ED2k .

54
• eD2k https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and- online-course.html

Transcript of ED2k .

Page 1: ED2k .

• eD2k

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 2: ED2k .

Checksum Checksum tools

1 CHK Checksum Utility, An advanced checksum tool with CRC32, ED2K

(eMule/eDonkey2000), MD5, SHA1, SHA1-Base32, SHA256, SHA384, SHA512 and Keccak512 (SHA3)

support

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 3: ED2k .

URL shortening - Techniques

1 Not all protocols are capable of being shortened, as of 2011, although protocols such as http, https, ftp,

ftps, mailto, mms, rtmp, rtmpt, ed2k, pop, imap, nntp, news, ldap, gopher, dict and dns are being addressed by

such services as URL Shortener

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 4: ED2k .

The Pirate Bay - Projects

1 In 2008, Baywords was launched as a free blogging service that lets users of the site blog about anything as long as it does not break any Swedish laws. In December, The Pirate Bay resurrected ShareReactor as a combined eD2k and BitTorrent site. The

same month, the Vio mobile video converter was released, designed to convert video files

for playback on mobile devices such as iPhone, BlackBerry, Android, many Nokia and

Windows Mobile devices.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 5: ED2k .

Animal model - Ethics of Animal Use

1 In addition to proving the potential for benefit to human health,

minimization of pain and distress, and timely and humane euthanasia,

experimenters must justify their protocols based on the principles of

Replacement, Reduction and Refinement.http://grants.nih.gov/grants/olaw/investigatorsneed2know.pdf

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 6: ED2k .

Cryptographic hash function - File or data identifier

1 For example, in an ed2k link, an MD4-variant hash is combined with

the file size, providing sufficient information for locating file sources, downloading the file and verifying its

contents

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 7: ED2k .

Konqueror Embedded - KIO

1 Similarly, Konqueror can use KIO plugins (called IOslaves) to access ZIP (file format)|ZIP files and other

archives, to process ed2k links (edonkey/emule), or even to browse

CD|audio CDs, (audiocd:/) and ripping|rip them via drag-and-drop.

Likewise, the man: and info: IOslaves are handy for fetching nicely formatted documentation.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 8: ED2k .

MD4

1 A variant of MD4 is used in the Ed2k: URI scheme|ed2k URI scheme to

provide a unique identifier for a file in the popular eDonkey2000 / eMule

P2P networks. MD4 was also used by the rsync protocol (prior to version

3.0.0.)

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 9: ED2k .

Ed2k URI scheme

1 In computing, 'eD2k links' (ed2k://) are hyperlinks used to denote files stored on computers connected to

the eDonkey network|eDonkey filesharing P2P network.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 10: ED2k .

Ed2k URI scheme - General

1 They serve a similar role, but are not limited to the eD2k hash and can

contain other hashes such as SHA-1 or MD5 for example, which makes it

possible to use these links to point to files in several networks (as well as

in BitTorrent) at once.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 11: ED2k .

Ed2k URI scheme - General

1 eD2k links include file hashes, as these hashes can be used as a unique identifier for files within the network, so even if the linked-to file has a different name on two computers within the network, the file can be found on both of them, and file chunks can be obtained from both sources. This is done by using a hash function on the file

to calculate its checksum, depending only from the file content, not from its name.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 12: ED2k .

Ed2k URI scheme - General

1 Like other URI protocols, web browsers can be configured to

automatically handle ed2k URIs. After installing an Comparison of eDonkey

software|eD2k client, the eD2k protocol is optionally registered so that clicking on it in the browser

automatically starts the download or asks whether the user wants to start

downloading.https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 13: ED2k .

Ed2k URI scheme - File link format

1 File links are preceded with the file token, which indicates that this is a

file link, as opposed to a server, serverlist, nodelist or friend link. The

typical eD2k file link also includes the filename and the file size. An

example (a link to the 15MB wikia:lotr:The_Two_Towers:_The_Purist_Edit |Purist Edit trailer) is provided

below:https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 14: ED2k .

