Wednesday, December 18, 2013

Distributed Hash Table (DHT) - Disable in uTorrent, Deluge, rtorrent and transmission

DHT - Distributed hash tin a position

Distributed hash tables (DHTs) are a class of decentralized distributed systems that supply a lookup service equivalent to a hash table: (name, value) pairs are stored in the DHT, and any participating node can efficiently retrieve the worth related with a given name. Duty for preserving the mapping from names to values is distributed among the nodes, in such a way that a adjust in the set of participants causes a minimal quantity of disruption. This permits DHTs to scale to really massive numbers of nodes and to manage continual node arrivals, departures, and failures.

DHTs form an infrastructure that can be utilized to build far more complicated services, such as distributed file systems, peer-to-peer file sharing and content distribution systems, cooperative web caching, multicast, anycast, domain name solutions, and immediate messaging. Notable distributed networks that use DHTs consist of BitTorrent (with extensions), eDonkey network, YaCy, and the Coral Content material Distribution Network.

Why is it crucial to disable DHT

If you have enabled DHT you could be uploading to folks who never even have access to the site so you won't be getting the appropriate credit for your uploads & downloads. You will be sharing information out of the tracker and these ghost peers will be utilizing your bandwidth to download from you.
That is why you are forced now to re-download your torrents from the internet site if you did not generate the torrent file correctly.
But there is one more problem with DHT, it opens way also a lot of connections to your laptop and it could trigger a lot of troubles ... for example your router could run out of memory and freeze usually, or your connection becomes really slow.
One of the 1st processes that fails is DNS relay, which is why existing connections continue to work but new connections, like web browsing, starts failing.

DHT also constantly utilizes a bit of upload and download bandwidth with no obtain out of it whatsoever although employing a private tracker.

In uTorrent:
Possibilities/Preferences/BitTorrent/ uncheck
- Allow DHT Network 
- Allow DHT for new torrents
- Allow Peer Exchange

Click OK to save alterations.
You must see "DHT: Disabled" on the bottom of the primary uTorrent window.

In Deluge:
Edit/Preferences/Network/Network Extras/ uncheck:
- Peer Exchange

In qBittorrent:
Tools/Alternatives (or Alt-O) uncheck:
- Enable DHT
- Enable Peer Exchange (PeX)

In Transmission
Edit/Preferences/Privacy/ uncheck:

In rtorrent
Edit .rtorrent.rc config file(usually positioned in the residence folder):

# Allow DHT support for trackerless torrents or when all trackers are down.
# May possibly be set to "disable" (completely disable DHT), "off" (do not commence DHT),
# "auto" (start off and quit DHT as needed), or "on" (begin DHT quickly).
# The default is "off". For DHT to function, a session directory have to be defined.
dht = off

Note: path could not specifically apply to OSes other than Linux, if the UI layout is various.
Distributed Hash Table (DHT) - Disable in uTorrent, Deluge, rtorrent and transmission
9out of 10 based on 10 ratings. 9 user reviews.

Video resolutions

480p is defined as having a maximum resolution of 854x480. Therefore, an encode obtaining a width of 854 pixels or having a height of 480 pixels qualifies it as 480p.

720p is defined as obtaining a maximum resolution of 1280x720. For that reason, an encode getting a width of 1280 pixels or obtaining a height of 720 pixels qualifies it as 720p.

1080p is defined as obtaining a maximum resolution of 1920x1080. As a result, an encode obtaining a width of 1920 pixels or possessing a height of 1080 pixels qualifies it as 1080p.

Video resolutions
9out of 10 based on 10 ratings. 9 user reviews.

Monday, December 16, 2013

JKT48 - Pajama Drive SENSHURAKU: CD-Audio

Pajama Drive SENSHURAKU CD’s contain studio recordings of “Setlist Pajama Drive” final day performances presented by JKT48 first generation.


