Search FAQ
Frequently Asked Questions
Here you can find the Frequently Asked Questions which will be updated on a regular basis as and when appropriate. Please read through it as it contains important information you need to be aware of along with essential reading such as User Guides and many other cool stuff you may not even be aware of.
    1. Increase BitTorrent download speeds
    2. BitTorrent Ports Tip to Speed Up Clients
    3. What Is 'Port Forwarding'?

      Port forwarding, also referred to as tunneling, is essentially the process of intercepting traffic bound for a certain IP/port combination and redirecting to a different IP and/or port. This redirection may be accomplished by an application running on the destination host, or it may be performed by intermediate hardware, like a router, proxy server or firewall.

      Normally, a routing device will look at the header of a packet and simply send it to the appropriate interface to reach the destination it finds in the header. In port forwarding, however, the intercepting application or device reads the packet header, notes the destination, but rewrites the header information and sends it to a another host destination, different from the one requested. That host destination may be a different IP using the same port, a different port on the same IP, or completely different combination of the two.

      In the example below, sends a request to on port 80. An intermediate host,, intercepts the packets sent by It rewrites the packet headers and sends them on to on port 8080: --> -->
        Makes a request to   Actually sends to   

      The host responds to the request, and sends the response to The host rewrites the packet, indicating that the response is from, and sends them to --> -->
        Sends its respond to   Forwards the response to   

      As far as is concerned, it has sent a request to on port 80 and received a response back from on port 80. This is not what has happened; the traffic has never actually touched However, because of the way the packets have been rewritten, sees that it has gotten a response from

      The important thing to remember in port forwarding is that the destination is always from the perspective of the requestor. Even though is the destination for the traffic from in the diagram, the destination for all traffic from the requestor's perspective is

      Port forwarding is extensively used to keep unwanted traffic off networks. It allows administrators to use one IP address for all external communications on the Internet while dedicating multiple servers with different IPs and ports to the task internally. This is very useful for home network users, who may wish to run an FTP server, a Web server and a gaming server on one network. Users with this type of need can set up a single public IP address on the router to translate requests to the proper server on the internal network. This arrangement has the advantage of hiding exactly what services are running on the network, using only IP address to accomplish multiple tasks, and dropping all traffic at the firewall that is unrelated to the services provided.

      Web proxies also provide a port forwarding service. Like the above home network example, Web proxy servers use port forwarding to prevent direct contact between clients and the Internet. A Web proxy will inspect and rewrite packets moving to and from Internet destinations, allowing network administrators to control access to restricted sites, log accesses and protect internal clients from external threats like port scanning.

      Port forwarding can additionally be used send otherwise insecure TCP traffic through a secure SSH connection (also called a tunnel). This connection can be used to encrypt any type of TCP traffic, including HTTP, POP3, SMTP and FTP. A client on the requestor connects to a service running on the destination host, and this creates an encrypted tunnel through which traffic may pass securely.

      Port forwarding is an excellent way to preserve public IP addresses, protect servers and clients from unwanted access, "hide" the services and servers available on a network, and limit access to and from a network. It has the benefit of being transparent to the end user while adding an extra layer of security to networks.

    4. 10 Ways To Speed Up Torrent Downloads
    5. Some useful resources
    6. Best BitTorrent Clients 2011
    7. BitTorrent Tips