What are uTorrent and Bitorrent

No file sharing without torrenting?

Downloads on a large scale

Lots Internet users sooner or later get the idea of ​​getting files for free from the net. Despite the real danger, due to illegal acts to be punished is that temptation big on the World Wide Web.

Newcomers to the topic of file sharing quickly stumble across the term "Torrent". But this is often passed over with a shrug: Whether the music is downloaded via a Torrent program runs or not is irrelevant for many.

But what is hidden behind the torrent? How does this work principle and under what circumstances will a Warning on a torrent usage? Following items get to the bottom of it.

What is a torrent download? Different definitions

As many lay people short term deal with illegal downloads, the definition of torrent has now been softened a bit. Depending on the context, the term another meaning at.

The torrent as a miniature file

In its original definition, torrents refer to a specific type of Directory file. This file is usually very small and only contains informationthat are coveted for downloading the actually Data are necessary.

That means: All you have to do is download a torrent file not illegal. However, the torrent in itself is for the user worthless. He needs a certain software - a so-called BitTorrent client - to use it.

You can recognize these torrent directory files by their identifier .torrent or .goal. They contain the Locationson which the desired files are located.

The software for torrent downloads

For many users, the term torrent is synonymous with program, which evaluates and uses the torrent files.

The software reads the information from the torrent and starts the accordingly actual download.

Well-known clients include Utorrent (also called µtorrent), Vuze and eMule.

The clients learn from the torrent file which Points the network contains the desired data. You check which computer is connected to the network at this point in time connected are and load the files on the fastest possible way down.

The torrent client must be on your operating system be adjusted. Most of the BitTorrent programs are 2015 with Windows compatible. For other systems, the search for the right software is sometimes more difficult. Utorrent, or µtorrent, works as one of the greatest apps on all of them common operating systems.

Due to the advance of the Smartphones also have a number of programs on the mobile application focused.

The BitTorrent Protocol

After all, the term torrent can do that too protocol be meant with which the software works. As a protocol, the principle that functionality of the download process can be understood.

Most torrent clients use the protocol from Bit torrent. This is based on the creation of a so-called peer-to-peer network (also called a peer-2-peer or P2P network). Such a network is created by the connection a multitude of computers together to create a faster download rate to enable.

When does the use of BitTorrent lead to a warning? The P2P principle is not always illegal

How does the BitTorrent network work? One of the most important characteristics of the network is that of comparative decentralized structure. A server coordinates the requests, but the data is from all connected Computers pulled.

Because of this, the Torrents so elementary for a download: they contain, so to speak, the Directions to the right computers.

Another special feature: The requested data is usually not provided by a single source drawn. The torrent software splits the final file out of many different ones Partial downloads together.

By doing this, the BitTorrent applications get their high speed.

Let's take one example: You want to download a specific image via torrent. To do this, first look for the appropriate one Torrent fileYour client breaks down the information and notices that this picture is, for example, on 100 computers of the network.

However, of these computers there are only 50 currently connected. The software therefore carries out up to 50 partial downloads. Each one contains one Data part. Then the program merges the parts into a whole and you have the picture via torrent from the Network pulled.

Warning: Films downloaded via BitTorrent

Basically, file sharing - i.e. swapping or sharing files over the Internet - is not prohibited. You can use your own pictures so don't worry about one Swap exchange forward it to friends and colleagues and distribute it online.

The situation is different, however, with files that match the copyright subject. This includes movies, music albums, PC games and software. These products are usually just through purchase to acquire - the authors earn money with it.

It is illegalto exchange, distribute and obtain these files via file sharing applications. Basically, the authorities focus on those who are the illegal content provide. But even a torrent download without an upload is never considered legal if copyrighted material is copied in the process.

However, the download can be done through torrenting Warning lead: The principle of the protocol is based on a simultaneous distribution. This means that users who perform a download (called "Leecher" - German: (Blood) Sucker), the data obtained can be downloaded at the same time to offer.

Only when the process completed you can remove the file from your torrent program and distribute it from your computer break up. So if you use a torrent to download films, you are “leechers” and at the same time "Seeder" (Distributor, from the English "to seed", to sow, derived)

The IP address as a key for the investigators

Contrary to some assumptions or wishes, the web is anything but anonymous. Your steps on the internet leave traces, usually on you traced back can be.

Every device that connects to the Internet is assigned a IP address assigned.

This is yours, so to speak Identity card on the net represent.

As long as you do not use obfuscation of your address, all your network activities take place via the IP address of yours Routers.

Investigators could view the stream of illegally shared content as being to a specific one Network address trace back. You then only need one person's address assign.

Through the Interferer liability You can also be held responsible for acts that you did not commit yourself, but which you did from your router perpetrated.
(90 Ratings, average: 4,23 of 5)
No file sharing without torrenting?
4.23590Loading ...

You might also be interested in: