Revised: 17.1.2010.

The Free Software Guide

Page 1 of 25

Revised: 17.1.2010.

Table of Contents

Introduction ...... 3 Why is free software nice? ...... 3 My opinion regarding Open Source and Big content: ...... 4 Programs you need in order to acquire free software ...... 5 Programs that, are nice to have ...... 5 What is BitTorrent? ...... 6 BitTorrent clients ...... 6 P2P trackers ...... 6 Expectations of a responsible torrenter ...... 6 "How Do I Speed Up My Torrent Download?" ...... 7 The Movie Database: (IMDB) ...... 8 Server download ...... 8 Binary Newsgroups (proprietary?) ...... 8 Top 10 Providers ...... 9 Safety Tips ...... 10 Antivirus ...... 10 Video Help ...... 11 DVD backups ...... 12 Unblocking websites ...... 13 Keys & serials ...... 15 Sneakernet: over local storage medium ...... 15 Covering your Arse ...... 16 Different needs for Anonymity and Deniability ...... 16 Anonymous addressing ...... 16 Firewalled LAN network ...... 17 Be As Anonymous and Private As Possible Online ...... 17 Safe Sneakernetting ...... 17 Questions? ...... 18 Posting Questions ...... 18 Personal assistants ...... 18 Links ...... 18 Glossary ...... 19

Page 2 of 25

Revised: 17.1.2010.

Disclaimer: This is for educational purposes only. This is not an endorsement for ILLEGAL FILE SHARING. I do not support, condone, or take responsibility for the illegal downloading of copyrighted material without the consent of the original copyright holders. I do not take responsibility for what you do with the information contained within this guide. If you decide to act like a retard, then you get what you deserve. If you decide to be a pirate, then you should be ready to accept the consequences and walk the plank if you get caught. Now, have fun and explore the legal side of file sharing!

Introduction

I have made this guide because in my experience you get more out of software when you know how to use it. This guide is Open source. You can freely copy, distribute and develop it.

I am a Windows user, and so by default this guide will apply to Windows.

Salesman As an IT-supporter I hear a lot of stories of woe from PC-users. One that struck me particularly was the story of a first time software shopper. He was going to buy an antivirus for his PC since His PC was of critical importance for his studies.

At the store a friendly looking salesman greeted Him. And convinced him to buy the most expensive antivirus on sale (Norton) for 549 kr. Which was quite expensive for him being a student of few means. He went home and installed it. And for 30 days it worked fine and then it stopped working. He went back to the store and asked why the antivirus had stopped working? The salesman said with a smile it’s an expensive but good antivirus that only lasts for 30 days you have to “Just trying to make money” buy a new one. And pointed at the shelf with antivirus products.

He then came to me because he couldn't believe that he got 30 days for 549 kr. I explained to him that the trial period was 30 days and typed in the serial from the CD-cover. The antivirus updated and worked. He hadn’t read the license agreement which was for ½ a year.

Was he upset? Well he was happy that his antivirus worked. But he was furious over the salesman attempting to swindle him!

Why is free software nice?

GNU General Public License At: http://www.gnu.org/licenses/gpl.html

Page 3 of 25

Revised: 17.1.2010. In the world of software there are different levels of license freedom and limitations.

Freedom Limitation Open source > freeware > = /trialware > commercial software Social Capitalist

My opinion regarding Open Source/Net Neutrality and Big content/censorship

1. It’s my opinion that all software should be Open source and financed by private (companies) and public (government) wealth. Not by individuals of few means.

2. I'm against long copyright terms and the way Big Content wants to further take away your rights as a consumer. I figure 1-20 years for most mass produced works should be enough to provide a significant enough profit motivation and compensation for people to create new music/software/content.

3. I'm against DRM and the elimination of the first sale doctrine.

4. I'm pro "Fair-Use": recording TV is legal because of old Fair-Use (17 USC 107) precedents.

5. I'm against content producers releasing a product on one zone first and on a different zone weeks after. I'm against DVD regions.

6. I'm against Amazon, Hulu, iTunes and even Steam refusing to take Mexican people’s money for products they want because they have a Mexican IP address.

7. I'm against Big Content wanting the tax payer to pay for their crusade. Graduate response laws are bullshit. The public need is to not have a critical utility cut off because a large dying industry is lashing out violently, trying to hit anyone it can, deluded that each successful hit prevents its slide into oblivion. (See every effort worldwide to implement a three strikes/graduated response law to disconnect people accused of copyright infringing from the internet.)

8. I believe in paying for my programs, movies, music and books through taxes. There is also a need to compensate the copyright holder for their work. Let's not forget that.

9. I don't believe Big Content should care about what I do with a DVD once I have it in my house.

10. I believe the existence of Open source is of more benefit for the community than having Big Content further trample on our rights and liberties and wanting to preserve their obsolete business model through legislation.

11. There is a fundamental difference between a tangible and an intangible economy. The first one is an economy of scarcity, the second one an economy of abundance. Sharing a tangible good means divide it. Sharing an intangible good means multiply it. Therefore, the economic laws which govern the sales of pizza are totally different from the one which govern sales of a music file. In order to have a strong economy it is necessary to remove bottlenecks. See http://emoglen.law.columbia.edu/publications/maine-speech.html

12. From Big Content’s perspective even putting a CD in a player should be a crime. I mean, you're taking data on the disc and putting it right into the air, where anyone can listen.

Sharing miens Caring. Keep free software flowing!

Page 4 of 25

Revised: 17.1.2010.

Programs you need in order to acquire free software

If you don’t have these programs, get them from www.download.com

1. Antivirus. See page 10. ESET NOD32 is good (Norton- and AVG antivirus stink in comparisons. all Norton programs really lag your computer)

2. A BitTorrent client. See page 6.

3. WinRAR 3.80 or BitZipper 5.1 See The BitTorrent Bible At: http://flow.rtfm.ro/stuff/The.BitTorrent.Bible.v1.1.pdf Section 2. Recognizing File Types

4. SMAC MAC Address Changer 2.0.5 or newer

5. VLC Media Player Plays 99% of all file types so you don’t have to worry about codec packs

6. Daemon Tools Lite 4 or Alcohol 120% . Alcohol 120% is for XP not Vista. Programs that, are nice to have

1. AdAware AdAware Is an antispyware that comes highly recommended! Control your privacy Erase tracks left behind while surfing the Web.

2. DVDShrink or AoA DVD Ripper v5.1.9 or newer AoA DVD Ripper http://www.aoamedia.com/dvd_ripper.htm DVDShrink http://www.afterdawn.com/guides/archive/how_to_copy_dvd_with_dvd_shrink.cfm

3. Free FLV Converter 6.32 See page 9

4. Nero Burning Rom, version 7 or newer

5. Privacy Guardian 4.1.0.37

6. Firefox Internet Browser Firefox is the faster, more secure, and fully customizable way to surf the web. Firefox is good for gaining access to homepages that are blocked by Microsoft’s browser Internet Explorer.

7. PeerGuardian 2 or The Blocklist Manager

CNET Security, privacy, and control We test all software products submitted to us against a comprehensive set of criteria. In addition to screening for common viruses and , we also look for other threats that might interfere with our users' security, privacy, and control. We consider publisher Web sites, publisher conduct, and our own experience with a particular product. http://reviews.cnet.com/1991-13403_7-6722448-1.html http://www.download.com/ Download.com is a safe and legitimate software download site where you can download programs without the risk of getting a virus, In contrast to P2P downloading. Download.com works well together with: http://serials.ws/ if you have found a program you want that requires a serial.

