JDownloader Community - Appwork GmbH
 

Reply
 
Thread Tools Display Modes
  #1  
Old 22.10.2009, 11:07
remi
Guest
 
Posts: n/a
Cool Having speed issues ? Read this!

First, some facts :-

jD and Java won't have any effect on your download speed. Have a look at the code. ;)

Speed in jD can be affected by a wrong configuration of your firewall or virus scanner. Most firewalls cause problems handling java programs, because some java tools are using the same .exe and there is no way for the firewall to tell the difference between jD and some other java tools. Did you allow java(.exe), javaw(.exe) and JDownloader in your firewall? Disable http/web scanning in your anti-virus software. Known software that cause such problems are Antivir, Avast!, AVG, Eset, Nod32, Kaspersky, and Zonealarm among others.

Never trust browsers when doing speed tests. jD calculates the average download speed better than Firefox. For instance, RS sends data, pauses, sends data, pauses and so on. This causes many tools to report wrong speeds. Firefox is not able to calculate average speed for RS free customers very accurately because of the way RS caps speed. You can read about it in our forum, in the gulli forum...everywhere it's written Firefox lies about the real speed. (source: Jiaz)

Speed depends on factors like host server (mirror) speed, overall network traffic, ISP, behaviour of other Internet tools on your PC.

A speed test with one file depends on jD's configuration. Set Max.Con.=1, Max.Dls=1, Speed=0

EDIT: Some people experience burst bandwidth (I'm not sure this is the best term) when a site or ISP are sending data at an unusually high rate compared to their normal rates. This burst will often stop after a few seconds or megabytes.

RS caps the download speed for free customers to max 125kb/s, but it varies with server load. Premium accounts should deliver higher speeds. That's why you pay for them. ;)


Second, some measuring tools :-

There are differences in the quality of speed metering in different software. You should use a good stop watch or dedicated traffic metering software in order to measure the real speeds.

A simple approach is the Task Manager and its Netgraph while downloading the same file from the same server in Firefox and jD. You could take a screen shot which is a simple snapshot in time.

Simple Internet Meter ("**External links are only visible to Support Staff**) will show accurate values for download speed and it has a 14 day trial period.
Cfos ("**External links are only visible to Support Staff**) might seem a little complicated for beginners so it's best to try the simple internet meter first.
(source: Freeloader)


Third, real speed tests :-

Real jD speed tests can only be done with a dedicated root server. Loading files from RS or any other file host will always show different results with every test run, because of a different load or server selection on the host side. By using a dedicated server and file you know that the line is free and you are the only one downloading the same file. (source: Jiaz)


Fourth, statistics :-

All the discussions about speeds and throughput are useless without a correct, statistical measuring system that computes the true downloading performance over time.

Good statistics could level differences out in a period of a day or a week. A neutral and freeware tool like MZL & Novatech TrafficStatistic for Windoze ("**External links are only visible to Support Staff**) might do the job.

How to report a speed problem

Last edited by Think3r; 02.08.2011 at 00:10.
Reply With Quote
  #2  
Old 30.12.2009, 12:38
drbits's Avatar
drbits drbits is offline
JD English Support (inactive)
 
Join Date: Sep 2009
Location: Physically in Los Angeles, CA, USA
Posts: 4,437
Default Advanced System Cleaning and security software

If you are having trouble with your computer it is as likely to be your security software (or uninstalled software) as it is a virus. This is especially true when things seem fine, except in JDownloader.

Click here for a simpler, but sometimes less effective approach.

This is not for the faint hearted or inexperienced computer user. If you are inexperienced, have somebody reinstall your OS and software, but leave out any security software that did not come with your OS. See below for an Antivirus recommendation.
---------------------------------------------------------------------
Note: This is for Windows. Linux systems work completely differently and programs do not tend to leave pieces around as much. Except in /var, /tmp, /usr/var, /usr/tmp
---------------------------------------------------------------------
Before making any dangerous changes to your computer, set a Restore Point.
Either you can use the "Help and Support" menu (or equivalent for your system) or you can execute the following from the command line:
%SystemRoot%\system32\restore\rstrui.exe
(this probably won't work on 64bit systems and might not work on all versions of Windows).

Note: All system cleaning is dangerous. Set a restore point first. I have been using and programming Windows for over 15 years and am considered something of an expert in programming Windows -- I still set restore points. Backing up your system partition is even better.

If some of the cleaning makes your computer unusable, boot into Safe Mode and use your restore point to back out the change (some versions have a separate boot for restore points).
---------------------------------------------------------------------
The first thing to clean out is any security software that did not come with your operating system. Set a restore point. uninstall the software, reboot, and set another restore point. You can reinstall security software after reading my advice in the next message.

There is a program I suggest you download and install, called ERUNT. It will create a backup of your registry (most of the cleanup changes are just to the registry). It is a good idea to backup your registry now.

Those of us who download a lot tend to install too much. After setting that second restore point is a good time to uninstall anything on your computer you do not need anymore (then reboot and set a restore point).

A lot of software, especially security software leaves device drivers behind. To find these, get properties on "My Computer" and start the "Device Manager". This shows you the physical devices. Now, in the "View" menu, check "Show Hidden Devices". This will show you what is really on your computer. Look for the section called "Non-Plug and Play Devices".

This contains the drivers installed to support software (along with others). There will be a lot of them. Check each to make sure it does not look like part of a program you have uninstalled. You can check the properties to see what company is responsible for it (often left blank). If you ever installed software from Atwil (Avast!), Norton (Symantec), or McAfee, you are likely to see their wreckage.

