Downloading torrents is one of the easiest ways to get the files you want. Unfortunately, the way data exchange works on torrents runs the risk of spreading viruses, or getting you caught for sharing illegal content. However, the risk of virus attack will be reduced if you take precautions. It can also reduce the risk of being caught.
Step
Part 1 of 2: Avoiding Virus Attacks
Step 1. Make sure you have antivirus installed
A good Antivirus program will protect your computer from malicious torrents. Windows has Windows Defender, which is pretty good at catching almost any virus. Windows Defender can be activated through the Control Panel as long as you don't have another antivirus installed. If you want, you can install an antivirus from a third party, such as Kaspersky or BitDefender. Whichever program you choose, you should only have one antivirus installed at a time.
See How to Install an Antivirus for instructions on selecting and installing an antivirus program
Step 2. Look for torrents that have multiple seeders (people who finish downloading the torrent, then upload the downloaded file)
A large number of seeders usually indicates that the torrent is virus free. This is because people have checked it and found no virus in it, so they started sharing it. While not a definite guarantee, it can help you choose a good torrent. A large number of seeders will also speed up the transfer.
Step 3. Check the comments given before you download
It's not a guarantee, but comments on a torrent can help determine whether the file contains a virus or not. If a lot of comments say that there is no malicious virus, it's likely that the file doesn't contain a virus. If a lot of comments about the presence of a virus, maybe you should avoid the torrent.
Step 4. Avoid file types that are prone to viruses
Do not download torrents that contain programs because executables or executables (such as EXE, BAT) often contain viruses that can attack your computer. The most dangerous files when you download them via torrent are programs that have been cracked (software that is hacked so you can use it without buying it).
Step 5. Join a private torrent community
If you can get an invitation to join a private torrent community, usually the torrent being shared doesn't contain viruses. This is because all torrents are created and shared by community members so the files are more trusted. It's very difficult to become a member of a private community because you have to know someone who can invite you. The best way to get an invite is to be active in various online communities and make friends with people who are part of the torrent community.
Part 2 of 2: Avoiding Detection
Step 1. Understand how torrents work
When downloading torrent files, your IP address is known to everyone sharing the torrent. This is very important so that the torrent client can connect to other users. However, this leaves you vulnerable to being logged by those who track torrent traffic. The tracking parties include internet service providers or ISPs (Internet Service Providers) and copyright supervisory agencies. You can do several things to minimize this risk or prevent your internet service provider from reducing your internet speed.
Step 2. Install PeerBlock
PeerBlock is a known torrent tracker IP address blocker program. The computer will be prevented from connecting to the torrent tracker's IP address. Basically, this program blocks torrent trackers from participating in your torrent traffic. This doesn't always keep you from getting caught, and the ISP you're using can still know if you're transferring torrents. However, it's a quick and easy way to minimize the risk of getting threatening letters from the RIAA (Recording Industry Association of America) or MPAA (Motion Picture Association of America).
PeerBlock can be downloaded for free at peerblock.com. Follow the instructions provided to get PeerBlock up and running. This program will run automatically in the background and prevent the computer from connecting to known bad IP addresses. Use Bluetack's "P2P" list to get basic torrent protection on demand when you do the initial setup
Step 3. Try using a VPN service
To be completely anonymous when transferring torrents, sign up for a VPN (Virtual Private Network). You have to pay several tens of thousands of rupiah in a month, but your traffic on the internet will be hidden from anyone. Your ISP also can't tell if you're transferring torrent data so it won't reduce the connection speed. Those who are used to tracking IP addresses will also not be able to see your real IP, and will not send you a warning letter.
VPN services have some drawbacks. Most importantly, this service is not free so you have to consider whether the cost is worth the benefits. The internet speed will decrease because the traffic will be sent to the VPN server before it reaches your computer. You'll most likely be connecting to a VPN that's overseas, so internet speeds will drop significantly. Finally, VPN services may maintain records that can be provided to law enforcement. However, you can choose a service that doesn't keep logs
Step 4. Select and sign up for a VPN service
There are a variety of VPN services to choose from, all of which offer varying prices and privacy policies. Be sure to read the description of the VPN you are interested in. Be wary of VPN services that keep detailed logs. Also, not all VPN services allow torrenting traffic. Some of the popular VPN services are listed below, but you can find many others through a Google search. Do not use free VPN services and proxies as they are usually not secure. Many paid VPNs operate outside the US due to lax laws regarding data exchange. Some of the VPN services to choose from include:
- Private Internet Access
- TorGuard
- IPVanish
- IVPN
Step 5. Look for your VPN connection information
When you sign up for a VPN service, you will receive the information necessary to connect. This includes the VPN server address, along with your username and password. You may have to go to the VPN site to get this information.
Step 6. Run the torrent client
After signing up for a VPN service, configure a torrent client so you can connect to the service.
Step 7. Open the Options or Preferences menu
This is usually in the Tools or Options menu at the top of the torrent client.
Step 8. Click the “Connections” tab
Here you can customize connection settings, including adding VPN connection information.
Step 9. Select the VPN type in the "Type" menu, in the "Proxy Server" section
Most VPN services use SOCKS5. Double-check the VPN connection information if you are not sure.
Step 10. Enter the VPN address and port
This connection information can be obtained when you log in to the VPN site you are using. Many VPNs offer several different servers that you can connect to to increase your connection speed.
Make sure you have checked "Use proxy for peer connections"
Step 11. Start downloading the torrent
After configuring your chosen VPN service, you can start downloading torrents anonymously. No VPN service can guarantee you to be 100% anonymous. However, if you use one of the services, it can significantly reduce the risks you may face.