Search

Google
 

Sunday, January 6, 2008

Port forwarding

Port forwarding (sometimes referred to as tunneling) is the act of forwarding a network port from one network node to another. This technique can allow an external user to reach a port on a private IP address (inside a LAN) from the outside via a NAT-enabled router.

Port forwarding allows remote computers (e.g. public machines on the Internet) to connect to a specific computer within a private LAN.

For example:

* forwarding ports 80 or 443 to run an HTTP webserver
* forwarding port 22 to allow Secure Shell access
* forwarding port 21 to allow FTP access

What port to use? Well generally it is accepted that everything above 30.000 is good.

How to open a port for torrent? Well on this site you will find good guides to many router types.

ProtoWall

ProtoWall (formerly eWall) is a closed-source freeware program for IP blocking that is similar to PeerGuardian from Phoenix Labs. It is designed to block connections from organizations such as the RIAA and MPAA while using filesharing networks. (source=Wikipedia)

Protowall is a lightweight application which runs in the background, taking up little CPU and memory, while blocking thousands of bad IP addresses. In Protowall, all the work is done by the driver that filters each packet, extracts the IP header and then compares the address with the ones in the table, then either discards or permits the packet to pass.

The GUI is essentially
a "driver instructor" that communicates to the driver the IP list to check against. The GUI also receives notifications from the driver when a packet arrives and when actions are performed with a packet. Protowall Blocks both inbound and outbound packets.

Protowall blocks incoming packets from Internet addresses that are on the Bluetack Blacklists. This is handled by another program called the Blocklist Manager. This program finds and retrieves lists of bad IP addresses. They are sorted (overlapping resolved) and then converted to various formats such as Protowall, PeerGuardian & other common applications and firewalls.
(sorce=Softpedia)

Note: Protowall only works on Windows NT based Operating Systems such as Windows XP/2000/2003. Currently Protowall is not 64 bit compliant due to a change in the ndis driver.

Download:

ProtoWall 2.01 Build 9 - Beta
ProtoWall 2.01 Build 9 - Stable

Saturday, January 5, 2008

PeerGuardian

PeerGuardian is a free and open source programs developed by Phoenix Labs. They are capable of blocking incoming and outgoing connections based on IP blocklists. The system is also capable of blocking advertising, spyware, government and educational ranges, depending upon user preferences.

How can this application help you?
It blocks the IP of reported governmental and/or anti p2p organizations. This way it protecting your IP, and identity.

PeerGuardian 2

PeerGuardian 2 for Windows 98/ME 0.82MiB
PeerGuardian 2 for Windows 2000/XP/2003 0.84MiB
PeerGuardian 2 for Windows XP/2003 x64 Edition 1.07MiB
PeerGuardian 2 source code (for programmers) 1.33MiB


Note: PeerGuardian 2 supports Windows 98, ME, 2000, XP, and 2003, in 32-bit and 64-bit no support Windows Vista at the moment.

PeerGuardian Lite

PeerGuardian Lite is a derivative of PeerGuardian 2 made to consume as little CPU/RAM as possible. It has no UI or options and consists of a single tray icon.

PeerGuardian Lite for Windows 2000/XP/2003 87KiB
PeerGuardian Lite for Windows XP/2003 x64 Edition 125KiB
PeerGuardian Lite source code (for programmers) 66KiB

Once installed click on the tray icon of PG go to Settings, uncheck Log allowed connections in the History tab. After that change the Do nothing to Remove Every 5-7 days. This is important because if you don't make these settings. PG2 just saves the allowed and blocked connections, and in a couple of months this data builds up consuming your free space.

Friday, January 4, 2008

Gtorrent (Greedy Torrent)

Well here is first survival program for a leech: Greedy Torrent

GreedyTorrent has the following features:
  • GreedyTorrent is set-once-and-forget type software. No need of configuring it each time you queue a torrent file to download.
  • No complicated options to configure. The default installation of GreedyTorrent is configured to provide you five times actual upload, enough for the survival of a normal ADSL user. There is no need to manually find the hash values or to set tracker URLs, it takes care of them automatically. GreedyTorrent was developed with the beginner user in mind, with an easy to use interface.
  • GreedyTorrent generates no additional traffic. It does not run or emulate an "extra torrent client", and thus does not waste your precious bandwidth.
  • You can continue to use your favorite BitTorrent client, no need to switch to another BitTorrent client to use GreedyTorrent.
How does it work?

GreedyTorrent is implemented as a proxy for BitTorrent tracker protocol. It, once installed, sits in the system tray and waits for the BitTorrent client to make a request to the tracker. Once the BitTorrent client is connected and attempts to report the uploaded quantity, GreedyTorrent modifies the upload ratio to report according to your preferences.

GreedyTorrent allows you to be in control of your upload ratio. You can set it as a multiple of either your download or upload. For example, to maintain a 1:1 ratio for a poor uploader, a multiple of 1 times the actual download would be enough. This has the advantage that the torrent file you download always maintains 1:1 ratio, no matter how poor your actual upload is. Suppose you have a fair upload speed and you just want to double your upload ratio. You can select a multiple of 2 times the upload.