Disable any that look like they are part of software you have uninstalled. If your ISP does not directly support IPv6 (the newer Internet Protocol), you should also disable TCPIP6.sys (this has a lot of security holes).

If you do not have a server on your local network, you can disable netbt.sys (and disable netbios over TCP in your network devices and your services). This will remove many of the ways that hackers and viruses attack your computer.

If there are no other computers on your local network, go to Network devices and disable "File and printer sharing". Removing NetBT and File and Printer Sharing will block most of Microsoft's security holes.

Then, reboot, check that your browser still works, and set a restore point. You may have to use that earlier restore point if you disabled the wrong thing.

You might notice a significant increase in system speed (up to 50%).

The network part of the operating system puts some of the drivers with the device drivers and some of them are in the "Winsock stack". Use Google to find LSPfix.exe and download the program. This will show you the LSPs (plugins for Windows Sockets). These are used by firewall and and antivirus software to monitor your TCP/IP network traffic. You need the LSPs for TCP/IP, but since you have uninstalled your firewall and antivirus, you can delete the LSPs for them. You should end up with between 4 and 6 LSPs.

Again, reboot and either back-up the registry or set a restore point. Check that your browser still works.

If you have used software from Symantec, go the the Symantec support web site and download the removal tool. This is supposed to remove the files and registry entries for all Symantec products going back several years. Check the support web sites for other antivirus software for removal tools and use them.

After using such tools, reboot, check if your browser still works, and set a restore point. Also backup your registry.

Now that you have cleaned your devices, you need to clean your registry. I use two different tools (both reasonably safe). First, I run the registry cleaner in Comodo System Cleaner (free from comodo.com), then I run the registry cleaner that comes with the free version of Glary Utilities. If you have CCleaner, run that registry cleaner as well. Then reboot, check that your browser still works and make another registry backup.

---------------------------------------------------------------------

You have now succeeded in removing most of the trash left behind by uninstalled programs.

Now, it is time to make sure the operating system files are the correct version. To do this we use the SFC (System File Checker) program. -- Please let me know if it is called something else in your version of Windows.

To run SFC, open a command line (or window) and enter
SFC /SCANONCE
then reboot. You will probably be asked for your system install disk (if your system came with one). This is to load any missing files onto your hard drive. SFC uses a catalog of file names and security hashes to check all of the operating system files and make sure they are not changed. This is very effective at restoring any damage done by various programs and undoing damage from most viruses.

When the system reboots. Set a restore point and backup your registry.

You now have as close to a clean system as you can without reinstalling the OS from scratch.

Last edited by drbits; 30.05.2010 at 04:30. Reason: Comodo changed their product
Reply With Quote
  #3  
Old 30.12.2009, 12:52
drbits's Avatar
drbits drbits is offline
JD English Support (inactive)
 
Join Date: Sep 2009
Location: Physically in Los Angeles, CA, USA
Posts: 4,437
Default Reinstall Java and JDownloader

First, we will reinstall both Java and JDownloader.

To create a clean copy of Java, uninstall Java, then rename the C:\java\java6 directory (or whatever drive you have java installed on). and reboot. Then, install the newest JRE (not JDK) from java.sun.com. Reboot again.

To install a clean copy of JDownloader without losing your settings, rename the JDownloader\config\version.cfg file. Install the newest stable version of JDownloader from jdownloader\download\index.

Then try running JDownloader.

If it works. Make sure to set another Restore Point.

Last edited by drbits; 30.05.2010 at 04:45.
Reply With Quote
  #4  
Old 30.12.2009, 13:23
drbits's Avatar
drbits drbits is offline
JD English Support (inactive)
 
Join Date: Sep 2009
Location: Physically in Los Angeles, CA, USA
Posts: 4,437
Default Choosing and installing security software

English Overview:

The security software (Antivirus, Firewall, and so on) must allow JDownloader, java, and javaw to connect to any port on any computer and to listen on any local port. This setting may have to be updated after you install a new version of Java or JDownloader.

The security software must never filter or restrict the contents of network packets, it has no reason to ever read that data.

Some adjustments to ESET or Kaspersky are described here. However, no "Internet Security" package is recommended.

I recommend Microsoft Security Essentials (as your antivirus) or AVG free without Link Scanner installed), the Free (for personal use) PCTools.com Firewall and PCTools.com Threatfire. They are effective and work well with JDownloader and they work well together. They are all free for personal use.

For your web browser, I recommend Firefox with NoScript and WOT. Opera is a good alternative.


Deutsch Überblick

Das Antiviren-Programm und die Firewall müssen JDownloader, java, und javaw erlauben, sich mit allen Ports zu verbinden und an allen lokalen Ports zu hören. Diese Einstellung muss aktualisiert, nachdem Sie eine neue Version von Java oder JD installieren.

Das Antiviren-Programm und die Firewall müssen jedoch nicht den Inhalt der Netzwerkpakete überwachen.

Einige Anpassungen ESET oder Kaspersky sind hier beschrieben..

Empfohlen Sicherheit Programme:
Microsoft Security Essentials (für Antiviren) oder AVG Frei mit LinkScanner nicht installieren.
pctools.com Kostenlos Firewall.
pctools.com ThreatFire (Kostenlos).
Für FireFox verbinden NoScript und WOT.
Alle sind einfach und sie ausführen gut mit JDownloader.


Información General Español:

El software de seguridad (Antivirus, Firewall (cortafuegos), y así sucesivamente) en su equipo debe permitir el JDownloader para conectarse a cualquier puerto en cualquier ordenador y escuchar en cualquier puerto local. Este ajuste tendrá que ser actualizado después de instalar una nueva versión de Java o JDownloader.