Page 5 of 25

Revised: 17.1.2010. What is BitTorrent? BitTorrent is a peer-to-peer file sharing protocol used to distribute large amounts of data. The initial distributor of the complete file or collection acts as the first seed. Each peer who downloads the data also uploads them to other peers. Seeders are people who have downloaded a torrent-file and are still letting it be up loaded from there computer and leachers are people now downloading it so you look for a torrent with high seeds and low leachers.

BitTorrent clients To download with P2P you need to have a BitTorrent client installed on your Pc. A BitTorrent client is a piece of software that acts as the vehicle between your computer and the BitTorrent network. You can download a client from www.download.com. A few examples of BitTorrent clients are:

• µTorrent is an Open source program that is compact but with lots of features - a good place to start. • Azureus - now called is more complex, requires Java, lots of features. Very nice if you run multiple torrents on a newer computer - might not work well on older .

The following BitTorrent clients act as spyware: Kazaa, EDonkey, Grokster, AudioGalaxy, LimeWire, SongSpy, iMesh, eMule, BearShare, TrustyFiles. Best advice I can give you is to stay the hell away from spyware or adware related programs.

P2P trackers BitTorrent trackers are the sites the software metadata is uploaded to. The tracker is a server which assists in the communication between peers using the BitTorrent protocol. It is also, in the absence of extensions to the original protocol, the only major critical point, as clients are required to communicate with the tracker to initiate downloads. Clients that have already begun downloading also communicate with the tracker periodically to negotiate with newer peers. After the initial reception of peer data, peer communication can continue without a tracker.

A few examples of P2P trakers clients are:

http://btjunkie.org (www.demonoid.com private tracker) http://thepiratebay.org www.torrenthound.com http://isohunt.com http://www.seedpeer.com www.mininova.com

You might need to unblock DNS to get in to one or more of these homepages. See page 13.

Private trackers are known for their high speed downloads and are considered to be “safer” than public trackers in terms of not having viruses as well as having better privacy. Be careful, there are also a lot of sites out there that are NOT reputable. That means files could contain viruses or other malicious content. Be sure to read the comments usually provided with the torrents to check if anyone encountered problems with it.

P2P is good for downloading video, music pictures and text files. Not programs you can download 100% virus free from www.download.com. And if you want music videos download them with Free FLV Converter: see page 9.

Expectations of a responsible torrenter The problem with most P2P networks is that many people just don't like to share. They open up their program, download their files, and then close the program before they can help anyone else. It's called leeching. EVERY BitTorrent user should always seed files 100%. That means if a file you downloaded was 700Mb, you shouldn’t stop letting people upload from you until you have uploaded 700Mb.

Page 6 of 25

Revised: 17.1.2010.

If you are the last seed, don't leave the others hanging! The only way files have a good lifespan is if people do their part for the community. Think of other people before stopping the torrent. As a backup plan, BitTorrent built in the other half of trading you probably learned as a kid: tit- for-tat. That is, if you give me one piece, I'll give you one piece back. BitTorrent will give you a few pieces of the file for free to help you get started, but after that you need to start giving some pieces back if you want to keep downloading. If you don't share, eventually everyone else will stop talking to you. Just like when you were a kid with your toys on the playground. In fact, BitTorrent goes one step further and actually starts to favor the people who share the most. This means that the more you upload, the faster you'll download. Because people that don’t upload 100% “leechers” have a detrimental effect on swarms, some people resort to vigilante tactics and block connections to leechers.

Because of the very nature of BitTorrent, speeds are not guaranteed for any given torrent swarm. While you may get great speeds in one swarm, you might not in another. This is due to the fact that BitTorrent is a P2P protocol, so it depends on the upload speeds of the other peers you are connected to to generate your download speeds. A common misconception held by many people is that torrent swarms that contain more seeds and peers are faster than those with less. This is not always the case. There can be a swarm with only a few seeds and/or peers on fast Internet connections, and you'll be able to get great speeds from them, while a swarm with many more seeds and/or peers might contain mostly people with slow, dial-up Internet connections, will get you terrible speeds from them. In the same vein, connecting to more seeds and/or peers does not equate to greater speeds, and seeds don't necessarily give better speeds than normal peers.

"How Do I Speed Up My Torrent Download?" Increase download speeds by opening TCP port 6881; the "dedicated lane" for torrent file downloads. If you are a Bit Torrent downloader, you know what slow download speeds are like...frustrating and annoying, to say the least. Instead of getting your music or movie within a couple of hours, your software predicts it will take 2 to 4 days.

Now, while many of the speed factors involved are out of your control, there is at least one thing you can do at your receiving end to improve this speed. It is called "Port Forwarding", or "opening your specific TCP ports". This is how it works.

1) That blue or green network cable coming out of your computer/modem/router is actually a busy highway comprised of 65,536 tiny electronic lanes (yes, over sixty-five thousand little lanes for your electrons). Each lane is called a "port", and each port is designed to allow only specific types of information through. Many ports are assigned in a semi-standardized way. Here are some example port assignments: • HTML pages: port 80 • FTP file transferring: port 21 • World of Warcraft: port 3724 • POP3 email: port 110 • MSN Messenger: port 6901 and ports 6891-6900 • Bit Torrents: port 6881

2) Bit torrents, by default, first look for port 6881 to enter/exit your computer. If port 6881 is closed for whatever reason, torrents then go to port 6882, then 6883, and so on, until it eventually tries port 6999 before giving up.

3) Every ISP, and every home router, can optionally block any of these ports with the intention of preventing hackers and controlling the network.

4) If you tell your own personal router and firewall at home to open (aka "forward") port 6881 and port 6882, then your bit torrents will find their way into your computer that much faster. Sometimes up to 5x faster.

Yes, opening ports does increase the possibility of getting hacked by unwanted bad guys, but there are means to reduce that threat while still getting fast torrent download speeds.

Page 7 of 25

Revised: 17.1.2010.

5) Buy a faster connection. Broadband is expensive, faster broadband is more expensive. Your connection can only be as fast as your account, so especially if you use DSL, buy a faster pipe.

The Internet Movie Database: (IMDB) Movie revues to help you choose: http://www.imdb.com/

Subbiee is a great crawler searching 22 subtitle servers. www.subbiee.com

Cdcovers.cc World's Largest CD Covers and DVD Covers Album Art Archive http://www.cdcovers.cc/covers

Server download

Binary Newsgroups (proprietary) Using the newsgroups for file sharing has become easier than ever thanks to new newsreaders.

UseNext UseNeXT software gives you especially easy access to and a good overview of the data in the Usenet, enabling you to find precisely the data you are looking for and download it at high speed. Free Download Mode: Download as much as you want, up to 1,000 kbps (about 150GB in 2 weeks).

Since you are downloading directly from their server, there are no "cracked" versions! (Unless someone can share their paid account with you.)

You are limited to 5000MB full speed download at 50Mbit/s in the trial. You are only allowed to use their own proprietary client (newsreader).

UseNeXT is anonymous and ad-free access to over 200 terabytes worth of MP3s, videos, games, pictures, and software. UseNeXT users never need to upload anything and with direct access to the high-speed Usenet servers you'll be able Trial cancellation: to search for and download files faster. The tailor made browser automatically unpacks and repairs failed downloads, and the built in If you would like to cancel the media player allows you to preview play files before downloading even UseNeXT trial simply do so when archived. within the 14 day free trial period.