Ed2k URI scheme - File link format

1 ed2k://|file|The_Two_Towers-The_Purist_Edit-Trailer.avi|14997504|965c013e991ee246d63d45ea71954c

4d|/

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 15: ED2k .

Ed2k URI scheme - File link format

1 eD2k links can also include a reference to the IP address and port of specific clients that are known to share the linked-to file. This is done by adding a list of sources after the main part of the link, like shown in

the following example:

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 16: ED2k .

Ed2k URI scheme - eD2k hash algorithm

1 The eD2k hash function is a hash list|root hash of a list of MD4 hash

function|hashes. It gives a different result than a simple usage of the

MD4 algorithm.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 17: ED2k .

Ed2k URI scheme - eD2k hash algorithm

1 This method of hashing allows the recipient to verify that a hash list

corresponds to an original eD2k file hash, without the need to actually

have the file present on disk.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 18: ED2k .

Ed2k URI scheme - eD2k hash algorithm

1 This practice is discouraged however and the first interpretation is used as

a standard nowadays to prevent some files from having different

hashes depending on the algorithm implementation used to calculate

their hash.http://mldonkey.sourceforge.net

/Ed2k-hash

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 19: ED2k .

Magnet URI scheme - History

1 The standard for Magnet URIs was developed by Bitzi in 2002, partly as

a vendor- and project-neutral generalization of the ed2k: and freenet: URI schemes used by

eDonkey2000 and Freenet, respectively, and attempts to follow

official Internet Engineering Task Force|IETF Uniform Resource

Identifier|URI standards as closely as possible.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 20: ED2k .

Magnet URI scheme - URN, containing hash (xt)

1 :xt=urn:ed2k:[ EDonkey network#Hash identification|ED2K hash sum|Hash

(Hexadecimal|Hex) ]

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 21: ED2k .

Magnet URI scheme - Link to a file of zero bytes length

1 [magnet:?xt=urn:ed2k:31D6CFE0D16AE931B73C59D7E0C089C0xl=0dn=zero_len.filxt=urn:bitprint:3I42H3S6NNFQ2MSVX7XZKYAYSCX5QBYJ.LWPNACQDBZRYXW3VHJVCJ64QBZNGHOHHHZWCLNQxt=urn:md5:D41D8CD98F00B204E9800998ECF8427

E magnet:?xt=urn:ed2k:31D6CFE0D16AE931B73C

59D7E0C089C0https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 22: ED2k .

Magnet URI scheme - aMule 2.2

1 Unable to intercept Magnet links from within a web browser, this client supports Magnets by offering a text box at the bottom of the client into

which they can be copied and pasted. The client is able only to

recognize eD2k hash, file size and name in a specific order and

therefore, many valid links may not be suitable for downloading.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 23: ED2k .

URL shortening - Techniques

1 Not all protocols are capable of being shortened, as of 2011, although protocols such as http, https, ftp,

ftps, mailto, mms, rtmp, rtmpt, ed2k, pop, imap, nntp, news, ldap, gopher, dict and dns are being addressed by

such services as URL Shortener

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 24: ED2k .

IsoHunt - Lawsuit

1 In February 2006 it was announced that the MPAA had launched legal

proceedings against isoHunt, TorrentBox, TorrentSpy, ed2k-it, and several other BitTorrent indexing or

tracker sites, alleging that these sites facilitate copyright infringement

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 25: ED2k .

Magnet URI scheme - Link to a file of zero bytes length

1 [magnet:?xt=urn:ed2k:31D6CFE0D16AE931B73C59D7E0C089C0xl=0dn=zero_len.filxt=urn:bitprint:3I42H3S6NNFQ2MSVX7XZKYAYSCX5QBYJ.LWPNACQDBZRYXW3VHJVCJ64QBZNGHOHHHZWCLNQxt=urn:md5:D41D8CD98F00B204E9800998ECF8427

E magnet:?xt=urn:ed2k:31D6CFE0D16AE931B73C

59D7E0C089C0https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 26: ED2k .