El software de seguridad nunca debe filtrar o restringir el contenido de los paquetes de red, no tiene razón para leer cada vez que los datos.

Hay algunos ajustes a ESET o Kaspersky se describen aquí..

Yo recomiendo:
Microsoft Security Essentials o AVG Sin Costs sin LinkGrabber.
PCTools Sin Costo (para uso personal) Firewall (cortafuegos).
PCTools Sin Costo (para uso personal) Threatfire.

Son eficaces y trabajan bien juntos. Estos programas no interfieran con JDownloader.

Para su navegador web, yo recomiendo Firefox con NoScript y WOT complementos.

--=oOo=-- --~=oXo=~-- --=oOo=-- --~=oXo=~-- --=oOo=-- --~=oXo=~-- --=oOo=-- --~=oXo=~-- --=oOo=--

1) Even in Windows, you don't need an antivirus or firewall to watch everything on your computer. You need an antivirus to scan files and scripts when they are first opened (which you can do manually). You need a firewall to keep hackers out. Except for scanning for scripts in e-mail, browsers, and office documents, most of the rest of what they hang on your security software is sales pitch.

1a) Whatever security software you use must tell you when it is about to block a program. This is not just for JDownloader, it is needed on every system. If your security software cannot be changed to do this, uninstall it immediately.

If you are using an antivirus or firewall that requires you to create exceptions for jdownloader, java, or javaw, then updating JDownloader or java should cause the security software to start blocking again. Whenever you start having problems, make sure the security software exceptions are still valid.

When a program has changed, well designed security software will ask whether this is an update of the same software and the old exception will be applied to the new version as well.

2) If your router contains a firewall, that will deter almost all known attacks that a firewall can block. What it does not do is protect the rest of the internet if your computer becomes infected by a virus. Since you will never allow your computer to become infected, you don't need a fancy firewall.

2a) If you are paranoid (as I am), you can install a software firewall. However, most will noticeably slow down your computer. After trying several software firewalls, the only one I have found that allowed me to run both JDownloader and uTorrent at full blast was PCtools Free Firewall. This firewall needs to be trained (or you can leave it in training mode for a while), but it is simple to set up and checks every time a program tries to open a port or call another program (see 3) IDS below).

2b) The best Firewall protection is a separate box (like Barracuda Networks or similar products from companies like Cisco) that connects between your router and your computer. The box updates frequently to protect against the latest known threats and also filters for viruses and other malware. This costs about twice what a software security package costs, but it doesn't slow down your computer.

3) Intrusion Detection Systems
One of the most effective ways to avoid virus infestation is to protect your system against virus-like activity. This is the job of an IDS. The only complete IDS I know of for a personal computer is ThreatFire (threatfire.com), made by PCtools (also included in their firewall and integrated packages). This product is also free for personal use. There are more sophisticated IDS systems for servers. The advantage of an IDS is that it has a very low profile (small memory footprint and almost no CPU time when everything is OK). These programs require training (which programs are allowed to do what), but they are worthwhile.

4) Antivirus
I have said some negative things about antivirus programs, but I wouldn't work without one. The problem is that most of them are bundles, not just virus scanners. A virus scanner should check each file as you open it for execution or when ask it to scan a file, and nothing more. AVG Free antivirus (without LinkScanner installed), and Microsoft Security Essentials are close to this.

Uninstalling an antivirus program usually leaves hooks in your operating system. When uninstalling an antivirus program, first obtain the "Cleanup" program from the manufacturer's website. Then set a restore point, uninstall the antivirus program, restart your computer, run the cleanup program, and restart your computer.

If you choose AVG, choose the custom installation and do not install the Web link scanning (this goes for any antivirus). These work poorly and can interfere with programs like JDownloader. The program is simple, contains a module that will scan files when you open them for read or execute, and contains a scanner. It also contains an e-mail scanner and automatic updates (the free version updates once per day).

Another very good antivirus is called Viper. However, this program is not free for personal use. It is a combination of a traditional antivirus and an IDS.

Cloud antivirus systems are new, but their advantages are minimal. When combined with an IDS, they should be essentially the same as a regular antivirus.

Avoid (or uninstall) any antivirus that includes features like "Web shield", "Network shield', "Link shield", "Link checker", "network checker", and so on (Antivir, Avast!, AVG, Kaspersky, Norton, Symantec, McAfee, and so on). You can try installing them without these features if the program permits it.Even worse are the "Internet Security" suites - always uninstall these and run the cleanup program.

Ideally, a system wide antivirus would scan files only when opened for execution (executable files and scripts only). An excellent browser, RSS reader, or e-mail reader can be set to scan each script before execution (possibly with an antivirus addon). Do not allow active-X to execute unless it is both signed and virus scanned. If you use Microsoft IE, install WOT and be very careful about what scripts (activeX, .NET, Javascript, and so on) you allow to run. If you use FireFox, WOT and NoScript are recommended to assist you in selecting which scripts to run (and Dr.Web can perform an antivirus scan). Chrome and Opera are like Firefox.

A useful antivirus programs can attach to your e-mail program and scan all scripts and attachments. It is even better if one can preview all messages in "Plain text" mode (I always do this is Outlook). E-Mail programs should always use an encrypted connection to the mail server. Thunderbird defaults to a safe viewing mode.

The most important problem with security programs that read the contents of network packets instead of just the header is that they give the user a false sense of security. The worst of malware is encrypted until it is ready for use, so the antivirus cannot find it in the network (only the stupid ones get found). They break JDownloader by holding back a large number of packets (leading to dropped connections) and often drop or filter the contents of packets (leading to improper data and CRC errors).