To get the free trial offer enter your e-mail when starting UseNeXT for 1. Log into the member area the first time and you will get your access information for the free trial 2. Click on "Cancellation" immediately. But you however have to sign an online contract first, 3. Follow instructions to confirm where you have to register your credit card or PayPal. cancellation.

http://downloadnext.wordpress.com/2009/05/14/usenext-tutorial/

Page 8 of 25

Revised: 17.1.2010.

Top 10 Usenet Providers Newsgroup Selection Criteria • 1. Giganews • Binary retention rate • 2. Binverse • Completion rate • 3. Newsdmeon • Download speed • 4. NewsgroupDirect • Anonymous downloading and posting • 5. Thundernews • Uncensored newsgroups • 6. Easynews • Secure (SSL or SSH available) • 7. PowerUsenet • Alternate ports • 8. Supernews • Free Usenet Trial • 9. UseNeXT • Free or discounted newsreaders • 10. Usenet.net • Special Offers

http://www.usenet-newsgroup.net/

Newsgroup downloads are in large proprietary in comparison to P2P download and require grate skill to handle with optimal results. But have a much faster download speed.

Free FLV Converter 6.32 Publisher's description of Free FLV Converter Get your favorite online videos easier than ever with this free software. You will be able to search videos without opening your browser and watch them using the built-in video player. This freeware can convert FLV files to AVI, iPod (MPEG4 or H.264), iPhone, 3GP, PSP, or MP3 audio only. Supported Web sites: YouTube, DailyMotion, Videos, Metacafe, Spike, iFilm, Veoh, Yahoo, Crackle, Broadcaster, ZippyVideos, MySpace, , LiveLeak, EyeSpot, CollegeHumor, SevenLoad, Break, CrunchyRoll, Blip.tv, lulu.tv, archive.org, TinyPic, EbaumsWorld, Uncut AOL, Guba, Youku, Tudou, Reuters, BBC News, vh1. This software can also convert all your videos (DivX, XviD, MpeG, DVD, AVI) to FLV video (Flash video) with an automatic HTML page creation.

Editor's review of Free FLV Converter Lightweight and effective, this program is a great way to convert video files from Flash formats into something useful beyond Web pages. Specializing in formats meant for portable devices, Free FLV Converter also supports AVI and can download embedded SWF or FLV vids directly from the Internet when you punch in the URL. The app can also perform local searches for vids as well as convert to FLV. Hitting either conversion tab will automatically open a file browser so you can choose your victim. From there, a conversion window opens up, and you can change the basics such as settings, including output format, quality, and destination directory, as well as more advanced options like the codec, aspect ratio, and the frame rate. Tap convert at the bottom of the window when you're ready, and the Free FLV Converter works smoothly and without interfering with other programs. Free FLV Converter does have one annoyance: When you install it, be sure to opt out of the Dealio toolbar. It's no more than a minor drawback, though, and doesn't cause problems later on. Seeing as how the app ran smoothly in the background, it's definitely a must- use piece of freeware.

YouTube Downloader Download your favorite music videos and video clips from http://www.youtube.com/ before there removed from the homepage. Sometimes the video contains an audio track that has not been authorized by WMG. And then just the audio is disabled from the video. And what’s the point of having the video up if there's no sound? Bring back the music!

Page 9 of 25

Revised: 17.1.2010.

Computer Safety Tips 1. Make sure that all anti- definitions in your antispyware- and antivirus program are always up-to-date. Most antivirus software can be configured to do this automatically. 2. Have Windows and your application programs fully updated. Check with http://secunia.com/vulnerability_scanning/online/. 3. Always have a recent full backup of your system.

Take control of your email. Avoid opening email attachments received unexpectedly - no matter who appears to have sent it. Remember that most worms and trojan-laden spam try to spoof the sender's name. And make sure your email client isn't leaving you open to infection. Reading email in plain text offers important security benefits that more than offset the loss of pretty colored fonts.

Keep abreast of Internet scams. Criminals think of clever ways to separate you from your hard earned cash. Don't get fooled by emails telling sad stories, or making unsolicited job offers, or promising lotto winnings. Likewise, beware of email masquerading as a security concern from your bank or other eCommerce site.

Don't fall victim to virus hoaxes. Dire sounding email spreading FUD about non-existent threats serve only to spread needless alarm and may even cause you to delete perfectly legitimate files in response.

Antivirus

ESET NOD32 Antivirus If your user/pass has been blacklisted and your NOD32 Antivirus as a result can’t update then please take serials for NOD32 products using this homepage http://free-nod32.blogspot.com You might need to unblock DNS to get in to the homepage. See page 12.

ESET NOD32 Antivirus 4 This product delivers the best proactive protection against increasingly sophisticated threats and is known for being fast and unnoticeable. The software uses a powerful combination of advanced heuristic technologies and automatic updates of malware signature databases, detecting and eliminating a rapidly growing number of unknown threats. Its proactive capabilities protect your computer and data even against never before seen malicious code.

Avast! Antivirus is a good product because they serials are almost never blacklisted. ALWIL Software offers a special discount program for all avast! Antivirus products for non-profit and charity institutions. Please take serials for avast products using this homepage http://serials.ws/

avast! antivirus software represents complete virus protection, offering full desktop security including a resident shield. Daily automatic updates ensure continuous data protection against all types of malware and spyware. avast! Antivirus is certified by both ICSA Labs and West Coast Labs.

Kaspersky Antivirus is the best antivirus but it is difficult to get or keep the license-key/crack for it. Therefore Kaspersky is not supported by this guide.

Stay away from the hugely commercial products like MacAfee and Norton. Go with something light weight and browse smart, always. With regular anti-virus scans you'll be fine. Scratch Norton firewall off the list, it gave me allot of trouble when I wanted to torrent.

Page 10 of 25

Revised: 17.1.2010.

AVG Anti Virus is NOT our Friend

Heads up people...

FACT: I have a Keygen for a certain program that I‘ve used many times. All the Sudden, AVG reported it as having a Virus... I first thought it was just a delayed Definitions issue. But the more I thought about it, the program I was using, Never gave me a problem. And this is not the first time AVG has done this with Keygens and Patches.

So, I used a different computer Without AVG and ran the Keygen, I also scanned the Keygen with Panda and Norton Anti Virus. No Virus Found. After running the Keygen, it worked Fine and I wrote the Key produced down on paper and tried it on the first computer. It Worked Fine.

I then re-scanned the computer that produced the Key with both (up to date) Panda and Norton, AGAIN... No Virus Found and the System Works Fine. AVG is a Good Anti Virus program. BUT, apparently AVG is taking it upon themselves to be our Moral Police. USERS BEWARE... Not only did AVG report this Keygen as having a Virus it completely DISABLED it. And made it unusable on the first computer.

AVG is deciding (without your knowledge or approval) what they will lie about and what they will DISABILE on your personal property... I‘m done with this BS Software and that BS Company... It’s up to you... Just letting you know what happened to me...

USERS BEWARE... AVG Anti Virus is NOT our Friend...

2009 AntiVirus Software Product Comparisons To help you select your antivirus http://anti-virus-software-review.toptenreviews.com/

Ad-Aware Free - Anniversary Edition Control your privacy Erase tracks left behind while surfing the Web - Ad-Aware deletes keyloggers, spyware and tracking cookies.

Video Help There are a number of reasons why a movie won't play:

1) There is audio but no picture. You are not using the right video codec. Get the latest from www.free-codecs.com

2) There is picture but no audio. You are not using the correct audio codec. Get the latest from www.free-codecs.com

3) File won't play. You are possibly using a bad media player. Download the best multi-platform media player at www.videolan.org

4) For some reason your computer won’t play a particular codec. Convert the file using the free Super Converter from www.erightsoft.com/SUPER.html

5) You get two audio tracks at the same time, or you hear a foreign soundtrack when you want to hear English. Select the correct audio channel. This is easier when using VLC. It is not easy to get it to work on WMP.

