Building a dedicated download system with rTorrent
Adding a Torrent
To add a torrent, ssh into the remote machine and log in to your account. At the command line, open rTorrent with the following command:
To control rTorrent through SSH, you can use the normal key bindings (see Table 1). The best part is that if you paste the link of a torrent file (e.g., if your torrent is at http://www.torrentsite.com/tor.torrent) and paste it to the load prompt of rTorrent, rTorrent will download the file.
Another way to add a torrent is to ssh into the remote machine and wget the torrent file in the watch directory:
The preceding command tells rTorrent what to do with the file depending on the current state of the torrent (see the preceding section). Table 1 shows a list of useful rTorrent key bindings.
If you want more detailed information about key bindings, go to the rTorrent man page.
That old computer of yours will come in handy as a dedicated download system. For quite some time now, I have used this configuration successfully. Of course, if your system has the necessary resources, you might want to opt for a GUI-based interface for managing the torrents, which is possible with the alternative wTorrent tool. Happy Downloading!
- Debian net install image: http://www.debian.org/CD/netinst/
- Debian Installation Manual: http://www.debian.org/releases/stable/installmanual
- rTorrent: http://libtorrent.rakshasa.no/
- Wikipedia on BitTorrent: http://en.wikipedia.org/wiki/BitTorrent_(protocol)
- rtorrent.rc sample: http://libtorrent.rakshasa.no/export/1094/trunk/rtorrent/doc/rtorrent.rc
- CanYouSeeMe.org: http://www.canyouseeme.org/
- no-ip docs: http://www.no-ip.com/support/guides/update_clients/setting_up_linux_update_client.html
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.
Klaus Knopper announces the latest version of his iconic Live Linux system.
All websites that use these popular CMS tools could be vulnerable to denial of service attacks if users don't install the updates.
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.