Building a dedicated download system with rTorrent
Adding a Torrent
To add a torrent, ssh into the remote machine and log in to your account. At the command line, open rTorrent with the following command:
To control rTorrent through SSH, you can use the normal key bindings (see Table 1). The best part is that if you paste the link of a torrent file (e.g., if your torrent is at http://www.torrentsite.com/tor.torrent) and paste it to the load prompt of rTorrent, rTorrent will download the file.
Another way to add a torrent is to ssh into the remote machine and wget the torrent file in the watch directory:
The preceding command tells rTorrent what to do with the file depending on the current state of the torrent (see the preceding section). Table 1 shows a list of useful rTorrent key bindings.
If you want more detailed information about key bindings, go to the rTorrent man page.
That old computer of yours will come in handy as a dedicated download system. For quite some time now, I have used this configuration successfully. Of course, if your system has the necessary resources, you might want to opt for a GUI-based interface for managing the torrents, which is possible with the alternative wTorrent tool. Happy Downloading!
- Debian net install image: http://www.debian.org/CD/netinst/
- Debian Installation Manual: http://www.debian.org/releases/stable/installmanual
- rTorrent: http://libtorrent.rakshasa.no/
- Wikipedia on BitTorrent: http://en.wikipedia.org/wiki/BitTorrent_(protocol)
- rtorrent.rc sample: http://libtorrent.rakshasa.no/export/1094/trunk/rtorrent/doc/rtorrent.rc
- CanYouSeeMe.org: http://www.canyouseeme.org/
- no-ip docs: http://www.no-ip.com/support/guides/update_clients/setting_up_linux_update_client.html
Read full article as PDF:
New release comes with better semantic search and improvements to Kontact.
Annual code quality report shows FOSS is more secure at all project size levels.
The Raspberry Pi Foundation has announced an even smaller version of the tiny computer that will fit into a DIMM slot.
A new class of problems lets a malicious app pre-configure an invisible privilege update.
New Hack language adds static typing and other conveniences.
New crypto policy system will offer easier configuration and more uniform security.
Ubuntu founder denounces insecurity in proprietary, close-source software blobs.
Vulnerability affects many Linux web servers
The Bavarian capital shuns Microsoft, Google, and other alternatives to implement an open source groupware solution.
Phone vendor partnerships bring Mark Shuttleworth's dream of Ubuntu on a phone a step closer to reality.