6) Video refuses to play with funny errors. This is possibly because the filename and path is too long. Rename the file to something simpler, or move the file into a simpler directory e.g. c:\movies

7) All SiRiUs sHaRe movies have been tested on two or more machines. If you have followed the above steps and still have problems, find an IT genius who can assist you further.

Page 11 of 25

Revised: 17.1.2010.

DVD backups Want to make backups of all your DVD movies with 100% free software? You can! Take the 5-step All you need is a Windows machine, lots of free gigabytes, a DVD writer and lots of time. This software may be old, but it's free, it works on any XP+DVD machine and is an (so far) unbeatable combination!

Step 1: The ripping process. To rip a DVD download and install RipIt4Me 1.7.1.0 and DVD Decrypter 3.5.4.0. Follow the built-in instructions and proceed ripping the DVD. (Time: about half an hour*) This will work with even the latest DVD movies if you follow the instructions carefully!

Step 2: The shrinking process. To reduce the output of step 1 to an acceptable size (4.5 Gigs DVD writable) you use DVDShrink. (Time: about two hours*) If DVDShrink failed to recompress the DVD to an acceptable size (usually huge DTS tracks), then just process it despite the warning. Then do another DVD Shrink over the processed files!

Step 3: Writing the backup Use BurnAware Free Edition to write the ouput of step 2. (Time: about half an hour*)

Step 4: Divx/xVid. Need Xvid avi instead of DVD format? Use the output of step 2 with AutoGK. (Time : about three hours*)

Step 5: Portable players. Need to play your movies on your favourite portable MP4 player? Use the output of step 4 with MediaCoder. (Time: about half an hour*)

*: Time duration depends on hardware and the used settings.

Tips:

Tips for step 1: Check if you can enhance the ripping speed of your DVD writer by using alternative firmware.

Tips for step 2: Perform deep analysis and use maximum sharpness. It takes longer, but looks better.

Tips for step 3: Use verify or use DVD+RW discs if you're not sure it will work.

Tips for step 4: AutoGK standard uses only xVid. Players like VLC player work perfectly with the xVid format. Your Xbox 360 or PS3 also can handle xVid. Please for the love of all that is holy read the documentation. Experiment with the CTRL-F9 options. If you feed AutoGK a lot of different movies it can batch-process them for you overnight, even with automatic shutdown of your system.

Tips for step 5: MediaCoder can do a LOT. If you want the maximum potential of MediaCoder, install FireFox and read all the documentation carefully.

General tips: Experiment, but read the manuals/instructions! If the download links do not work, use Google dammit!

Other software combinations than the above can be used.

Page 12 of 25

Revised: 17.1.2010.

Daemon Tools The format that Daemon Tools supports is called ISO also known as a disk image. You can download ISO’s from http://isohunt.com. Then you mount the ISO as a virtual drive with Daemon Tools and install the program as you wood with a CD/DVD.

Program discs and many other applications generally require the original disc to be in the computer's CD-ROM drive. This restricts the amount of people who can have access to the same software at the same time without the cost of additional discs. Alcohol's virtual drives resolve that problem for you. No more hunting around the stores Daemon Tools is for Windows for that elusive disc you need to run the application, everything you require is 95/Me/2000/XP/Vista/7 just a click away.

Daemon Tools lets you store your most used CDs as images on your computer, so you can call them up at the click of a button.

With Daemon Tools you can simply and quickly run your Disc image at around 200 times faster than that of a conventional CD-ROM drive.

Alcohol 120% Alcohol is popular for its ripping speeds. Alcohol 120%'s image recording feature is capable of bypassing certain copy protection schemes, such as SafeDisc, SecuROM, and Data Position Measurement (DPM). It can also create images from PlayStation and PlayStation 2 file systems. Certain copy protection schemes require burner hardware that is capable of passing along the copy protection.

Some software manufacturers employ software blacklist methods to prevent Alcohol 120% from copying the software. There are third party tools available that attempt to counteract the blacklist methods, such as Anti-blaxx and CureROM. Alcohol 120% is for Windows The program does not back up DVD titles encrypted with the Content Scramble 95/Me/2000/XP. System. Alcohol Soft cites present legal restrictions for the decision not to Does not work with Vista. include this feature.

Unblocking websites DNS Modification - This is the most common way for ISPs to block a With DNS control lot of sites. DNS is the way that computers and networks translate the domain name. When you type in a homepage name a “domain 1. Go to start and then name” your computer then searches locally for a DNS-servers it has click ‘Control Panel’. setup in its networking configuration to get the IP address. It then uses the result to connect to that site. Now this all works GREAT except when the DNS server is setup to return a false result for some domains. To get around this may be difficult as the network may not let you use an alternative DNS server. If you know the IP address you can simply type it in the address bar directly and the DNS block method is rendered useless.

XP

2. Click ’Network Connections’ Page 13 of 25

Revised: 17.1.2010. 3. Click ‘Local Area Connections’ 4. Click Properties button.

3. Click ‘Local Area Connections’

5. Highlight Internet Protocol (TCP/IP) and select Properties.

6. Change it to Use the following DNS server addresses.

Free fast Public DNS Servers List This is my list of better, fast public DNS servers and free DNS server (as compare to your ISP / DSL / ADSL / cable DNS service providers DNS servers).

Service provider:dnsadvantage Dnsadvantage free dns server list: 156.154.70.1 156.154.71.1 Service provider: ScrubIt Service provider:OpenDNS You can find guides for Vista, Mac Public dns server address: OpenDNS free dns server list: and other operating system at 67.138.54.100 208.67.222.222 http://theos.in/windows-xp/free- 207.225.209.66 208.67.220.220 fast-public-dns-server-list/

And surf Free Page 14 of 25

Revised: 17.1.2010.

Keys & serials

Unlocks the world http://serials.ws/ A good homepage if you have forgotten or lost your serial. This homepage gives serials in a text format that are therefore safe to use. You can then copy & paste the serial to a notepad.

For the serial to work it is best that it is rated as over 50% success in use.

The homepage also generates some annoying but harmless advertisement popups.

Serial Box / Serial Seeker (for Mac OS X, Linux & Windows) http://windows.serialz.to/

What is www.keygen.ms? I heard that it is some website that gives key and codes for products. AVG says it’s a keycode site and that it is dangerous. Is it?

Well for starters it's ILLEGAL to try and get keycodes for software. And yes, if AVG says it's dangerous, it probably is. That's because most keygen software has

Trojan viruses embedded in them. It’s dangerous because you could end up getting their products for free… lol. They do tend to have a majority of their, downloads being viruses and spyware too. When you have http://serials.ws you don’t need keygens. www.keygen.ms has one IP record. keygen.cc, serials.be, cracktop.com, www.keygen.cc and at least 13 other hosts point to the same IP. keygen.ms.

Crack Serial Keygen “CSK provides only clean results; they do not index sites with spyware, adware or viruses.” http://www.crackserialkeygen.com/

About: Windows in a network http://www.wintip.dk/win32/guides/net/index.htm

Sneakernet: File sharing over local storage medium Do you have a friend with files that you want? You won’t know till you ask. There are four main storage mediums that are good in a sneakernet: CD, DVD, USB Flash Drives and external hard disk.

