Bittorrent for Dummies®
Find safe files to download, create your own, and use BitTorrent for business
There's certainly a torrent of interest in BitTorrent! But while it enables you to download all kinds of cool files and to distribute your own creative efforts, it also carries some risks. This book not only shows you how to acquire BitTorrent, but also how to use it without picking up worms, viruses, and lawsuits.
Discover how to
* Select, download, and install a BitTorrent client
* Manage and store files you download
* Choose software for making movies and audio files
* Understand the legal risks of file sharing
* Trim business costs with BitTorrent
Kris Krug is a writer, designer, photographer, and Web aficionado based in Vancouver, British Columbia.
Table of Contents
Part I: Getting Started with BitTorrent.
Chapter 1: Cluing In to BitTorrent.
Chapter 2: Downloading BitTorrent Files.
Chapter 3: Playing BitTorrent Files.
Part II: Managing BitTorrent Content.
Chapter 4: Finding BitTorrent Content.
Chapter 5: Storing BitTorrent Content.
Chapter 6: Understanding BitTorrent and the Law.
Part III: Creating BitTorrent Content.
Chapter 7: Creating Audio Files.
Chapter 8: Shooting Digital Video.
Chapter 9: Capturing and Editing Digital Video.
Part IV: Delivering BitTorrent Content.
Chapter 10: Making and Tracking Torrents.
Chapter 11: Seeding Your Torrents.
Chapter 12: Promoting Your Torrents.3
Part V: Getting More out of BitTorrent.
Chapter 13: Hunting for Additional Content.
Chapter 14: Protecting Your Content.
Chapter 15: Using BitTorrent in Organizations.
Part VI: The Part of Tens.
Chapter 16: Ten (Or So) Common File Formats for Sharing Your Content.
Chapter 17: Ten (Or So) Things You Can Do to Stay Safe from Viruses.
Chapter 18: Ten Fun BitTorrent Downloads.
Sign up now »
When competition is tough and resources are limited, corporate leaders are depending on growing their existing capabilities in order to grow their business. Information technology can be a unique catalyst ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- AusCERT 2013: Introduction to Network Security Monitoring with Security Onion - AusCERT Presentation
- Auscert 2013: Perimeter protection has failed, encryption needs its day in the sun
- AusCERT 2013: Low-level analysis can find, map data deleted from Android phones
- Cybercrime Survey: Almost half of small business victims
- AusCERT 2013: Cloud-based scanner identifies new malware by its ancestry
- Lack of information, skills hinder finance-business partnering: Deloitte
- Rapid-growing mobile payments market is driving a financial fraud marketplace
- HP profit falls 32 per cent as PC and server sales decline
- Google launching new fund for later-stage tech investments
- Apple defends offshore decisions that result in low taxes