4a) JDownloader, P2P and IM programs do not execute what is transferred. They write them to disk, where the antivirus can scan them before they can be executed (exclude *.part files from scanning, they are incomplete and scanning them is a waste. The same is true for the incomplete P2P files, such as *.!UT).

Browsers sometimes download and immediately execute scripts (.NET, activeX, and JavaScript). Fortunately, the only Browser that does that is Microsoft Explorer. In Opera, Firefox (and its Chrome version), only JavaScript is executed before it is written to disk, and it is "Sandboxed" (restricted in what it can access).

For people who still use P2P programs, blocklists are important (see "blocklistpro.com")

5) Registry and Disk cleaning

We have already discussed registry cleaners.

One of my my favorite registry scanners is Regseeker, but it is overly aggressive and I always have to repair or reinstall MS Office after I use it (it needs extra filters). However, it finds many times more problems than Comodo and Glary products. I save this one for occasional use. Again, I always backup the registry before using a cleaner.

Disk cleaners are best at finding temporary files that are left around and deleting them. The Comodo and Glary packages both come with powerful disk cleaners. Ccleaner is an easy to use program, but it has fewer tools to find disk trash. For example, Comodo System Cleaner includes a scan for empty directories. This can save a significant amount of disk space.

The part of a disk cleaner that seems like it would find the most waste is the "Duplicate file search". Do not use this unless you are sure of what you are doing. They usually aren't worth the effort of figuring out which copies of files are necessary.

Digital Volcano Duplicate Cleaner is an easy to use duplicate cleaner. Using the Hard Link option makes this a safe and easy tool. It takes advantage of some little-known features in NTFS and if two files are exact duplicates, it changes the directories so that they both point to the same file on disk (and deletes the unused file). This means that you can still get to the file from both directories, but you only store it once. Unix users are familiar with links, this is new to most Windows users.

Duplicate Finder Hard Link (DFHL) is the original tool, but is harder to use and is command line driven with many options. You can download it from "jensscheffler.de/dfhl". To use it open a command window, and cd to the directory containing DFHL.exe. Enter a command like
Code:
DFHL /h /l /m /q /r /s /w {list of top directories}
This combination of parameters will quietly /q scan the specified directories (including small files /m, hidden files /h, and system files /s) and all of the subdirectories /r. Files that match byte for byte will be hard linked (so that only one copy is retained /l). A summary will be printed at the end (/w). If you leave out /l and /q it will just create a report. The major limitation is that it should only be run on one partition at a time (NTFS cannot hard link across partitions).

6) Complete Virus Scanning
A normal virus scanner cannot find all viruses. One reason is that there are new viruses every day and it can take days to find a way to detect new ones without also finding normal files. This is why an IDS (intrusion detection system) is so useful. Since most people don't know about IDS, about 1/3 of computers have some kind of malware infection. A second reason is that some viruses (called rootkits) have found ways to insert themselves into the operating system and hide from the antivirus programs (or even infect the antivirus programs). Also, most antivirus programs work by searching for strings in programs (called signatures), but modern viruses encrypt themselves, so that they cannot be found by a signature until they begin executing.

The first step is to find the viruses that are hiding in the operating system. You find them with Root Kit Scanners, and there is a free (for personal use) root kit search in Threatfire and one available from PandaSecurity. These are not the only two, but I have found both of these to be satisfactory and they work in different ways.

A full antivirus search is done when the operating system is not running. A boot disk running a different operating system is used to boot the computer and scan the system. One such virus scanner is PandaSafeCD (search pandasecurity.com). This program is available from download.com. It comes as a zip file containing an ISO file you burn onto a CD. The CD then contains a reasonably recent antivirus scanner. It updates itself by looking in the central location where Panda programs keep the updated virus definitions. When you boot the computer from the disk, it boots into a protected version of Linux, prompts for the parts of the computer to scan, and scans your computer.

The Windows operating system contains a Software File Checker. Periodically run SFC /SCANONCE and reboot.

Except for the Vipre program I mentioned above, all of the programs in this thread are free for personal use. If you have a massive virus infestation or an infestation of low level OS files, you my have to spend money to repair the problem. However, usually, you fix the low level OS files by reinstalling the OS (telling it to keep user settings) and the free antivirus programs should clean up even a massive infestation. You might have to run the Repair for some programs (in the Install/Uninstall command), but you can clean your computer. The Panda SafeCD needs up to date antivirus files. You can download these for free from PandaSecurity.

The ERUNT program saves a full backup of the registry. I schedule it to run daily and keep a month worth of backups. If I have to reinstall the OS, I can use the backup to restore my settings and programs.

7) Virtualization
A lot of times, when one tries to install a program from the internet there will be pirate files (like keygens or cracks) in the installation package. I do not want to encourage piracy, but if you use these files, you need to protect yourself. Your antivirus program will pick these up as inappropriate programs. Sometimes, the antivirus will say it is a Hack tool (which is true and means the file is OK). Sometimes, the antivirus will report that there is a virus, worm, trojan, or backdoor in the file. This means don't run that in Windows!

You can run the program on a virtual computer or in a sandbox.

The solution to the problem for keygens is to run them on a spare computer that you can just throw away. You say that isn't practical, that is where virtualization comes in. Both VMware and Microsoft have programs available (free for personal use) that you install an operating system on and can run programs on. However, the programs are not running in your operating system, but in the copy, so they don't harm your computer. You can do this with any program you are not sure about. There is a file that represents the operating system installed on the virtual computer, and you keep that intact, while running on a copy.