In Denmark at least the local library will often be the place where you can find the greatest amount of music on old CD’s without copy protection schemes, such as SafeDisc and SecuROM. You can borrow a DVD or CD for free, go home and make a copy for yourself if you want to. And the local university campus will often be a good place to get to know people so as to start your sneakernet.

When mailing by post a sufficiently large hard drive or a spindle of , the throughput (amount of data per unit time) may compete favorably with other methods of data transfer. It is always faster to transfer files over USB den over the internet. USB’s data transfer rate is 480 Mbit/s. And your friends might have software you want that hasn’t been available on the internet in a long time.

Never underestimate the bandwidth of a station wagon full of DVD’s hurtling down the highway. Fun, fast and free! Page 15 of 25

Revised: 17.1.2010.

Covering your Arse

Different needs for Anonymity and Deniability In general, and especially in the case of IT-networks, a person usually tries to hide: • Who they are (Their identity) • What information they acquire/share (The content they download/upload) • Who they talk to (The people they communicate with) • What they do (That they participate at all) The main reason a person is trying to hide one of the things mentioned above is because the society as a whole, certain groups in society or the local legal system is considering the content or the information they share/download either amoral or illegal. Downloading e.g. Cat Stephen’s Song "Peace train” could get you in trouble for different reasons. In Germany or the USA, you’d probably be infringing copyright. In Iran, the ruling government simply wouldn’t want you to listen to that kind of music.

Deniability The fundamental concept is that a given data element, which contains controversial or censored content, is also associated with neutral-content material. Hence, even a powerful adversary capable of monitoring all communication in the network and viewing the internal state of participating hosts is unable to prove a link between censored content and a user. • The communication overhead required to retrieve a document is only four times greater than what is needed in a standard network. • The storage required for a document is only twice as large as the document itself. Deniability is an elegant alternative to user anonymity in P2P file sharing networks. Systems that provide anonymity for users typically require greater overhead and do not guarantee anonymity against powerful, real-world adversaries.

Two programs you need for good storage deniability is Privacy Guardian 4 and TrueCrypt 6.2. Privacy Guardian works well together with TrueCrypt. TrueCrypt is the best way of hiding files on your PC and Privacy Guardian deletes all traces from snooping eyes.

Recommended literature on storage deniability: Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications

Anonymous networking technologies have been developed to allow the exchange of data between computers and users in a way that obscures either the user and its network location or the destination of a data access, or both. A popular method is the onion routing concept, prominently implemented in the network. Such methods are often used to transfer contentious or illegal material and copyrighted works in violation of legal or acceptable use policies. Many current implementations incur high overhead, making them slow or hard to use. However, in locations where very fast is common, a number of anonymous file-sharing programs have already reached high popularity.

Anonymous addressing Avoid giving away your address if you can. There are two types of address physical and logical. Logical addresses are IP- and TCP port addresses. You have to give them in order to get data over the internet. So they should be changed at every system startup. Dynamic Host Configuration Protocol (DHCP) is the most common IP-addressing system where a DHCP-server gives you a new IP-address every time you turn on your computer. And most good BitTorrent clients will randomize the TCP port on system startup. So make sure you in a network that uses DHCP and make sure to have a good BitTorrent client!!!

Page 16 of 25

Revised: 17.1.2010.

Physical address Change your MAC address. You might be asking yourself what is a MAC address. Well it’s the address that goes along with your network card. There are programs out there that can do this for you. Macmakeup and SMAC to name a few. If you have DRM installed on your PC changing your MAC address will activate it. Just as changing any hardware in the PC. Firewalled LAN network If you’re LAN DHCP-server doesn’t have a firewall then get a wireless router with a built in proxy firewall. A proxy firewall effectively hides the true network addresses.

Be As Anonymous and Private As Possible Online Avoid giving away your name. Microsoft's .NET Passport is a threat to your anonymity. NET Passport is a digital ID. Windows Messenger XP's shiny new client for chat automatically displays an icon in the notification area. This icon appears with a 'broken' symbol (a white X on a red circle) until you add a .NET Passport to XP and configure Messenger. (You can also specifically hide the notification area icon for Messenger, but-human nature being what it is-most people will click the icon to find out what's wrong.)

If you want to avoid your usage of the Internet being monitored, you have to take active steps, such as those mentioned in this list: • For browsing, you can go through a service such as http://www.proxyfornerds.com. This service uses various encryption and redirection techniques to remove identifiers from your requests, prevent cookies from landing on your computer while letting you enjoy the benefits of cookies during surfing sessions, block scripts, and sanitize downloads. • For e-mail, you can use a Web-based service that offers encrypted e-mail, such as HushMail www.hushmail.com, use encryption technology such as Pretty Good Privacy (PGP) with Outlook Express or another conventional client, or use a digital certificate to encrypt e-mail using Outlook Express or another client. Anonymizer.com also offers anonymous e-mail. • For secure document transfer, you can use a point-to-point solution, such as NetMeeting, or a Web- based secure-transfer solution, such as ZipLip www.ziplip.com. Your ISP will have details of the connections you've made, so it'll know that, for instance, you've spent three hours each day at Anonymizer.com, sending this number of and receiving that number of bytes, but it won't be able to tell what those bytes contained.

Using BitTorrent is legal, downloading copyrighted material isn’t. So read “The BitTorrent Bible” at: http://flow.rtfm.ro/stuff/The.BitTorrent.Bible.v1.1.pdf Section 11, Covering your Arse. Other recommended literature on secure file sharing: The XP Files-Windows' Hidden Tools for Secure Sharing, Communication, and Collaboration The current state of anonymous file-sharing. Bachelor Thesis: By Marc Seeger. July 22, 2008

Safe Sneakernetting To get past the first meeting, use questions to discover the right level of information to give a potential file sharing partner. It is always legitimate to ask people what kind of music and movies they like. People that can’t afford expensive software like students are more likely to be interested in free software like Linux and OpenOffice. Talk about the copy-technique, not about what you are going to do with it.

“Careless talk costs lives so be careful”: Admitting that you've illegally downloaded movies/songs and need help to process/burn is sometimes comparable to robbing a bank, and walking into the bank the next day holding the bags of money to deposit them into your account. Don't be surprised if people laugh at you when you make the headlines.

We are talking about leaps and bounds in both technology and economics. So everybody will not understand the data freedom ideals in file sharing. In the words of Cristobal Colomb: "Nothing that results from human progress is achieved with unanimous consent. Those who are enlighten before the others are condemned to pursue that light despite the others."

And in the words of Benjamin Franklin: People willing to trade their freedom for temporary security deserve neither and will lose both.

Page 17 of 25

Revised: 17.1.2010.

Questions? If you have questions then do a search on Google first. The internet is immense and most questions have been answered on it. A question might be “How do I use µTorrent?” All it takes is good spelling and grammar. Remember the question mark at the ending of the sentence. Theory and manuals are good but Test before you assume.

Posting Questions

Post your question to: Yahoo! Answers http://answers.yahoo.com/best;_ylt=Au7FQeZT8FK3jvsZVFsLKfZ.1KIX;_ylv=3?sid=396545660 or Club CD Freaks - Knowledge is Power http://club.cdfreaks.com

Personal assistants If you have followed the above steps and still have problems, find a local IT genius who can assist you further. Sometimes it is necessary have someone sit down and patiently teach the technique. Ask a person you can trust. It might be a person in your sneakernet. If you don't ask, you won't know!

Don't give up too easily; persistence pays off in the end. If at first you don’t succeed TRY and TRY AGAIN.