Released: 6 Juli 2013
Genre: Pop
Label: Hits Records
Producer: Yasushi Akimoto
Track: Overture + 16 songs


File: MP3
Bit rate: 320 kbps
Upload: archemist
Size: ± 150 MB
Server: GDrive


Track Uploaded

note: This is sample, please Purchase Original CD & DVD

CD – Audio
00. Overture
01. Shonichi | Hari Pertama
02. Hissatsu Teleport | Jurus Rahasia Teleport
03. Gokigen Nanamena Mermaid | Putri Duyung Yang Sedang Sedih
04. Futari Nori no Jitensha | Bersepeda Berdua
05. Tenshi no Shippo | Ekor Malaikat
06. Pajama Drive
07. Junjou Shugi | Prinsip Kesucian Hati
08. Temodemo no Namida | Air Mata Perasaan yang Tak Tersampaikan
09. Kagami no Naka no Jeanne D’Arc | Joan of Arc di Dalam Cermin
ten. Two Years Later
11. Inochi no Tsukaimichi | Cara Menggunakan Hidup
12. Kiss Shite Son Shichatta | Rugi Sudah Dicium
13. Boku no Sakura | Bunga Sakuraku
14. Wasshoi J!
15. Suifu wa Arashi ni Yume wo Miru | Pelaut yang Melihat Mimpi di Tengah Badai

16. Shiroi Shirt | Baju Putih

~Download CD Audio~

DVD – Bonus
01. JKT48 - Pajama Drive SENSHURAKU: DVD 1st Gen
02. JKT48 - Pajama Drive SENSHURAKU: DVD 2nd Gen



See also ~> [3rd Single] JKT48 - Fortune Cookie in Adore

JKT48 - Pajama Drive SENSHURAKU: CD-Audio
9out of 10 based on 10 ratings. 9 user reviews.

Sunday, December 15, 2013

Highschool of the DEAD

The story follows a group of higher college students, the school's nurse, and a young girl as they fight their way to security through the deadly streets of Japan for the duration of the worldwide catastrophic event identified as the "Outbreak".

Type: Television Series
Episodes: 12 episode [Uncensored]
Status: Finish Airing
Genres: Action, Ecchi, Horror, Supernatural
Duration: 23 min. per episode
Rating: R - 17+ (violence & profanity)


Audio: Japan
Resolution: 1280x720
Fansub: Kira-Fansub
Encode: kmonmoy [on]
Size: -+ 100 MB
Server: IDWS


Episode Uploaded


Episode 12 | All Deads Attack
Episode 11 | Dead Storm Increasing
Episode ten | The Dead's Home Rules
Episode 09 | The Sword and Dead
Episode 08 | The Dead Way Property
Episode 07 | Dead Evening and the Dead Ruck
Episode 06 | In the Dead of the Evening
Episode 05 | Streets of the Dead
Episode 04 | Operating in the Dead
Episode 03 | Democracy beneath the Dead
Episode 02 | Escape from the Dead
Episode 01 | Spring of the Dead

Highschool of the DEAD
9out of 10 based on 10 ratings. 9 user reviews.

Saturday, December 14, 2013

[2nd Single] JKT48 - Yuuhi wo Miteiruka?

Yuuhi wo miteiru ka? / Apakah Kau Melihat Mentari Senja? is the second released single of the Indonesian idol group JKT48 on July 3, 2013 beneath the label Hits Records. The single has two versions. This single presented the selected member from Group J & Members from newly designed Team KIII.


Released: 3 July 2013
Genre: Pop
Label: Hits Records
Producer: Yasushi Akimoto

Track: four songs + DVD Bonus


File: MP3
Bit rate: 320 kbps
Upload: archemist
Size: –+ 42 MB
Server: GDrive


Track Uploaded

note: This is sample, please Buy Original CD & DVD

CD – Audio
01. Yuuhi wo Miteiruka? | Apakah Kau Melihat Mentari Senja?
02. Nagai Hikari | Cahaya Panjang
03. 1! two! three! 4! Yoroshiku!
04. Viva! Hurricane

~Download CD Audio~

DVD – Bonus

01. Yuuhi wo Miteiruka? Music Video (1258x720)
02. Yuuhi wo Miteiruka? Music Video Behind The Scenes (1168x720)



See also ~> [1st Single] JKT48 – RIVER

See also ~> [3rd Single] JKT48 - Fortune Cookie in Adore

[2nd Single] JKT48 - Yuuhi wo Miteiruka?
9out of 10 based on 10 ratings. 9 user reviews.

uTorrent - Using the embedded tracker

This tutorial is developed to teach you how to use uTorrent's embedded tracker function to transfer files more than the BitTorrent protocol and can be used in lieu of setting up FTP or other methods of file transfer.