Sandboxing is a little easier. It is a partial virtual computer, so it doesn't use as much memory and is easier to set-up. The most popular program is Sandboxie. There are alternatives, but none aa well tested. Sandboxie is what is called nagware. You can use it for free (for personal use), but they keep asking you to register (your choice).

Last edited by drbits; 26.02.2011 at 10:53. Reason: Update | Add German Summary | Add Spanish Summary | Change to MSSE
Reply With Quote
  #5  
Old 06.01.2010, 11:29
drbits's Avatar
drbits drbits is offline
JD English Support (inactive)
 
Join Date: Sep 2009
Location: Physically in Los Angeles, CA, USA
Posts: 4,437
Default

The best way to turn off link scanning and web scanning is to not install it. AVG is one of the best free antivirus programs. If you install it in Custom mode, you can leave out the Link Scanner. PCtools free antivirus does not even have a link scanner to turn off.

Don't go for integrated or professional security packages or the Pro versions of antivirus programs. I have tried over a dozen of them over the years and read a lot of reviews.
--------------------------------------
Some Suggested JD Settings
JDownloader, like most download programs, has dozens of options to support everybody's needs. But a few are most important:
On the bottom right of each page, there are:

1) Max. Con. (maximum connections/download). Unless you are using Premium accounts, set this to 1. If you have a Premium account set it to at most 4.

2) Max. Dls. (maximum downloads at one time). Please see This section.

For most people (with fairly new computers), that is all you have to set. The defaults are fine for the rest of he settings.

Last edited by drbits; 22.04.2010 at 01:37. Reason: Cleanup
Reply With Quote
  #6  
Old 19.01.2010, 23:13
drbits's Avatar
drbits drbits is offline
JD English Support (inactive)
 
Join Date: Sep 2009
Location: Physically in Los Angeles, CA, USA
Posts: 4,437
Default Glossary (Information)

This post defines some terms often used when discussing links and addresses on the web.

A link is the information required to reach a web page or file. For JDownloader, this is the information passed to a storage host to begin the process of downloading one or more files.

A Storage Host is a company and their equipment that allows users to upload files for storage or for sharing. These are usually just referred to as hosts. At Jdownloader, the German term hoster is sometimes used to refer to a Storage Host.

A direct link is the internet address of a specific file. It can be used to read, write, or execute the file, just as a file path can be used in the file system on your computer. In JDownloader, these are often referred to as "HTTP links", because they don't necessarily refer to a known storage host.

A link is used to contact a storage host and request access to a file. However, this is not usually the path to the file. The host authorizes you and then gives you the direct link. A link is a URI (Universal Resource Indicator).

Internet addresses are URIs. A subset of URIs are URLs, and the term URL is often used when URI (a newer term) is meant. Address and link are informal ways of saying URI.

Sometimes, a link is encrypted. That means that the link indicates a Decrypter Host instead of a storage host. The link was created by the Decrypter Host in order to help the Uploader hide the location of the uploaded file. JDownloader knows how to call many Decrypters and retrieve the decrypted link, which JDownloader then uses to download the file.

Many hosts allow users (uploaders) to store their files in Folders.The folder has a URI, so users can distribute a link that represents all of the files in the folder. For example, if you were to download a patched (fixed) copy of a program you already own, a large program may require you to download over 40 files. JDownloader can download all of the files from the folder link.

A Container is similar to a folder. Each container is a file containing a list of links, usually encrypted. JDownloader knows how to obtain the links from all of the common types of containers (most of the time, it means contacting a Decrypter). The most important type of Container is a DLC, JDownloader.org's own container type. DLC files are sometimes called JDC files. Containers may become too old to use (they might already be too old when you download them).

Click'N'Load is a way for a web site to offer the user a file, but the path to the file is encrypted. These are often used to retrieve DLC containers, providing significant privacy. This is often abbreviated as CNL or CNL2 (currently, only version 2 is supported).

A Captcha is a challenge designed to avoid allowing automated access to resources. The idea is that the computer program is "captured", rather than authorized. JDownloader can answer many Captcha challenges.

reCaptcha is a specific Captcha that is too hard for JDownloader to answer. You can recognize it because it looks like two words written with a crayon. Do not ask the team for an automated solution for reCaptcha.

A relative URI (or URL) is a path relative to the current location. It is a URI with the beginning parts left off. These are also known as relative addresses. This is usually only seen in web pages. When you specify an address, you usually specify an absolute URI, which is the normal format.

Authorization usually means logging on to a host, either by providing a username and password, a certificate identifying your computer, or similar information. Storage hosts often have free accounts in which the authorization consists of correctly responding to a Captcha. Most FTP servers have an account named "anonymous", which accepts your e-mail address (or any e-mail address) as the password.