Links

[Sub ITA] Steal This Film 1&2 www..com/watch?v=vkRlRbaKFOM&feature=PlayList&p=B58061E9DA2EE998&index=0

BitTorrentFAQ Wiki - A Wiki for BT information http://wiki.etree.org/index.php?page=BitTorrent

Timeline of file sharing http://en.wikipedia.org/wiki/Timeline_of_file_sharing

Comparison of file sharing applications http://en.wikipedia.org/wiki/Comparison_of_file_sharing_applications

WARDRIVING TO STAY ANONYMOUS http://www.i-hacked.com/content/view/101/75/

Freeware-guide. Top quality freeware http://www.freeware-guide.com/

Sneakernet http://en.wikipedia.org/wiki/Sneakernet

Jon Lech Johansen “DVD Jon” http://en.wikipedia.org/wiki/Jon_Lech_Johansen

Don't call it DRM: Microsoft explains new gaming piracy tech http://arstechnica.com/gaming/news/2009/03/microsoft-1.ars

Researchers conclude piracy not stifling content creation http://arstechnica.com/media/news/2009/06/researchers-conclude-piracy-not-stifling-content-creation.ars

TorrentFreak: A weblog dedicated to bringing the latest news about BitTorrent http://torrentfreak.com

Chapter I - Statute of Anne vs. Trademark of Anne http://privateinfringer.blogspot.com/2006/06/chapter-i-statute-of-anne-vs-trademark.html

Digital rights management (DRM) http://en.wikipedia.org/wiki/Digital_rights_management Page 18 of 25

Revised: 17.1.2010.

Glossary Especially if you're new to BitTorrent or file sharing in general, there are probably many new and unfamiliar terms used throughout this manual (and in many other BitTorrent-related places). To help "clue" you in on the new vocabulary, this glossary can be of great help.

A announce: The act of connecting to a tracker to update it on your status, and to obtain information from it as well, including (but not limited to) an updated peer list. availability: The number of complete copies of the torrent contents there are distributed in the part of the swarm you're connected to. The amount of the torrent contents you currently have is included in the availability count. A swarm with no seed and with availability below 1.0 will likely be unable to finish transferring the complete torrent contents.

B Big Content (also called Big Copyright) is a pejorative term used to refer collectively to the major content- owning businesses, typified by such groups as the MPAA and the RIAA, and their counterparts outside of the United States. It may also be used to include the Association of American Publishers, and individual corporations such as Disney, Viacom, and Sony. The term is based on the model of established pejorative terms such as Big Tobacco or Big Oil. The term Big Content originated due to the similar techniques of the MPAA and RIAA in defending their current business models, which are being challenged by piracy in the digital age. Websites such as Ars Technica and Techdirt use the terms to decry the tactics of these organizations, which include such methods as using their significant lobbying power with governments to pass laws (such as the DMCA and repeated extensions of the length of copyright terms), pressuring police to take action against large-scale copyright violators (such as the raid in Sweden on the bittorrent-indexing website ), and bringing large numbers of John Doe lawsuits against individual filesharers based on a harvested IP address. Big Content is also known for public relations campaigns which have been criticized as propaganda meant to indoctrinate children and others with an incorrect understanding of copyright (such as Captain Copyright, and feeding the media inflated estimates of losses due to piracy and file sharing). Detractors of these groups consider them to be abusing the original intention of copyrights, and abusing their customer base in an effort to protect outdated business models. The organizations constituting Big Content have been in the news recently for creating another lobbying group, known as The Copyright Alliance, advocating stronger copyright laws block: The units of data that comprise a piece. Because blocks do not directly affect whether torrent contents finish transferring, it is not considered an appreciable unit of data with regards to BitTorrent like the piece is. : A unit used for measuring the size of data on a computer storage device. Many people confuse "byte" for "bit" when referring to speeds. A byte is composed of 8 bits, so there is a clear distinction, and terminology should not be confused when referring to bytes. broadcatching: The act of downloading content from an RSS feed.

C choked: This word describes the state of a BitTorrent connection. When a connection is choked, it means the person who is supposed to be doing the uploading on the connection does not want to send anything. This generally happens when the uploader's upload slots are full. client: The application a user is using when connected to a swarm.

Commercial Software Using the definition of commercial from the dictionary it indicates "Having profit as a chief aim". This makes Commercial Software to simply be software used in a commercial environment, or software developed that has "profit as a chief aim". Many people are incorrectly using this phrase interchangeably with "Proprietary Software", and are trying to perpetuate the myth that the only way to make money in the software world is to make the software proprietary. This definition of the word "commercial" does not specify a specific way of making money, and

Page 19 of 25

Revised: 17.1.2010. anyone in the "Free Software", "Open Source" or similar movements know that there is more than just a single way to make money in the software world. Phrases such as "Free Software", "Open Source Software", or "Proprietary Software" are totally independent of whether or not the software is commercial or not. Software can be licensed with the GPL or BSD License, and yet have profit as a chief aim, such as with Red Hat Software. There is also going to be proprietary software which is given away for free (Internet Explorer and Netscape are two popular examples) where profit is not the aim of the software, but other motivations such as market control or advertising or Internet Portals.

D DHCP (Dynamic Host Configuration Protocol): A protocol that allows networked devices to be assigned an unique IP address automatically from a pool of unused IP addresses. DHCP was developed to handle the problem of dealing with large numbers of IP addresses. You DON’T want to have to go to every machine on the network and manually put in the IP Address, subnet mask, WINS server address, DNS server address, and default gateway address. That would take a long time and be very inefficient. The DHCP process is pretty straightforward: 1. On a client machine, rather than manually assigning a IP address information, you set up the client to obtain its IP addressing information (IP address, subnet mask, WINS, DNS, Default Gateway) from the DHCP server. 2. When the DHCP client starts up, it doesn’t have any IP addressing information, and its needs this information if it’s going to participate on a TCP/IP network. At system startup, it will “call out” to all machines on the network (broadcast) asking for a DHCP server anywhere to give it an IP address. 3. ALL DHCP servers within “earshot” will answer this PC’s request. However, the client machine will only accept the offer made by the first machine to respond to the request for IP addressing information. 4. The client will accept the offer of an IP address from this first machine that answers. 5. Once the client machine has its IP addressing information, it can fully initialize (start up) its TCP/IP and “stack” (all the things required to make TCP/IP work correctly). Now that it has its TCP/IP information, it can fully participate in network activities over an TCP/IP network.

DHT (Distributed Hash Table): A distributed tracker that works similarly to a regular tracker in that you announce to it and get back a list of peers that are transferring the same .torrent file as you. Because DHT is distributed, there is no single point of failure, so even if a single node disconnects from DHT, the tracker will continue to work (unlike with normal trackers, where if the server goes down, it becomes unusable). DHT can be thought of as a backup tracker. disk cache: A feature that makes use of available memory to stores data for quicker access as well as ease disk thrashing. The use of a disk cache will cause an increase in memory usage in return for improved performance. disk thrashing: When a storage disk gets accessed very frequently. Extended disk thrashing may lead to hard drive wear and tear, shortening a drive's life.

Domain Name System (DNS), Internet system to translate names into IP addresses double NAT: A situation where the network device is behind more than one NAT devices (generally routers). In this situation, forwarding ports from just one of those NAT devices is generally insufficient, and more actions need to be taken as described in http://portforward.com/help/doublerouterportforwarding.htm. download: The act of transferring data from another server or computer onto your own.

