implemented in BitComet, BitTornado, Deluge, Flashget, KTorrent, libtorrent (used by various BitTorrent clients, including qBittorrent), Mainline, μTorrent, qBittorrent...
19 KB (1,913 words) - 03:51, 26 March 2025
BitTorrent is a communication protocol for peer-to-peer file sharing (P2P), which enables users to distribute data and electronic files over the Internet...
87 KB (8,961 words) - 07:14, 20 July 2025
uploading and downloading files via the BitTorrent protocol. BitTorrent was the first client written for the protocol. It is often nicknamed Mainline by developers...
28 KB (1,401 words) - 16:00, 1 July 2025
of BitTorrent clients, which are computer programs designed for peer-to-peer file sharing using the BitTorrent protocol. The BitTorrent protocol coordinates...
67 KB (3,012 words) - 17:11, 21 April 2025
implementations can obfuscate traffic using RC4 et al. See BitTorrent protocol encryption. RFC 6726 suggests IPSec as one option. One implementation,...
63 KB (3,211 words) - 12:54, 4 July 2025
Instant, WebTorrent implements the BitTorrent protocol using WebRTC for peer-to-peer data transfer, allowing users to download and stream torrents without...
11 KB (923 words) - 00:52, 9 June 2025
Selenomethionine, a naturally occurring amino acid Message Stream Encryption, a BitTorrent protocol encryption Media Source Extensions, a W3C standard for Javascript...
3 KB (317 words) - 19:54, 14 February 2025
the free dictionary. PHE or Phe may refer to: Protocol header encrypt or BitTorrent protocol encryption Phenylalanine (symbol: Phe), an amino acid Phoenix...
860 bytes (134 words) - 14:37, 21 January 2024
TorrentFreak (TF) is a blog dedicated to reporting the latest news and trends on the BitTorrent protocol and file sharing, as well as on copyright infringement...
15 KB (1,149 words) - 04:14, 8 July 2025
RTorrent (redirect from LibTorrent)
downloading of multi-file torrents. In the release of rTorrent-0.7.0 support for BitTorrent protocol encryption was also implemented. PEX, DHT and initial seeding...
6 KB (474 words) - 01:52, 1 August 2025
RC4 (section RC4-based protocols)
WPA, but can be configured to use AES-CCMP instead of RC4) BitTorrent protocol encryption Microsoft Office XP (insecure implementation since nonce remains...
45 KB (5,091 words) - 05:33, 18 July 2025
Peer-to-peer (redirect from Peer-to-peer protocol)
applications started implementing protocol obfuscation, such as the BitTorrent protocol encryption. Techniques for achieving "protocol obfuscation" involves removing...
61 KB (6,947 words) - 12:28, 18 July 2025
Resilio Sync (redirect from Bittorrent Sync)
BitTorrent Inc. as an independent company, Resilio Inc. which will continue development of the product under the name Resilio Sync. Former Bittorrent...
13 KB (1,092 words) - 07:12, 16 March 2025
eXeem was a peer-to-peer (P2P) file sharing client using the BitTorrent protocol. eXeem was designed to replace the need for centralized trackers (servers...
4 KB (459 words) - 00:45, 5 January 2025
The Pirate Bay (redirect from The galaxy's most resilient BitTorrent site)
Pirate Bay facilitates the connection among users of the peer-to-peer torrent protocol, which are able to contribute to the site through the addition of magnet...
169 KB (14,326 words) - 18:55, 14 July 2025
of the Internet Protocol specifications (such as SMTP, Telnet, POP and IMAP) that were designed prior to the creation of encryption mechanisms such as...
34 KB (3,976 words) - 15:37, 23 July 2025
the file sharing aspects of the protocol. Hess released a new version of Direct Connect, requiring a simple encryption key to initiate a connection, locking...
15 KB (1,750 words) - 07:59, 1 January 2025
Ransomware (redirect from Encryption Trojan)
implementation mistakes, leaked cryptographic keys or a complete lack of encryption in the ransomware. Ransomware attacks are typically carried out using...
106 KB (10,949 words) - 13:27, 24 July 2025
I2P (category Application layer protocols)
actively maintained I2PRufus fork. XD is a standalone BitTorrent client written in Go. BiglyBT is a bittorrent client based on Vuze which also allows the use...
74 KB (5,131 words) - 06:07, 28 June 2025
Domain Name System (redirect from DNS Protocol)
transport-layer encryption provided by TLS. The DNSCrypt protocol, which was developed in 2011 outside the IETF standards framework, introduced DNS encryption on the...
69 KB (9,812 words) - 11:03, 15 July 2025
Libtorrent (category BitTorrent)
libtorrent is an open-source implementation of the BitTorrent protocol. It is written in and has its main library interface in C++. Its most notable features...
18 KB (1,987 words) - 06:28, 24 December 2024
microblogging program which uses end-to-end encryption to safeguard communications. Based on BitTorrent and Bitcoin-like protocols, it has been likened to a distributed...
11 KB (1,012 words) - 17:04, 15 March 2025
List of TCP and UDP port numbers (category Transmission Control Protocol)
by Cisco's URD protocol. Subsequently, port 587 was assigned as the SMTP submission port, but was initially in plaintext, with encryption eventually provided...
321 KB (13,135 words) - 10:31, 30 July 2025
InterPlanetary File System (IPFS), BitTorrent Btrfs and ZFS file systems (to counter data degradation); Dat protocol; Apache Wave protocol; Git and Mercurial distributed...
15 KB (1,787 words) - 20:00, 22 July 2025
KTorrent (category BitTorrent clients for Linux)
while downloading Free and open-source software portal KGet qBittorrent Comparison of BitTorrent software https://invent.kde.org/network/ktorrent/-/tags/v23...
3 KB (266 words) - 14:53, 12 November 2023
Goppa code • Biometric word list • Birthday attack • Bit-flipping attack • BitTorrent protocol encryption • Biuro Szyfrów • Black Chamber • Blaise de Vigenère...
66 KB (2,911 words) - 02:58, 27 July 2025
Bandwidth Benchmark Barcode Booting or Boot loader BIOS Bitmap Bitcoin BitTorrent Blacklist Blockchain Bluetooth Binary Backlink Bloatware Broadband Lifecycle...
6 KB (339 words) - 06:37, 27 June 2025
Instant messaging (section Encryption)
Retrieved 2025-07-05. "Signal adds quantum-resistant encryption to its E2EE messaging protocol". BleepingComputer. Retrieved 2025-07-05. Goodin, Dan...
65 KB (6,866 words) - 14:19, 16 July 2025
change very frequently Encryption makes this method impossible in many cases Matching bit patterns of data to those of known protocols is a simple, widely...
11 KB (1,322 words) - 16:12, 26 July 2025