Why would I want to use BitTorrent instead of some other method?
1. Supports error checking.
2. Flawless begin/stop ability.
3. A lot more handle more than which files are transferred very first.
four. No require to install additional software program (if you use uTorrent)
5. Straightforward safety. No one can download something with out the torrent file. Also supports encryption with the click of a button.

How to do it: (Note: I use uTorrent 1.eight.1b construct 12549 Second note: screen shots of all essential directions are integrated right after every single step)
1. Enable the tracker in uTorrent's sophisticated preferences: First navigate to the advanced choice tab and then find the bt.enable_tracker selection and adjust its value to true.
2. Assign a listening port for your tracker: To do this click on the Web UI tab in the preferences. If you haven't already click "Enable Internet UI". If you never in fact want to use the Net UI and never want other folks using it, sort random characters into the username and password fields. Chances are if you have a entirely random username and password that you don't even know, nobody will be in a position to guess it. Then verify the alternative listening port box and enter a port quantity that you are not employing however, i.e. diverse from the other BitTorrent port you happen to be utilizing for typical transfers. You will need to forward this port on your router if you plan on transferring outside of your nearby network. Even if you do not plan on it, it is ideal to do it anyway since it tends to make issues less complicated down the line, and this guide assumes you forwarded the port.
three. Create the torrent file: Do this the way you would usually produce a torrent file, the only distinction will be the tracker you enter in. First you want to uncover out the IP address your ISP assigned to you. To do this go to and use that IP address (ought to appear one thing like this(distinct numbers though): However this does not operate really nicely if you have a dynamic IP address. If you have a dynamic IP address it will be greater for you to use your regional IP address. To discover out that IP address go to the begin menu, click run and kind in "cmd" (no quotes) and click enter. In the box that comes up type ipconfig and hit enter. The IP address you will use will be marked as IPv4 address. Alternatively, you can set up a DynDNS account and use your domain you get there in place of your IP address. In any case copy the IP address that you will be using into the trackers box on the "Produce a Torrent" window. Then add "http://" (no quotes) to the beginning and add the listening port you created earlier to the end, but place a colon amongst the IP address and the port quantity. Lastly, add "/announce" (no quotes) to the extremely end of the entire factor. Also, since this is not on a private tracker, you do not need to have private torrent checked but it won't really hurt something. Then click the "Develop and save as..." button to develop the torrent. If you have more than one NIC on your pc, figure out which one you use.
four. Now all you need to do is copy the torrent file you just made to the other pc and open it there. It should act just like a typical torrent that you would download from any standard tracker.
WARNING: Do not add a private tracker to the list of trackers if you are using this method. Performing so will result in your client to report incorrect stats back to the private tracker and that will be viewed as cheating and it will result in you being disabled. Most trackers do not accept ignorance as an excuse, so be confident you do this properly.
uTorrent - Using the embedded tracker
9out of 10 based on 10 ratings. 9 user reviews.

Are VPN safe or not?

There are many VPN services out there but not all of them are protected simply because they LOG your activity. This logging of your activity is what tends to make you vulnerable to folks and institutions that you do not want to be vulnerable to. The logged details points straight to you and regardless of whether that information is obtained by sniffing, or an outright court order by the authorities governing that location, it does not mater after they have your IP and connect it to a piece of copyright material, you get a letter from your ISP or occasionally worse.

Further, the logs these companies keep, they preserve for numerous amounts of time.  Some preserve logs for only 15 minutes, some for hours, some a day, some say 3 or four days, others say 30 days, 60, 90 and some indefinitely. 

Only a very couple of say they do not hold logs but of these few if you study the TOS (terms of service) you'll locate that the docs show they are clearly lying, saying if they locate you breaking the guidelines (copyright infringement etc.) they will cease your service with no any refund some even say they will report you to governing authorities  Holy Carpola!

So the only way to keep completely safe employing VPN is to be with a VPN firm that does not log anything that has to do with your activities.  This way even if governing authorities ask for all info regarding any persons account or IP, or even raid the VPN business, since there are no logs, no data can be obtained!
Watch this video to get an concept upon What is VPN:

Are VPN safe or not?
9out of 10 based on 10 ratings. 9 user reviews.