E encryption: The obfusication (concealing) of data behind seemingly random data in order to hide its true identity. endgame mode: A change in the piece requesting strategy that occurs when a download is near completion during which the client requests pieces from all connected peers rather than requesting a piece from one peer at a time in the normal operating mode. Endgame mode is used because download rates often slow down considerably as a torrent job nears completion due to the tendency for the remaining pieces to be downloaded from peers with saturated connections. By requesting data from all peers rather than waiting for a single peer, such a bottleneck can be bypassed. This mode is not used during normal operating modes because of the large amount of overhead it potentially generates in sending requests to all peers.

Page 20 of 25

Revised: 17.1.2010.

F firewall: is a part of a computer system or network that is designed to block unauthorized access while permitting outward communication. It is also a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all computer traffic between different security domains based upon a set of rules and other criteria. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria. There are several types of firewall techniques: • Packet filter: Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to configure. In addition, it is susceptible to IP spoofing. • Application gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation. • Circuit-level gateway: Applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking. • : Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses.

Fear, Uncertainty, and Doubt: (FUD) is a tactic of rhetoric and fallacy used in sales, marketing, public relations, politics and propaganda. FUD is generally a strategic attempt to influence public perception by disseminating negative information designed to undermine the credibility of their beliefs. An individual firm, for example, might use FUD to invite unfavorable opinions and speculation about a competitor's product; to increase the general estimation of switching costs among current customers; or to maintain leverage over a current business partner who could potentially become a rival. FUD techniques may be crude and simple. Alternatively they may be very subtle, employing an indirect approach. The term originated to describe disinformation tactics in the computer hardware industry and has since been used more broadly. FUD is a manifestation of the appeal to fear.

G GiB (gibibyte): A gibibyte is equal to 1024 MiB. Most people are referring to "gibibyte" when they say "gigabyte," even though that is technically an incorrect usage of terms.

H half-open connection: A connection that is not fully established on both ends. Half-open connections occur when you attempt to connect to an IP address, but the IP address hasn't yet responded. hash: A "fingerprint" of data assumed to be unique to the data. Because of the assumed uniqueness of the data, it is used to verify that a piece of data is indeed uncorrupted (since the corrupted data's hash would not match its expected hash). hash check: The comparing of a piece of data's hash with a reference hash in order to verify the integrity of the piece of data. hashfail: When a piece fails the hash check used to verify data integrity.

I index: A site that lists .torrent files available for download. Initial Seeding (Super Seeding): A method of seeding that attempts to decrease the bandwidth load for the initial seeder. With normal seeding methods, the initial seeder typically has to upload 150% to 200%, or even more, of the original data in before a full copy of the data has been distributed into the swarm. With initial seeding, the initial seed attempts to get the rarest pieces out instead of uploading identical pieces repeatedly, often lowering the initial upload requirement to 105%. Initial seeding does not necessarily improve upload speeds or decrease seeding time. It should be used only if you are the sole seeder on the swarm, and if there are at least 2 peers connected. Generally, initial seeding should not be used by people with high upload speeds.

IP address: A number used to uniquely identify devices on a network.

ISP (Internet Service Provider): The company providing for your Internet service.

ISP throttling: A term used to refer to the throttling of BitTorrent traffic by ISPs.

K Page 21 of 25

Revised: 17.1.2010.

KiB (kibibyte): A kibibyte is equal to 1024 bytes. Most people are referring to kibibyte when they say "kilobyte," even though that is technically an incorrect usage of terms.

L LAN (Local Area Network): A network of computers in a local area, such as a home.

LAN IP address: The private, internal IP address that locates a computer on a LAN. A LAN IP address is not visible to users outside of the LAN. As described by RFC 1918, the following ranges are designated as reserved IP addresses for private LANs: 10.0.0.0 - 10.255.255.255, 172.16.0.0 - 172.31.255.255, 192.168.0.0 - 192.168.255.255.

LPD (Local Peer Discovery): A method by which µTorrent attempts to discover new peers local relative to your computer's network. Local Peer Discovery makes use of IP multicast. leecher: A person who downloads, but fails to reciprocate the generosity of others by not sharing back. The word "leecher" carrys a strong negative connotation. Some people use the words "leecher" and "peer" interchangeably, though this practice is not recommended (as it may lead to word confusion).

M MAC address: In computer networking, a Media Access Control address (MAC address), Hardware Address (EHA), hardware address, adapter address or physical address is a unique identifier assigned to most network adapters or network interface cards (NICs) by the manufacturer for identification. If assigned by the manufacturer, a MAC address usually encodes the manufacturer's registered identification number. Although intended to be a permanent and globally unique identification, it is possible to change the MAC address on most of today's hardware, an action often referred to as MAC spoofing. Unlike IP address spoofing, where a sender spoofing their address in a request tricks the other party into sending the response elsewhere, in MAC address spoofing (which takes place only within a local area network), the response is received by the spoofing party. A host cannot determine from the MAC address of another host whether that host is on the same OSI Layer 2 network segment as the sending host, or on a network segment bridged to that network segment. In TCP/IP networks, the MAC address of a subnet interface can be queried with the IP address using the Address Resolution Protocol (ARP) for Internet Protocol Version 4 (IPv4) or the Neighbor Discovery Protocol (NDP) for IPv6. On broadcast networks, such as Ethernet, the MAC address uniquely identifies each node and allows frames to be marked for specific hosts. It thus forms the basis of most of the Link layer (OSI Layer 2) networking upon which upper layer protocols rely to produce complex, functioning networks.

Metadata: here means that the file contains information about the data you want to download, not the data itself. This is what is sent to your computer when you click on a download link on a website. You can also save the torrent file to your local system, and then click on it to open the BitTorrent download.

MiB (mebibyte): A mebibyte is equal to 1024 KiB. Most people are referring to "mebibyte" when they say "megabyte," even though that is technically an incorrect usage of terms.

N NAT (Network Address Translation): The changing of the source or destination IP address for a data packet. This usually occurs when one is behind a firewall or router, where it translates IP addresses so that multiple computers can exist on a LAN with while using the same WAN IP address.

O Onion routing is a technique for anonymous communication over a . Messages are repeatedly encrypted and then sent through several network nodes called onion routers. Each onion router removes a layer of encryption to uncover routing instructions, and sends the message to the next router where this is repeated. This prevents these intermediary nodes from knowing the origin, destination, and contents of the message. As of 2009, Tor is the predominant technology that employs onion routing.

Open source software (OSS) is defined as computer software for which the source code and certain other rights normally reserved for copyright holders are provided under a software license that meets the Open Source Definition or that is in the public domain. This permits users to use, change, and improve the software, and to redistribute it in modified or unmodified forms. It is very often developed in a public, collaborative manner. Open source software is the most prominent example of open source development and often compared to user-generated content. The term open source software originated as part of a marketing campaign for free software. A report by Standish Group states that adoption of open source software models has resulted in savings of about $60 billion per year to consumers.

Page 22 of 25

Revised: 17.1.2010. optimistic unchoke: When a client tries to start a transfer on a previously choked connection in hopes that the connection becomes unchoked.

P P2P (peer-to-peer): The use of bandwidth of users using the same peer-to-peer service to perform the functions of the peer-to-peer service or software. Centralized servers are not what keeps P2P networks alive, but rather, the peers themselves.

PE (Protocol Encryption): A joint specification between Azureus and µTorrent designed to bypass throttling and/or blocking of BitTorrent traffic by ISPs by encryption of the data. There are different methods of encryption, ranging from full encryption of all of the data, to partial encryption of the data (header encryption only, not unlike with PHE, although it's still not as easily detected as PHE). peer: A user/client connected to the swarm. People sometimes refer to peers as "leechers," though they also use the same word to refer to its more negative connotation. It's recommended that you use the word "leecher" to strictly refer to people who don't share so to keep the distinction clear and confusion to a minimum. peer list: A list containing the IPs and ports of other peers.

