Building a dedicated download system with rTorrent
Adding a Torrent
To add a torrent, ssh into the remote machine and log in to your account. At the command line, open rTorrent with the following command:
To control rTorrent through SSH, you can use the normal key bindings (see Table 1). The best part is that if you paste the link of a torrent file (e.g., if your torrent is at http://www.torrentsite.com/tor.torrent) and paste it to the load prompt of rTorrent, rTorrent will download the file.
Another way to add a torrent is to ssh into the remote machine and wget the torrent file in the watch directory:
The preceding command tells rTorrent what to do with the file depending on the current state of the torrent (see the preceding section). Table 1 shows a list of useful rTorrent key bindings.
If you want more detailed information about key bindings, go to the rTorrent man page.
That old computer of yours will come in handy as a dedicated download system. For quite some time now, I have used this configuration successfully. Of course, if your system has the necessary resources, you might want to opt for a GUI-based interface for managing the torrents, which is possible with the alternative wTorrent tool. Happy Downloading!
- Debian net install image: http://www.debian.org/CD/netinst/
- Debian Installation Manual: http://www.debian.org/releases/stable/installmanual
- rTorrent: http://libtorrent.rakshasa.no/
- Wikipedia on BitTorrent: http://en.wikipedia.org/wiki/BitTorrent_(protocol)
- rtorrent.rc sample: http://libtorrent.rakshasa.no/export/1094/trunk/rtorrent/doc/rtorrent.rc
- CanYouSeeMe.org: http://www.canyouseeme.org/
- no-ip docs: http://www.no-ip.com/support/guides/update_clients/setting_up_linux_update_client.html
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.
Quintessential open source browser shores up its market share with a step toward the proprietary dark side.
Authorities in 16 countries take action against users of the imfamous BlackShades malware tool.