Supported clients:

  1. uTorrent 1.6 and above
  2. Azureus 2.5 and above
  3. BitLord 1.1
  4. BitTyrant 1.1
Configuring the clients:

1.) uTorrent:
  1. Go to Options > Preferences menu in uTorrent.
  2. Select Connection in the left tree view.
  3. Under the section titled Proxy Server, enter the following.
  4. Specify type as HTTP
  5. Enter localhost as proxy
  6. Enter 3456 as Port (or use the port you have configured in GreedyTorrent's preferences)
  7. Click OK to save.
Click on the thumbnail bellow to enlarge a screenshot:

Free Image Hosting at www.ImageShack.us

2.)Azureus

You need to enable advanced configuration mode in Azureus first.
Go to Tools > Configuration Wizard menu and select Advanced in the User proficiency section of the second step of the wizard. Complete the wizard by clicking Next and Finish.

Free Image Hosting at www.ImageShack.us

  1. Go to Tools > Options menu in Azureus.
  2. Expand Connection in the left tree view and select Proxy Options
  3. Under the first section titled Tracker Communications, enter the following.
  4. Make sure you have the Enable proxying of tracker communications box checked
  5. Specify localhost for Host
  6. Enter 3456 as Port (or use the port you have configured in GreedyTorrent's preferences)
  7. Make sure you have the I have a SOCKS proxy option unchecked
  8. Leave the boxes Username and Password as blank.
  9. Click OK to save.
  10. Restart Azureus by selecting File > Restart Azureus

Free Image Hosting at www.ImageShack.us

3.)BitLord

  1. Go to Options > Preferences menu in BitLord.
  2. Select Proxy under Connection in the left tree view.
  3. Under the section titled Proxy Server Settings, enter the following.
  4. Select Proxy Type as HTTP1.1
  5. Enter localhost as Proxy Server
  6. Enter 3456 as Proxy Port (or use the port you have configured in GreedyTorrent's preferences)
  7. Make sure you have the Use Proxy only for HTTP connections (Tracker Connections) option checked
  8. Click OK to save and restart BitLord.
Free Image Hosting at www.ImageShack.us

4.) BitTyrant

BitTyrant is a client based on modifications to the Azureus 2.5 code base. The configuration steps are same as that of Azureus. You can click the link below to view the configuration steps for Azureus and follow the same to get BitTyrant to work with GreedyTorrent.

Download Greedy Torrent

What is Bittorent? What is a client? What is a tracker?

What is Bittorent?

BitTorrent is a peer-to-peer file sharing (P2P) communications protocol. BitTorrent is a method of distributing large amounts of data widely without the original distributor incurring the entire costs of hardware, hosting and bandwidth resources. Instead, when data is distributed using the BitTorrent protocol, each recipient supplies pieces of the data to newer recipients, reducing the cost and burden on any given individual source, providing redundancy against system problems, and reducing dependence on the original distributor.

The protocol is the brainchild of programmer Bram Cohen, who designed it in April 2001 and released a first implementation on 2 July 2001. It is now maintained by Cohen's company BitTorrent, Inc.

What is a BitTorrent client?

A BitTorrent client is any program that implements the BitTorrent protocol. Each client is capable of preparing, requesting, and transmitting any type of computer file over a network, using the protocol. A peer is any computer running an instance of a client.

To share a file or group of files, a peer first creates a "torrent." This small file contains metadata about the files to be shared and about the tracker, the computer that coordinates the file distribution. Peers that want to download the file first obtain a torrent file for it, and connect to the specified tracker, which tells them from which other peers to download the pieces of the file.

Though both ultimately transfer files over a network, a BitTorrent download differs from a classic full-file HTTP request in several fundamental ways:

* BitTorrent makes many small P2P requests over different TCP sockets, while web-browsers typically make a single HTTP GET request over a single TCP socket.
* BitTorrent downloads in a random or in a "rarest-first" approach that ensures high availability, while HTTP downloads in a sequential manner.

Taken together, these differences allow BitTorrent to achieve much lower cost, much higher redundancy, and much greater resistance to abuse or to "flash crowds" than a regular HTTP server. However, this protection comes at a cost: downloads can take time to rise to full speed because it may take time for enough peer connections to be established, and it takes time for a node to receive sufficient data to become an effective uploader. As such, a typical BitTorrent download will gradually rise to very high speeds, and then slowly fall back down toward the end of the download. This contrasts with an HTTP server that, while more vulnerable to overload and abuse, rises to full speed very quickly and maintains this speed throughout.

Which client is the best?

The first client, known as BitTorrent, was created by Bram Cohen in the summer of 2002. Most of the other clients are based at least in part on BitTorrent, and even more are being created right now.

In my opinion the best client is uTorrent(Microtorrent), because it is considered as the most lightweight and resource friendly. Followed by Azureus, which is complex as uTorrent but uses several times more resources and requires Java to run.

What is a tracker?

A BitTorrent tracker is a server which assists in the communication between peers using the BitTorrent protocol. It is also, in the absence of extensions to the original protocol, the only major critical point, as clients are required to communicate with the tracker to initiate downloads. (Clients that have already begun downloading also communicate with the tracker periodically to negotiate with newer peers and provide statistics; however, after the initial reception of peer data, peer communication can continue without a tracker.)