Building a dedicated download system with rTorrent
Adding a Torrent
To add a torrent, ssh into the remote machine and log in to your account. At the command line, open rTorrent with the following command:
To control rTorrent through SSH, you can use the normal key bindings (see Table 1). The best part is that if you paste the link of a torrent file (e.g., if your torrent is at http://www.torrentsite.com/tor.torrent) and paste it to the load prompt of rTorrent, rTorrent will download the file.
Another way to add a torrent is to ssh into the remote machine and wget the torrent file in the watch directory:
The preceding command tells rTorrent what to do with the file depending on the current state of the torrent (see the preceding section). Table 1 shows a list of useful rTorrent key bindings.
If you want more detailed information about key bindings, go to the rTorrent man page.
That old computer of yours will come in handy as a dedicated download system. For quite some time now, I have used this configuration successfully. Of course, if your system has the necessary resources, you might want to opt for a GUI-based interface for managing the torrents, which is possible with the alternative wTorrent tool. Happy Downloading!
- Debian net install image: http://www.debian.org/CD/netinst/
- Debian Installation Manual: http://www.debian.org/releases/stable/installmanual
- rTorrent: http://libtorrent.rakshasa.no/
- Wikipedia on BitTorrent: http://en.wikipedia.org/wiki/BitTorrent_(protocol)
- rtorrent.rc sample: http://libtorrent.rakshasa.no/export/1094/trunk/rtorrent/doc/rtorrent.rc
- CanYouSeeMe.org: http://www.canyouseeme.org/
- no-ip docs: http://www.no-ip.com/support/guides/update_clients/setting_up_linux_update_client.html
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.