Friday, December 31, 2004
Exeem "Successor" to Suprnova Announced
LokiTorrent fights MPAA legal attack
LokiTorrent, a Web site and index of files available through a peer-to-peer technology known as BitTorrent, posted a letter from the Motion Picture Association of America (MPAA) on its site on Tuesday. The letter states that the MPAA has filed suit in district court in Texas against the site and demands that Loki Torrent cease linking to video files that could infringe on studios' copyrights."
Thursday, December 30, 2004
The BitTorrent Effect
BTSlave
Wednesday, December 29, 2004
Formatting table in BTQueue
First, you have to know the basic. A table consists of a set of columns. What you can do is to rearrange column order, hide some of them, justify alignment, and cut too long text. Technically, a column can be represent by its alignment, optional maximum length, and its column name in form cd,ssss or c,ssss. c represents alignment where l and r stands for left and right, respectively. d is an optional number to limit maximum length of this column. In case of a column is longer than the limit, it will be cut off. The next field, ssss, is the column name.
Torrent Table
Name | Description |
---|---|
id | Identification Number |
title | Torrent name. Usually, the first file or directory |
progress | Progress in percentile |
dlsize | Downloaded size |
ulsize | Uploaded size |
totalsize | Total size |
eta | Estimated remaining time |
dlspeed | Download rate |
ulspeed | Upload rate |
seeds | Number of seeders in bracket and number of connected seeders outside |
peers | Number of leechers in bracket and number of connected leechers outside |
btstatus | State |
ratio | Shared ratio |
activity | Current activity |
Spew Table
Name | Description |
---|---|
ip | IP address |
rport | Remote port |
cc | Country code |
direction | Connect direction |
uprate | Upload rate |
downlrate | Download rate |
dtotal | Downloaded size |
utotal | Uploaded size |
completed | Progress |
client | Client |
netname | Network name |
Peer Table
Name | Description |
---|---|
ip | IP address |
rport | Remote port |
cc | Country code |
client | Client |
netname | Network name |
Tuesday, December 28, 2004
Rsync wrapper for windows
WINrsync
So, it doesn't add functionality. But it will let many more people use this genious way of transferring files."
Monday, December 27, 2004
Suprnova's eXeem beta review and screenshots
Quote of The Day
Bram Cohen.
Friday, December 24, 2004
Grid computing catches on at businesses
MPAA Torrent Suit Letters - Cease and desist (and save the evidence)
We've obtained copies of the MPAA lawsuit
letters being circulated to Bit Torrent websites and their hosts - in
this case to Torrent website "Demonoid" (Pages: 1,2,3,4,5,6,7).
In it, lawyers warn the host they've sued the operators of a Torrent
site on their network, but currently don't know their identities. The
letter to the website owner claims they face "severe sanctions"
should they delete any pirated material or usable evidence in the case
against them. As noted by users below, the IP address for the website
cited by the letter (66.250.450.10) doesn't/can't exist, a mistake
repeated throughout the letters.
Thursday, December 23, 2004
waste
BitTorrent file-swapping networks face crisis
Man sentenced over movie sharing in Japan
the Japanese legal system is as tough on swappping
films as the US, as far as tolerance goes. It seems the sentencing
phase goes a little bit lighter than the US. An individual using
the popular P2P program "Winny" was popped for the sharing of just two
films. We have seen already that the MPAA, at least in the US has a
zero tolerance level for file sharing, remember the Hulk? Unlike the
RIAA which has been targeting users that share at least 1,000 music
files.
Winny is a Japanese
peer-to-peer (P2P) file-sharing program, possibly the most popular one
of all over there right now. It gets it's name from
WinMX, where the M and the X are raised one letter in the alphabet, to
N and Y. Kind of like HAL the wayward computer from 2001 a Space
Odyssey, who's name was derived by shifting each letter down
from IBM. Oddly, Winny has a claim to fame for being able to hide a
users identity, but in this case it obviously didn't work. So we best
take that cloaking feature with a grain of salt
The
Kyoto District Court sentenced Yoshihiro Inoue, 42, for violating
copyright law for installing the program on his computer to let
internet surfers download "A Beautiful Mind" and "Unbreakable" last
year.
"This is a wicked crime which makes nothing
of the efforts of film makers," Judge Yasuhide Narazaki said. The
sentence was suspended for three years.
Whew,
that was a close one. But at any rate folks, just be aware that
trading these movie files is not too swift an activity. Maybe in some
countries, but not in the US and now even Japan.
If you would like to read more about Winny, which has a very interesting
history, please visit
the Wikipedia page here.
Wednesday, December 22, 2004
Analysis of BitTorrent
There are different aspects that are important for the acceptance of a P2P system by a large user community. First, such a system should have a high availability. Secondly, users should (almost) always receive a good version of the content they request (no fake files) [10]. Thirdly, the system should be able to deal with flashcrowds. Finally, users should obtain a relatively high download speed.
In this paper we present a detailed measurement study of the combination of BitTorrent and Suprnova. This measurements study addresses all four aforementioned aspects. Our measurement data consist of detailed traces gathered over a period of 8 months (Jun'03 to Mar'04) of more than two thousand global components. In addition, for one of the most popular files we followed all 90,155 downloading peers from the injection of the file until its disappearance (several months). In a period of two weeks we measured the bandwidth of 54,845 peers downloading over a hundred newly injected files. This makes our measurement effort one of the largest ever conducted.