Formats
Code:
URL= service://[username:password@][hostname.]domain.tld/path/filename[#[anchor]]
URI = URL or URL?tag=value[&tag=value]*
(Items in brackets are optional. The * means 0 or more)

Link Glossary
service is the network service name (http, ftp, file, svn, irc, wiki, mailto, gopher, etc.) that defines a type of the communication, usually built on top of TCP. Mailto is an exception to the normal format, because it is the only service where the // is not included.

hostname is the name (or path to) the host. This is not necessarily a server, but can be a virtual hosts, use as a reference into a part of a host, a server farm, or cache machines (sometimes called an edgeserver). This defaults to www for HTTP if it is not specified.

tld (Top Level Domain) identifies the country and/or category of the host and domain. Common examples are com, net, biz, de, uk, us, co.uk, ac.uk. There are rules about who can use which tld's, but they are rarely enforced. I doubt that storage.to is really in Tobago. Or that health.md is really in Moldavia.

domain is the identification of the organization within the tld.

path is generally a relative path on the server to the directory containing the file. However, these are sometimes mapped.

filename is the name given to the file to retrieve, execute, write into, or perform some other service on. Of course, it isn't always a file, but sometimes it is a parameter.

anchor is a location in a web page or it specifies a script to be run. The number sign (#) is used to indicate that an anchor follows. In scripts, the anchor is often left out.

tag=value:When some hosts started using databases to store information, the query strings were added to contain the search parameters. The parameters are not just used for queries, but the list of parameters is still called a query string.

username:password@ is a way to provide "basic authorization" information in the URI, rather than being prompted for the information. FTP servers accept this format, but it is optional for other services. An example is
Code:
anonymous:anymouse%40aol.com@
In this example, the password contains an at sign (@), but the @ is reserved for ending the password, so the hexadecimal code of the @ character is used.

This URL encoding uses a % character to indicate that the next two characters are the hexadecimal code for the character. In addition, spaces are not allowed in a URI, so spaces may be replaced with a plus sign (+) or with %20.

Examples

Code:
http://board.jdownloader.org/showthread?t=42
This is a web (HTTP) URI, referring to the host named "board" at the organization jdownloader, within the top level domain "org" (supposed to be reserved for non-profit organizations like this one). The path is empty, instead the name of a service offered by the host (showthread) is used as the file name. The query string contains just one parameter (t=42) that identifies the specific information being requested.

Code:
file:///c:/program+files/jdownloader.jar
FILE is the service that refers to the local file system. You will notice that there are three slashes in a row. The first two are part of the regular syntax. The third slash indicates the "root" of the file system. Then the rest is just a path and file name with an extension. Notice the + in "program+files" instead of a space.

For a good understanding about HTTP codes, see thoughtpad.net/alan-dean/http-headers-status.html

Last edited by drbits; 24.06.2010 at 23:44.
Reply With Quote
  #7  
Old 01.02.2010, 10:05
drbits's Avatar
drbits drbits is offline
JD English Support (inactive)
 
Join Date: Sep 2009
Location: Physically in Los Angeles, CA, USA
Posts: 4,437
Default How to report a speed problem.

As for all JDownloader problems, when you are reporting a speed problem, always include sample links that are slow and a log that includes downloading some of those links. Make sure you report speed problems only in **External links are only visible to Support Staff**General Bugreport.

For speed problems, please also include any software that runs at the same time as JDownloader. Your security software can severely affect your download speed. Running other internet programs (such as uTorrent, internet television, or even a bad browser), can "starve" JDownloader of the resources it needs.

Please see this discussion for information about choosing and using security software.

It is important to report which settings you have changed in the program or run
Code:
java -jar jdownloader.jar -config 2>jdconfiglog.txt
to generate a text file with all of your settings. You can create a rar archive containing the file and attach it to a message [Go Advanced, then Manage Attachments].

The most important settings are Max. Con. and Max. Dls. on the bottom of each JDowloader page.

Report speed problems in **External links are only visible to Support Staff**General Bugreport.
----------------------
The other thing that slows things down is the wrong TCP settings. SpeedGuide.net is a good place to get the information you need. It depends on your OS and version.

Last edited by drbits; 01.06.2010 at 10:25.
Reply With Quote
Old 06.02.2010, 01:14
drbits
Message deleted by raztoki. Reason: .
  #8  
Old 15.02.2010, 03:27
drbits's Avatar
drbits drbits is offline
JD English Support (inactive)
 
Join Date: Sep 2009
Location: Physically in Los Angeles, CA, USA
Posts: 4,437
Default Speeding up downloads with Windows "7" or Vista

Windows Vista and later automatically adjust your TCP parameters, so you don't have to. However the set-up is far from ideal. In addition, there is an important patch for Windows 6.x (Vista, "7", and server 2008).

1) Windows has an excellent tool for saving the system state, called restore points. You should be able to reach it from a Start Menu command with a name like "Help and Support" (I am not running Win7, so I do not have exact names).

2) While Restore Points do a good job of saving the system status, it is a good idea to backup the registry separately (at least once per week). The program ERUNT "larshederer.homepage.t-online.de/erunt/" is designed to do this. ERUNT comes with a program for making periodic registry backups (I use it on every reboot).
Note: In the FAQ, the author recommends turning off System Restore, I recommend leaving System Restore running with a daily scheduled save.

When I recommend saving a Restore Point, I am also recommending that you run ERUNT to save the registry.

3) There is a known, serious, memory leak in Windows Vista and "7" that affects Java, JDownloader, and most security software. Please read the Microsoft notice and install the WEP rollup patch.

3.a) It is important that the last version of Java installed be version 1.6.0_20 32 bit, not the newest version or the 64 bit version (both have Bugs in Win7). If the last version you have installed is 64 bits, then install the 32 bit version on top of it. You can download this version of Java the link on the jdownloader.org Download page.

4) I am very cautious, but 35 years in the computer field has taught me some lessons. Whenever you apply a system patch, I recommend
4a) Use your antivirus to scan the patch (this is what it is for).
4.b) Reboot your computer and do not allow any applications to run (or exit them immediately).
4.c) Save a system restore point.
4.d) Run ERUNT
4.e) Install the patch.
4.f) Reboot your computer.