PEX (Peer Exchange): A feature to exchange peer lists with other peers that support the same PEX implementation (generally limited to peers using the same BitTorrent client). By exchanging peer lists, it's possible to find peers not included in the peer list supplied by the tracker.

PHE (Protocol Header Encryption): An old method of encryption created by the BitComet developer that encrypted only a part of the data (the header) in an attempt to bypass ISP throttling and/or blocking of BitTorrent traffic. Because its specification was poorly developed, ISPs were able to detect it with little trouble, rendering it useless. piece: The smallest appreciable unit of data in BitTorrent. The size of pieces can be different depending on the .torrent file in question. piece distribution: The general distribution of the pieces across the swarm. BitTorrent is generally most efficient when piece distribution is random, with minimal "clumping" of pieces available in the swarm. poisoning: The act of intentionally feeding invalid data into the swarm, resulting in hashfails for peers receiving the invalid data. Outfits with (or hired by other entiries with) anti-P2P agendas are the most common sources of swarm poisoning. port forwarding: The act of passing data on the forwarded port from one network device to another. In most cases regarding BitTorrent, port forwarding refers to the forwarding of connections from a router to a specific computer attempting to listen on that port.

'private' flag: A piece of information stored in a .torrent file that tells any BitTorrent client that recognizes the flag to disable DHT, LPD, and PEX for that specific .torrent. The 'private' flag is typically used in .torrent files served by private trackers as a method of keeping a swarm isolated from people who aren't members of the private tracker. private tracker: A tracker that requires users to log in to use it. Private trackers typically enforce ratio requirements (by banning users whose ratios are too low) in order to prevent or minimize the leeching that is prevalent on many public trackers. protocol: A set of rules and description of how to do things. In the case of the BitTorrent protocol, it is a set of rules describing how BitTorrent clients should communicate and transfer data with each other. proxy: A computer that is told to make a connection to another computer, and relay the data transferred between the two computers to the original computer that connected to the proxy. Essentially, using a proxy is a way to make an indirect connection to another computer by way of the proxy computer. public tracker: A tracker that is open for anyone to use (as opposed to private trackers, where only people who hold accounts can use the tracker).

R ratio: A number derived from the division of two other numbers. In the context of BitTorrent, people are normally referring to share ratio when they speak of a ratio. reseed: The act of rejoining a swarm with no seeds as a seed. Page 23 of 25

Revised: 17.1.2010.

RSS feed: A file that is updated so that it delivers information and content in such a way that allows one to track updates quickly and easily.

S scrape: The grabbing of statistics (number of seeds and peers) from a tracker regarding a specific swarm. seed: A peer with 100% of the data in the torrent contents. seeding: The act of being connected to a swarm as a seed. share ratio: The ratio of the amount of data you've uploaded to the amount of data you've downloaded.

Sneakernet: The oldest form of file sharing is Sneakernet (called such because people would physically transfer files from one person to another by walking; using their sneakers). Before network file sharing people would exchange files on (including audio cassettes, 8-tracks, VHS, Betamax, etc.), floppy disks and other removable media. snubbed: This word describes the state of a BitTorrent connection. A connection is marked as snubbed when the client has not received anything over the connection for an extended period of time.

SpyWare In general, spyware is any technology that aids in gathering information about a person or organization without their knowledge. On the Internet, spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties. Spyware can get in a computer as a software virus or as the result of installing a new program. Data collecting programs that are installed with the user's knowledge are not, properly speaking, spyware, if the user fully understands what data is being collected and with whom it is being shared. The cookie is a well-known mechanism for storing information about an Internet user on their own computer. However, the existence of cookies and their use is generally not concealed from users, who can also disallow access to cookie information. Nevertheless, to the extent that a Web site stores information about you in a cookie that you don't know about, the cookie mechanism could be considered a form of spyware. DoubleClick, a leading banner ad serving company, changed its plans to combine cookie information with database information from other sources to target ad campaigns directly to individuals without their permission. DoubleClick's current policy is not to collect "personally-identifiable" information about a user without their explicit permission or "opt-in." Aureate Media, which distributes free software on the Web in exchange for the right to gather user information, is another company that has been criticized for not plainly indicating what data it gathers and for making it difficult to remove its programming. Spyware is part of an overall public concern about privacy on the Internet. static IP address: An IP address that does not change (remains static) across multiple sessions. A static IP address is necessary in port forwarding, as ports are usually forwarded to a specific IP address, where the rule does not change even if the computer's IP address does.

Super-seeding: is a feature of some BitTorrent clients that attempts to minimize the amount of data which must be uploaded by the original seed until the first completion of a downloading peer. The feature was conceived by John Hoffman and first implemented in the BitTornado client in 2003. This feature is intended to be used when there is only one seed. It is called initial seeding in µTorrent because it is only supposed to be used when there is only one seeder. Super seeding is a change in the behavior of seeds and may be implemented without violating the BitTorrent protocol.

One problem of Bittorrent is, that the original uploader of a given file will show up as the first node having 100% file availability and therefor losing a bit of anonymity. To keep nodes from showing up as "the original uploader", "superseeding" is used, which results in the original client disguising as yet another downloader. This is done is by simply having the uploading node lying about its own statistics and telling other nodes that it’s also still missing files. To allow the distribution process to be completed, the client varies the supposedly "missing" pieces over time, making it look as if itself was still in the process of downloading. It has to be noted that this might only be of help if the tracker itself isn’t compromised and being monitored by a third party. swarm: The collective group of peers (which includes seeds) that are connected by a common .torrent file.

T throttle: A term used to refer to the intentional slowing down of transfer rates (download and/or upload), typically used in the context of ISP throttling.

Page 24 of 25

Revised: 17.1.2010. torrent: A small file containing metadata from the files it is describing. In other contexts, it is sometimes used to refer to the swarm connected around that small file. tracker: Something that a client connects to in order to share its IP and port, as well as obtain information, including peer lists.

U upload: The act of transferring data from your computer onto another.

UPnP (Universal Plug and Play): A protocol that allows devices on a network to communicate with each other seamlessly. In the case of µTorrent, UPnP is used to forward a port on a router without the need to open the port manually.

W WAN (Wide Area Network): A computer network that covers a large geographical area. A WAN connects multiple LANs together. The Internet is an example of a WAN.

WAN IP address: The public, external IP address that users outside of your own network see your network to be located at on the WAN. WAN IP addresses reveal nothing about internal IP address allocation on a LAN located at the WAN IP address. web interface (Web UI): An interface for a supported web browser that allows one to control an application remotely. web seed: A seed that is basically a regular web server hosting the requested file. BitTorrent clients that support web seeds use them like any other seed, and can request data segments from the server much like requesting pieces from an ordinary seed. The use of web seeds ensures that a torrent swarm will never die as long as the file being seeded is left intact on the server and the server does not go down.

Warner Music Group (WMG) is the third-largest of the big four major record labels, the others being Sony, EMI, and Universal. Warner Music Group also has a publishing arm, Warner/Chappell Music, that dates back to 1929, when Jack Warner, president of Warner Bros. Pictures Inc., founded Music Publishers Holding Company (MPHC) to acquire music copyrights as a means of providing inexpensive music for films. Among the historic compositions of which the publishing rights are controlled by WMG are the works of Cole Porter, Richard Rodgers and Lorenz Hart. Its printed music operation, Warner Bros. Publications, was sold to Alfred Publishing on 2005-06-01.

Page 25 of 25