Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Anyone good at it? I use Limewire, but most of the music I like is underground and Limewire doesn't have the songs I want.![]()
Your best best is using some google search tricks to identify direct downloads to music.
I like how you make up numbers. Proxies provide marginal protection. Neither does the downloading of the actual .torrent get you in trouble since it contains no copyrighted content.
Your best best is either newsgroups, a private tracker, or using some google search tricks to identify direct downloads to music.
I've heard of this.
How does it work?
This can't be right, because .torrents are being uploading by users and the company allowing the torrent to be there have no clue if its a copyrighted item or not. Maybe I read wrong what you meant, but even lime wire has had there shares of court dates.
Matt
-inurlhtm|html|php) intitle:"index of" +"last modified" +"parent directory" +description +size +(wma|mp3) "<BANDNAME/SONG>"
Just replace the part in <> with what you're looking for.
You can download .torrents all day if you want, they're not illegal.
Now if you actually *open* those torrents using a BitTorrent program, then it becomes illegal. The torrent itself has no copyrighted data, it's basically a pointer to where you could obtain a specific set of files.
Paying a tracker to not keep logs is pointless. It's the peers that get you in trouble in the case of the P2P model.
How many years have you been surfing the net mobley370.
Here is what COULD happen in the 1/1,000,000 chance.
1) Your Internet Provider calls you, tells you to stop downloading 'illegal torrents' and gives you a warning.
2) If your using a public computer such as school or library to download illegal torrents then you can get in shit.
Thats about it.
I've downloaded..at least 30gb of music via torrents and never had to worry about proxies and shit.
Also, Proxies can be filtered so damn easy now adays, I just wrote a security protocol with a few people for a network to identify proxies and trust me its easy.