Browse Definitions :
File Extension

TORRENT File Format

BitTorrent file

TORRENT file format icon

TORRENT is a file extension for a BitTorrent file format used by BitTorrent clients. Torrent files contain text and point out the trackers for a download to begin downloading from distributors (known as seeders) and requesting clients (known as leachers).

BitTorrent is a content distribution protocol that enables efficient software distribution and peer-to-peer sharing of very large files, such as entire movies and TV shows, by enabling users to serve as network redistribution points. BitTorrent allows sharing of downloaded portions of a torrent that other users have not yet fully downloaded.

BitTorrent's protocol has been described as a "swarming, scatter and gather" file transfer protocol. Rather than having to send a download to each customer requesting it, the seeder of content sends it to one requesting client (known as a leach) who, in turn, shares with other leaches who, if following etiquette, remain connected to seed the completed torrent to other leaches.

The BitTorrent distribution scheme spreads out the use of bandwidth across many points on the Internet, reducing the need for large servers. 

Bram Cohen wrote BitTorrent in Python and made it available in 2001. BitTorrent is distributed freely under an open source license.

MIME type: application/x-bittorrent

 

Learn more about TORRENT files:

Visit the BitTorrent webpage.

See questions and answers about peer-to-peer at IT Knowledge Exchange.

You can download BitTorrent here.

This was last updated in August 2010

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • spam trap

    A spam trap is an email address that is used to identify and monitor spam email.

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts ...

  • cracker

    A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close