5) Go to speedtest.net and test the speed of your internet connection to a local server and test again with a remote server (I am in Los Angeles, and I test with a Los Angeles server, an Australian, and a European server. This is just to make a record of what your internet connection speed was before making any changes.

6) Windows 6.x (including Vista and "7") automatically adjusts the internet parameters for optimal functioning. However, you have to tell it how you use the internet. There is a command script that helps you do that: hxxp://www.speedguide.net/files/vista/SG_Vista_TcpIp_patch.cmd
You download and run the script and tell it you want to optimize your connection. It makes changes to the registry to adjust how Windows deals with the internet. Run ERUNT before running this script.

7) The speedguide patch says Vista, but it is also usable for Windows 2008 and "7". Run it and answer "y" to optimize your internet connection.
7.a) If you are not using Voice over IP or TV over IP, then you can turn off QOS. Run the script again and answer "q" to turn off QOS.

8) At this point, if you optimized your TCP and turned off QOS, your internet connection should be 25-30% faster than before. Now is a good time to run another speednet test.

Security


Some of the security software has recently changed. My current suggestion for security software is
  • Antivirus: Microsoft Security Essentials or AVG Free Antivirus installed without Link Grabber.
  • Firewall: PCtools.com Free Firewall Plus or Microsoft Firewall
  • IDS: Threatfire (threatfire.com)

9) Internet security is a major concern, but most of the available programs are wasteful. A primary rule is to never use a security program, browser, or other application that is integrated with the operating system (they open-up holes for hackers). Integrated security suites try to provide everything for everybody and that means they perform poorly.

10) Programs to worry about are MS IE and MS Office (Open Office is free and compatible).

11.a) If you are using Microsoft IE, consider changing to Firefox, Google Chrome or Opera. Along with the recommended add-ins, these are several times more secure than Internet Explorer.
11.b) Even if you change to a different browser, you must keep up on the security patches for the OS and that includes Internet Explorer.
11.c) If you change to Firefox, keep it up to date. I also recommend the following security add-ons:
i) Noscript (allows you to explicitly control which web pages can run scripts and looks for other problems as well).
ii) Adblock plus (blocks most annoying ads, popups, and so on).
iii) IE Tab (Allows you to run web pages that will not run without Internet Explorer. It used to be just a convenience, now some of the Firefox security also extends to IE Tab).
iv) FEBE is an add-in that automatically backs up your Firefox settings (I schedule it to run at 5:00 AM daily).
v) Either WOT or Finjan (or both). WOT tells you about other user's experience with a web site (stay away from the Red sites if you can). Finjan (securebrowsing.finjan.com/index.html) evaluates each web page for Phishing and Adware type behaviors. These tools are more powerful than most antivirus link scanning.
11.d) I also recommend several non-security add-ins (All-in-one sidebar, Babelfish translator, spelling dictionaries for all of the languages you need, and FasterFox lite). There are also a lot of development tools, but developers can find them on their own.

12) If you want JDownloader to run well, do not use an "Internet Security Suite". First, they come with a lot of worthless extra software that just slows down your computer. Second, most of them try to perform an antivirus scan on data as you download it (which cuts your download speed significantly and causes download errors). These problems are reported most with JD, but they affect all download programs.
12a) If your internet connection is through a router, you probably have a good firewall built into the router. You do not need extensive or expensive firewall software.
12b) You need a firewall that is fast, has a learning mode (where it creates rules based on your traffic, assuming that everything is OK), and which tells you what it is doing, allowing you to override it. A good firewall should never block a site or local application without your explicit permission.
12c) An Antivirus program should check every script or executable file every time you open it to run it (MS Office files have to be checked every time you open them). The Antivirus program should also have a quick scan, a root-kit scan, and a scan for a requested file or directory. No other functionality is necessary or desirable.
12d) I recommend the PCTools "Free" firewall. It is small, fast, and meet the needs (except for the rootkit scan). I also like the software from Sunbeltsoftware (not free).
12g) For an Antivirus, I now recommend Microsoft's Security Essentials (a free download from Microsoft). AVG "Free" antivirus is a good alternative antivirus, except that it include a "Link Scanner". You must use Custom install and do not install the Link Scanner.

In the past I recommended PCTools Antivirus, but it has changed and now contains bloatware.

12e) The best rootkit scan I know about is the separate (and free for private use) Emergency Repair Disk antivirus scanner from Pandsoftware. You download the program and burn it to a CD or DVD. Then, you reboot your computer, booting from the CD or DVD. This boots your computer into Linux with an excellent antivirus scanner. Because Windows is not running, the viruses cannot hide by modifying the OS.
12f) Second place in the rootkit scanner competition is Threatfilre (or the free rootkit scanner from Pandasoftware).

Do you have any better suggestions? I am only one person and have not tried all of the software available. PM drbits with suggestions and comments.

Last edited by drbits; 12.10.2010 at 04:05. Reason: Added Java download
Reply With Quote
  #9  
Old 18.03.2010, 01:01
soulzero
Guest
 
Posts: n/a
Default

Hi, i did the TCP optimizing thing, and i can say my browsing works a lot faster!

But now with the Largest MTU tab: it doesnt work, this is what it keeps saying.


Pinging [216.77.188.73] with 40 bytes ->Request Timed Out
Pinging [216.77.188.73] with 40 bytes ->Request Timed Out
Pinging [216.77.188.73] with 40 bytes ->Request Timed Out
Couldn't determine largest possible MTU due to packets being lost.
You might want to try a different URL

Any tips on how to get this to work? Also thank you for posting this, very helpfull.