The contributions of this paper are the following: first, we add to the understanding of the operation of a P2P file-sharing system that apparently by its user-friendliness, the quality of the content it delivers, and its performance, has the right mechanisms to attract millions of users. Second, the results of this paper can aid in the (mathematical) modeling of P2P systems. For instance, in the fluid model in [13], it is assumed that the arrival process and the abort and departure processes of downloaders are Poisson, something that is in obvious contradiction with our measurements. One of our main conclusions is that within P2P systems a tension exists between availability, which is improved when there are no global components, and data integrity, which benefits from centralization."
Tuesday, December 21, 2004
gcov - Code Coverage Tester
Monday, December 20, 2004
Torrent Site Status
E-mail the author of the clients you use to add the 'get_peers/peers' extension to their clients. This removes the need for trackers beyond a single connection. (this means, if a tracker goes down, your transfers continue at full speed without issue)
Send the e-mail, as this will not happen until enough pressure is placed on the authors of BT clients. Force bittorrent to evolve!
XBT Client BitComet are the only clients that support this so far."
This referred extension seems to be popular in public tracker but banned in private tracker.
P2PReactor.com => File-Sharing => SuprNova.org ends, not with a bang but a whimper
legal pressure in America and Europe against P2P-enabled piracy. In the last
week the Movie Picture Ass. of America signalled its intention to pursue the
P2P server operators in a new front in its war internet movie pirates. Also,
a popular BitTorrent site in Finland was raided by police, and an eDonkey site
in the Netherlands was raided and shut down."
BitTornado 0.3.9a has been released
BitTorrent servers under attack
The distributed denial-of-service (DDoS) attack on the BitTorrent infrastructure prevented some users from downloading files for up to 10 hours on Wednesday, said the administrator, who asked to be identified only by his online handle, 'Lowkee.' The target was the central BitTorrent directories, or trackers, which are used by people to find movies, music and other content on the file-swapping network, he said."
Oops!
MPAA targets core BitTorrent, eDonkey users
Fire in the hole!
Saturday, December 18, 2004
ports/74883: Python 2.4 upgrade breaks port net/py-bittorrent [fix included] - news.gw.com
Friday, December 17, 2004
New features of BTQueue
If you have a time to test it, please get it from CVS.
Gaim Filesharing Plugin
Blog Torrent - Simplified bittorrent by Downhill Battle
Wednesday, December 15, 2004
Actual Transparent Window
Actual Transparent Window adds a new dimension to desktop space making it easy to organize simultaneously open windows without having to minimize and restore them every here and then. Along with common techniques of switching between applications windows Actual Transparent Window offers depth-based window ordering thanks to fully customizable transparency levels that are saved individually for each window.
Actual Transparent Window is intended for broad range of Windows users who value time and long for aesthetic pleasure of modern computing. Using transparent windows reduces negative effects on user's eyes as well as it allows for more native dimensional information representation model in human beings. Multiple reports by Actual Transparent Window users indicate overall increase of productivity when using several business applications that require manual information interchange simultaneously. Desktop space saved by eliminating opaque windows can be used for placing additional icons. Another great use of this program is for setting transparency depending on importance of task an application performs."
It is an interesting tweak tool. However, it seems too slow.
Tuesday, December 14, 2004
Diskeeper - Wipe Out Fragmentation With Diskeeper Automatic Disk Defragmenter
It is a good one that is very faster than Windows' Defragmentor.
Friday, December 10, 2004
Batteries - Notebooks
Long Term Storage
If
you don’t plan on using your notebook for more than six months, Apple
recommends that you remove and store the battery with a 50% charge. If
you store a battery when it’s fully discharged, it could fall into a
deep discharge state, which renders it incapable of holding any charge.
Conversely, if you store it fully charged for an extended period of
time, the battery may experience some loss of battery capacity, meaning
it will have a shorter life. Be sure to store the ejected battery at
the proper temperature.
ActiveState - ActivePython
How can I get disk space usage?
os.statvfs
Mozilla Thunderbird 1.0 Release Notes
safer, faster and easier than ever before. More
information about Thunderbird is available."
XUL and XML-RPC
Thursday, December 09, 2004
BTQFox
drupal.org
Message Boards Rankings
Real life picture rating forums"
The biggest web boards are listed here.
Monday, December 06, 2004
Exeem
Exeem will marry the best features of a decentralized network, the easy searchability of an indexing server and the swarming powers of the BitTorrent network into one program. Currently, the network is in beta testing and already has 5,000 users (the beta testing is closed.) Once this program goes public, its potential is enormous."
Friday, December 03, 2004
Thursday, December 02, 2004
Multiple commands in a single line
alias -s super_detail "detail %(arg1)s;spew %(arg1)s"
super_detail will call detail followed by spew.
Linky
The must have!
Access Control List in BTQueue
TH,200.2.1.3,202.17.20.0/24,202.17.19.0/255.255.255.0,INET-TH
There are 2 special keywords to represent all IPs and none IP, ALL and NONE, respectively.
What you can do to limit access from someone is to choose the order of allow and deny depending on your requirement. One may want to allow some IPs and deny other ones. One may want to deny some IPs and allow other ones.
In order to specify ACL in BTQueue, you need to modify 3 options; order_acl, allow_acl, and deny_acl. By default, these options are defined as below.
order_acl = allow,deny
allow_acl = ALL
deny_acl = NONE
If you want to ban all connections from Singapore, these options should be set as below.
order_acl = deny,allow
allow_acl = ALL
deny_acl = SG
In order to allow local connections only in Singapore, the options should be set as below.
order_acl = allow,deny
allow_acl = SG
deny_acl = ALL
For information about country code and network name, you should consule spew command or ip command.
Manual commit in MS SQL 2000 JDBC
So your driver url should be like :
'jdbc:microsoft:sqlserver://dbmachine:1433;SelectMethod=cursor'"