Login or sign up Lost password?
Login or sign up
Anytime you’re making connections to anything outside of your network, security should be a concern, and this is doubly true for users of Bit Torrent, who are getting data from all sorts of unknown sources. This is the third part in our series explaining Bit Torrent—be sure and read the first part of the series, where we explained what Bit Torrent is and how it works, and then the second part, where we explained how to create your own torrents.