Shareaza

1 'Shareaza' is a peer-to-peer file sharing client running under Microsoft Windows which supports the gnutella, Gnutella2

(G2), eDonkey Network|eDonkey, BitTorrent (protocol)|BitTorrent, File Transfer Protocol|FTP, HTTP and HTTP Secure|HTTPS network protocols and handles Magnet URI scheme|magnet links, ed2k URI scheme|ed2k links, and the now deprecated gnutella and Piolet

links. It is available in 30 languages.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 27: ED2k .

Shareaza - Version history

1 There were also updates to the gnutella and eDonkey network|eD2k implementation, such as extended

support for GGEP, large files and chat

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 28: ED2k .

Shareaza - Shareaza and Linux

1 It is based on the Qt (framework)|Qt framework and supports connection to G2 (Shareaza), eD2k (eMule), Ares Galaxy|Ares, and Bittorrent (uTorrent) networks, and download from HTTP,

FTP, and BitTorrent sources

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 29: ED2k .

AICH - Basic concepts

1 Each file that is shared using eMule is Hash function|hashed as a hash list comprising separate 9500 kibibyte

chunks using the MD4 algorithm. The ed2k URI scheme#eD2k hash

algorithm|top-level MD4 hash, file size, filename, and several secondary search attributes such as bit rate and codec are stored on eD2k Lugdunum

server|servers and the serverless Kad network.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 30: ED2k .

Metalink

1 Metalink supports listing multiple partial and full file Cryptographic hash function|

hashes along with Pretty Good Privacy|PGP signatures. Most clients only support

verifying MD5, SHA-1, SHA-256, however. Besides FTP and HTTP Web mirror|mirror

locations and rsync, it also supports listing the P2P methods BitTorrent (protocol)|

BitTorrent, Ed2k: URI scheme|ed2k, Magnet URI scheme|magnet link or any other that

uses a Uniform Resource Identifier|URI.https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 31: ED2k .

BitComet - Features

1 An optional plugin is available to connect to the eDonkey network|

eD2K network. The plugin is a modified version of the GPL eMule

program. When installed, it connects automatically to a server.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 32: ED2k .

BitComet - Padding files

1 BitComet developers added this feature to allow support of a feature called Long Term Seeding in which the BitComet client can

download files from other BitComet clients who have an identical file but not from the same torrent. It also allows the downloading of

individual files from other non torrent sources like ED2K links The addition of the padding file ensures that a complete version of the file can

be obtained rather than being unable to complete the relevant file or last piece

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 33: ED2k .

EDonkey network

1 The 'eDonkey Network' (also known as the 'eDonkey2000 network' or 'eD2k') is a

decentralized, mostly server-based, peer-to-peer file sharing network best suited to share

big files among users, and to provide long term availability of files. Like most sharing

networks, it is decentralized, as there is not any central hub for the network; also, files are not stored on a central server but are

exchanged directly between users based on the peer-to-peer principle.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 34: ED2k .

EDonkey network

1 Currently, the eD2k network is not supported by any organization (in the

past it was supported by the MetaMachine Corporation, its

creator, which now is out of business) and development and maintenance

is being fully provided by its community and client developers.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 35: ED2k .

EDonkey network

1 The eserver family is currently in active development and support, and almost all eD2k servers now (2008)

run this server software.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 36: ED2k .

EDonkey network

1 There are many programs that act as the client part of the network. Most notably,

eDonkey2000, the original client by MetaMachine, closed-source but freeware, and

no longer maintained but very popular in its day; and eMule, a free software|free program for Microsoft Windows|Windows written in Visual C++ and software license|licensed under the GNU

General Public License|GNU GPL. eMule is in constant development and currently represents

about 90% of all clients in the eD2k network.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 37: ED2k .

EDonkey network

1 The other eD2k client programs, given time, generally follow suit

adopting these protocol extensions.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 38: ED2k .

EDonkey network - Search

1 To ease file searching, some websites list the checksums of sought-after files in the form of an ed2k: URI

scheme|eD2k link. Some of these websites also have lists of active

servers for users to update.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 39: ED2k .

