. The connectionsare announcedto all the peers and TCP connectionsare setup. • A seeder to leecher ratio is maintainedand feedbacks are stored for further downloads.
  • 9. TERMINOLOGY • Client : The program that enablesp2p file sharing via the BitTorrent protocol.Examples of clients include µTorrent and Vuze.
  • 10. • Fake : A fake torrentis a torrent that does not containwhat is specified in its name or description (e.g. a torrent is said to contain a video, but it containsonly a snapshot of a moment in the video, or in some cases a virus). • Health : Health is shown in a bar or in % usually next to the torrent’sname and size, on the site where .torrent is hosted. It shows if the pieces of the torrentare available to download (i.e. 50% means that only half of the torrent is available). A torrent with higher number of seeds will be healthier.
  • 11. • Index : An index is a list of .torrent files (usually includingdescriptionsand other information) managed by a website and availablefor searches. An index website can also be a tracker. • Leech : Leech has two meanings. Often, leecher is synonymouswith downloader(see above): simply describinga peer or any client that does not have 100% of the data. The term also refersto a peer (or peers) that has a negative effect on the swarmby having a very poor share ratio, downloadingmuch more than they upload. Leeches may be on asymmetric internet connections or do not leave their BitTorrent client open to seed the file after their download has completed.However, some leeches intentionallyavoid uploadingby using modified clients or excessively limiting their upload speed.
  • 12. • Peer : A peer is one instanceof a BitTorrent client running on a computer on the Internet to which other clientsconnect and transfer data. Usually a peer does not have the complete file, but only parts of it. However, in the colloquialdefinition,"peer" can be used to refer to any participantin the swarm (in this case, it's synonymouswith "client"). • Piece : This refers to the torrented files being dividedup into equalspecific sized pieces (e.g. 64kB, 128kB, 512KB, 1MB, 2MB or 4MB). The pieces are distributedin a random fashionamong peers in order to optimize trading efficiency.
  • 13. • Seed : A Seed refers to a peer possessing 100% of the data. When a leech obtains100% of the data,that peer by definitionbecomes a Seed. Seedingsolenmly refers to leavinga peer's connection availablefor other peers, i.e. leeches, to downloadfrom. Normally, a peer should seed more data than leech. However, whether to seed or not, or how much to seed, is dependent on the availabilityof leeches and the choice of the peer at the seeding end.
  • 14. • Tracker : A tracker is a server that keeps track of which seeds and peers are in the swarm. Clientsreport information to the tracker periodicallyand in exchange, receive information about other clientsto which they can connect. The tracker is not directly involvedin the datatransfer and does not have a copy of the file.
  • 15. FROM WHERE TO GET TORRENTS
  • 16. FEATURES • Full Selectivity : There is full selectivity of files. We can choose the files which we need and ignore the junk files from a torrent.
  • 22. MORE FACTS AND FEATURES • Torrents with high seeds to peer ratioscan achieve up to 30MB/s of downloadingspeeds which is not frequently possible for a single server. • Torrents work at no profit no loss. Not even a single person is benefittedat all by sharing torrents. • Basicallyit’s a free service and wealth is only generatedby advertisements. • Torrents work on P2P connectionsand thus are not dependent of any particularclient or server. • Bit-Torrent networks use maximum bandwidthand they have increased internet usage 20 to 30 % data annually.
  • 23. PROBLEMS AND DRAWBACKS Piracy is the major drawback of torrents. Torrents include billionsof piratedsoftware. Distributionof copyright contentis very easy on Torrent directories and are a big threat to Companies and firms.
  • 24. MISGUIDING ADVERTISEMENTS Advertisements sometimes confuse a user and once clicked, One has to pay for that mistake. Those scripts run Maliciousand Infected Programs on the machine and force the user to download junky material.
  • 26. PIRACY AND CYBER LAWS • All these cracks are a means of piracy on the internet. • Using crack softwares is a crime in many countries and the penalty dependsupon the nations’Cyber Law. • According to Section 63 of the Act 1994 of Indian Cyber Law, there is a minimum jail term of 6 months for copyright infringement. • The section also provides for fines up to Rs. 2,00,000 and jail term up to three years or both. Any person or company who indulges in unauthorizedcopying, sale, downloadingor loading of software is punishableunder this section. • Distributionof pirated softwares is also a punishableoffence. All such people are committing offences under Section 66 of Information TechnologyAct, 2000 and are therefore punishableunder Section 66 of the Information Technology Act
  • 27. VULNERABILITIES AND KEYHOLES • Torrents works on specific ports, So a hacker can step into our machine by those ports by following methods : • He can intrude as a seeder of a torrent which contain a Trojan • Through chat rooms of torrent clients, He can get valuable information • Cracked and Pirated softwares frequently containa virus thus infected users can be used as bots. • Downloadedfiles may not containthe files mentionedin the description So fake torrents are a waste of time and money as well.
  • 28. SECURITY AND COUNTERMEASURES • Never trust any crack or keygen • Ensure the reputationof the file • Check the links before clicking • Downloadtorrents from verified and trusted sites only • Use original Softwares, So prefer buying them • Be aware in the social chat groups
  • 30. Harshvardhan Malpani B.Tech 2nd year student MaharajaAgrasen Institute of Technology Affiliatedto GGSIPU August 2013 Summer Training(Cyber Security, i3indya)