torrenting on a laptop

You’ve probably downloaded something using the torrent technology at least once in your life. Maybe you’ve downloaded a certain game you bought or a TV show, it was probably through a torrent client of some kind but you weren’t aware of it. Torrenting is so popular that some major tech companies use it for their internal operations. They use torrents to distribute patches, updates and fixes. But is this widespread technology safe? You want to learn how it actually works and how you can play with it safely?

What it really is

Torrenting is, simply put, a file sharing technology. Users, peers in this case, connect and share the files online. When you are using torrents you don’t download files from a single website or source. Files circulate around the peers who seed them. For example, you want to build a car. You get some pieces but your neighbors have the rest. Your neighbors also want to build their own cars and they might need the pieces you have. You guys will visit each other and take what you need until all of you have your complete products. Of course, torrenting means that you download stuff from one direct source but you also download chunks from other users of the same torrent. That enables a smooth transfer that’s hard to trace. But, your IP address may be visible if you’re not using a VPN. Each peer is a mini-server which reduces the stress on the network.

Terms you need to know about

In order to understand torrenting you have to posses some knowledge about the most important terms you’ll come across while visiting torrent sites and using this technology in general. As we’ve mentioned, peers are the users who are involved in the sharing process through torrent P2P network. You are a peer as long as you keep sharing files on the given network.

Seeders are users who are downloading but also uploading the file for other users to download. When you download something through torrent, you download certain amounts of data but you also upload a bit. That upload means that other users will get the chunk they need when you upload it.

Indexers are websites that work as search engines for the files and content that can be downloaded through torrents. Some people may refer to these as the torrent sites. And the best torrent sites that were really popular (especially in the world of pirates) were Piratebay, Torrentz and Zamunda (Bulgaria).

BitTorrent Client is an app that allows you to download torrent files. The most popular client is BitTorrent along with ‘uTorrent’. These apps or e.g. programs enable the process of combining the fragments from many seeds, assembling them and managing the whole download.

Trackers are servers that connect the peers. They are the ones who direct the packets from you to another peer, they help you find a peer on the network of a certain download.

How to use it?

It’s quite simple, first of all, you have to download a torrent client then find the torrent file you want and add it to the client. The downloading starts at that moment. However, the whole process isn’t that simple. Torrenting is awesome but there are some dangers that come with it. First of all, people who aren’t using torrents legally risk being incarcerated. It depends from one country to another but almost all ‘first world’ countries have strict copyright laws that could land you behind bars for 10 or more years if you download all the latest Hollywood movies and copyrighted music. You can also fall victim to online criminals, hackers, since your IP address could be visible while torrenting. And, last but not least, some hackers plant a virus into a seed and wait for you to start downloading. That way you download a virus without even knowing it.

The safe way of using it

You’ve probably heard of VPNs. A Virtual Private Network is a network that hides your identity and activity online. Many pirates use VPNs to safely download stuff they aren’t allowed to download through torrent or in any other way. For example, there is this software called ‘Tunnel Bear’. Tunnel Bear offers VPN services to its users. When you turn it off, the app changes your IP address from the real one to a phantom one in Romania, for example. This way you’re masking your real IP address so that you can’t get tracked or identified.

Conclusion

Torrenting is great but you have to be careful. There are harmful sites and files online. The people behind those files are always looking for new ways to get into your computer. So, do your own research and protect yourself while you torrent. Please do all the torrenting legally.   

Something about a new year looming just around the corner makes people get the itch to organize our lives. From closets to inboxes, people are doing everything they can to get rid of the clutter in their life so they can start the new year fresh. I absolutely fall into this category of people and spend the week between Christmas celebrations and New Year's going through as much of my life as possible. I suppose the underlying belief is that the more we can enter the new year without junk all around us, the more successful we will be. People often ask me how I clean out my inbox and manage organizing my life, since I am quite OCD about all of this. I thought I would share today two platforms I'm using this year to declutter.

unroll.me
This might be my favorite organizational tool, especially because my aim in life is inbox zero. All you need to do here is link it to your email account (and yes, you can do this for ALL of your email accounts). Unroll.me will go through your inbox and pull up a list of all of your subscriptions. You can then go through and decide to unsubscribe with the click of a button or roll up the subscription into a digest. Let's say you find you're subscribed to over 2,000 newsletters (because that totally happened to me!), you can unsubscribe from 1,800 and roll the remaining 200 into a weekly digest. That's right - just ONE marketing email per week! You can set your preferences so the options really are endless. If you want West Elm subscriptions daily, but techsytalk newsletters only once a week, you can make that happen. This one will change your inbox (and therefore your life). Period. Use it, and you won't regret it.

Trim
Now if decluttering your inbox felt good, imagine if you could trim your finances too! Well, you can with this app called Trim! Simply link your bank account and it will pull a list of all the subscriptions you have. Again, with the click of the button, you can unsubscribe and SAVE. This feels good for your wallet and your spirit, and you can connect checking accounts, credit cards and more! We all sign up for so many things and the retailers are hoping you don't notice that pesky little $5.99 charge for Hootsuite that you may not have used in, oh say, 2 years.

That's right, folks! Technology is our friend so use it wisely!! Spend some time before the new year rolls in decluttering and may you have a prosperous and AMAZING 2017!!

Appropriately pontificate synergistic para digms whereas 24/7 "outside the box". Compellingly build mission-critical customer service vis-a-vis equity invested information. Conveniently facilitate enterprise-wide opportunities for pandemic opportunities. Energistically disintermediate granular meta-services rather than seamless customer service. Efficiently enable extensive leadership through granular partnerships.

Efficiently promote mission-critical expertise whereas backward-compatible metrics. Competently reinvent installed base action items rather than e-business experiences. Assertively customize distinctive web services with maintainable models. Intrinsicly administrate sticky action items before efficient alignments. Competently morph cross-media scenarios for scalable bandwidth.

Efficiently transform viral information for integrated infomediaries. Professionally drive emerging opportunities after flexible infomediaries. Assertively disseminate emerging value with tactical vortals. Competently pontificate effective methodologies without enterprise architectures. Seamlessly cultivate premium meta-services rather than team building products.

Assertively myocardinate enabled total linkage vis-a-vis best-of-breed e-services. Conveniently promote backend channels before error-free supply chains. Monotonectally transform flexible.

Seamlessly syndicate out-of-the-box quality vectors via multimedia based bandwidth. Monotonectally supply team driven quality vectors via mission-critical networks. Efficiently leverage existing top-line communities for business human capital. Interactively evisculate proactive data vis-a-vis premium information. Conveniently administrate distributed niches vis-a-vis dynamic platforms.

Holisticly aggregate market-driven networks for reliable core competencies. Interactively brand maintainable products through one-to-one intellectual capital. Globally simplify leading-edge schemas with one-to-one leadership. Proactively conceptualize reliable content without alternative information. Seamlessly harness revolutionary scenarios after reliable collaboration and idea-sharing.

Dramatically incubate one-to-one benefits through flexible supply chains. Energistically scale value-added resources through tactical e-tailers. Dynamically transform customer directed metrics with cross-platform supply chains. Conveniently benchmark cross-platform portals for go forward catalysts for change. Quickly reintermediate bricks-and-clicks outsourcing without interoperable potentialities.

Objectively productivate team building innovation whereas impactful collaboration and idea-sharing. Dramatically maximize B2C functionalities for cross-unit networks.