EDonkey network - Successor protocols

1 In addition, eMule includes a pure P2P client source-exchange

capability, allowing a client with a ‘High ID’ (i.e., with incoming eD2k

connections not blocked by a firewall) to continue downloading (and uploading) files with a high

number of sources for days, even after complete disconnection from

the original Kad or eD2k servers that handled the original requests

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 40: ED2k .

EDonkey network - Server software

1 (MetaMachine abandoned development of eD2k server software and revealed the

source code to Lugdunum in late 2002, but was never used).[http://forum.emule-

project.net/index.php?showtopic=100724st=375p=810507#entr

y810507 Razorback Servers Seized By Belgian Police - Official eMule-Board]

Lugdunum has extended the eD2k protocol while maintaining backward compatibility

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 41: ED2k .

EDonkey network - Client software

1 * Shareaza: a free software|free open source multi-network file-sharing client that supports the Gnutella2

and Gnutella P2P networks, as well the BitTorrent (protocol)|BitTorrent protocol, additionally to eD2k. It

allows network-spanning search of content and has web browser

integration to operate as a download manager. Supports user profiles, remote file browsing, chat and

advanced search filtering. Under active development and continuously

growing user community.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 42: ED2k .

EDonkey network - Client software

1 * [https://github.com/qmule/qmule qMule]: a multi-protocol, cross-platform client for eDonkey and BitTorrent (protocol)|BitTorrent

networks. Based on [https://github.com/qmule/libed2k

libed2k], libtorrent-rasterbar and Qt.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 43: ED2k .

EDonkey network - Tools and libraries

1 * [https://github.com/qmule/libed2k libed2k]: Cross platform C++

eDonkey protocol library. Inspired by libtorrent_rasterbar.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 44: ED2k .

Kad network - Usage

1 * Find sources for EDonkey network|eD2k hashes.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 45: ED2k .

Kad network - Major Clients

1 Only a few major clients currently support the Kad network

implementation. However, they comprise over 80% of the user base and are probably closer to 95% of

ed2k installations.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 46: ED2k .

ShareReactor

1 ShareReactor delivers links that can be used together with a P2P client

program that understands Ed2k URI scheme|eD2k links or torrent files.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 47: ED2k .

ShareReactor - Origin

1 ShareReactor remained the top eD2k indexing website up until March 2004 when it suddenly was closed due to suspicion of breach of copyright and trademark laws within the country of

Switzerland where ShareReactor’s owner lived and where ShareReactor

was being hosted.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 48: ED2k .

ShareReactor - Reopening and Closure

1 However the difference was all the sections of the forum that featured Ed2k URI scheme|eD2k links were

closed due to the request they received a few months before

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 49: ED2k .

ShareReactor - The Second Reopening

1 The focus is to offer the newest content as torrent files but also keep the library of eD2k links up to date

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 50: ED2k .

Languages of the Marshall Islands - Orthography

1 *: Christmas, not [http://www.trussel2.com/MOD/MED2K.htm#Kūrijṃōj MED: ]

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 51: ED2k .

Piratebay - Projects

1 In 2008, Baywords was launched as a free blogging service that lets users of the site blog about anything as long as it does not break any

Swedish laws. In December, The Pirate Bay resurrected ShareReactor as a combined

EDonkey network|eD2k and BitTorrent site. The same month, the Vio mobile video converter

was released, designed to convert video files for playback on mobile devices such as iPhone,

BlackBerry, Android (operating system)|Android, many Nokia and Windows Mobile devices.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 52: ED2k .

Dane Bowers - Early life and education

1 need2know.co.uk

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 53: ED2k .

Airsickness

1 Airsickness occurs when the central nervous system receives conflicting messages from the body (including the inner ear, human eye|eyes and muscles) affecting Balance (ability)|

balance and Equilibrioception|equilibrium.[http://www.ineed2know.

org/motion-?sickness.htmreferrer=adwordskw=airsicknessgclid=CPuw1tTf5oMCFSgcIgo

dgznuIQ Motion Sickness Facts]https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html