Last edited by soulzero; 18.03.2010 at 01:08.
Reply With Quote
  #10  
Old 19.03.2010, 22:28
drbits's Avatar
drbits drbits is offline
JD English Support (inactive)
 
Join Date: Sep 2009
Location: Physically in Los Angeles, CA, USA
Posts: 4,437
Default

@ soulzero

Your firewall or router probably block all Pings. That is common. You can open them up, usually Allow Ping is a specific option.

However, if you know what type of internet connection you have, it does not matter. If you have PPPOE (usually used for DSL), then your MTU is 1492. Otherwise, it is 1500. One easy way to find out is to try a speedtest with each of the values and see what happens. Turn off the setting to automatically detect MTU. Set your MTU to 1500, restart the computer, and run a speedtest. Set your MTU to 1492, restart your computer and run a speedtest.

If 1500 is slower than 1492, then you know to use 1492. The difference will be significant (usually 10% or more). If 1492 is slower than 1500, you might not notice the difference (1-2%), and you would use 1500.

The trick is that if you set the MTU to 1500 and that is too big, each packet will be divided into two pieces somewhere in the transfer. So there is a lot of extra overhead.

Last edited by drbits; 30.05.2010 at 04:39.
Reply With Quote
  #11  
Old 20.03.2010, 01:41
soulzero
Guest
 
Posts: n/a
Default

Oh i see, firefox lies against me about the speed. K thats cool. Didnt read it at first.

Last edited by soulzero; 21.03.2010 at 01:40.
Reply With Quote
  #12  
Old 23.03.2010, 08:31
pcacd001
Guest
 
Posts: n/a
Default Mac osx 10.6 *snow leopard user

Hey guys I am pretty sure that i am not utilizing my internet's maximum speed with Jdownloader. I get speeds that fluctuate b/w 140-250 using rapidshare. and they ALWAYS fluctuate. no download is ever consistent and YES i do have a premium acct.

here are my internet/ computer specs

- black macbook 2,1
2.16 ghz
intel core 2 duo

internet
Verizon DSL broadband
1.5mbps * i visited speedguide.net and here are the results
1807 kbps down (~1.81 Mbps, 221 KB/s) ↓
633 kbps up (~0.63 Mbps, 77 KB/s) ↑

Details:
3072 KB downloaded in 13.928 seconds
500 KB uploaded in 6.466 seconds
Speed @ 136% of the average for plspca.verizon.net
34 times faster than 56k dialup
Tested on: 2010.03.23 03:30 EDT
Tested from: clowder.ca
Test ID: 2836460
Browser/OS: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.6; en-US; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5
IP Address: 71.102.38.26
Latency: 100ms
Provider: plspca.verizon.net
Location: Desert Hot Springs, CA, US



Can anyone help me do the necessary tweaking on Jdownloader? I would really really appreciate it. most info out there are for windows users..
Reply With Quote
  #13  
Old 23.03.2010, 09:54
Jiaz's Avatar
Jiaz Jiaz is offline
JD Manager
 
Join Date: Mar 2009
Location: Germany
Posts: 64,732
Default

many isp throttle the speed to oneclickhosters like rapidshare.
jd shows the real speed (with up/downs) while other tools like firefox use a complete different method to calculate average speed (where you dont see the up/downs ) but using a speedmeter tool you will see the same
__________________
JD-Dev & Server-Admin
Reply With Quote
  #14  
Old 13.04.2010, 00:01
drbits's Avatar
drbits drbits is offline
JD English Support (inactive)
 
Join Date: Sep 2009
Location: Physically in Los Angeles, CA, USA
Posts: 4,437
Default Windows 7 and Vista WEP Patch

Microsoft has released a warning about bugs in WFP (a component of Windows "7" and "Vista"). These bugs cause a serious memory leak and system crashes in these operating systems when used with most security software and sometimes with JDownloader.

Please read http://support.microsoft.com/kb/981889 for more information.
Download and install the appropriate patch for your processor, and restart your computer.

You only need one file. The patch must match your OS and processor. If you use the wrong file, it will not install.

WFP patch for Windows Vista on 32 bit processor
WFP patch for Windows 7 (6.1) on 32 bit processor
WFP patch for Windows 7 (6.1) on 64 bit processor

For other processors (Windows 7 Itanium, Windows Vista 64 bit, Windows Vista Itanium) visit http://support.microsoft.com/hotfix/...889&kbln=en-us

Last edited by Think3r; 06.11.2011 at 00:43.
Reply With Quote
  #15  
Old 14.04.2010, 20:58
drbits's Avatar
drbits drbits is offline
JD English Support (inactive)
 
Join Date: Sep 2009
Location: Physically in Los Angeles, CA, USA
Posts: 4,437
Default Windows System Repair for JDownloader

A. Fix Java
If you have Java JRE 1.6.0_21 32 bit installed (and you are sure it is correct), skip to the next section.
1) Download "Comodo System Cleaner" from Comodo.com. As an alternative (or in addition), you can download Glary Utilities from glarysoft.com.
2) Download Java JRE 1.6.0_21 32 bit. You can download it from java.sun.com/products/archives You use the 32 bit version, even on a 64 bit OS.
3) Go to "Help and Support" and save a Restore Point.
4) Disable any programs that normally start with your systems.
5) Uninstall the Java JRE. You should restart your computer.
6) Delete the Java directory (usually C:\program files\java\) and all sub-directories
7) Please install "Comodo System Cleaner" or "Glary Utilities" (glarysoft.com). and start it.
8) Use the Registry Cleaner to delete things left from uninstalled programs. You should restart your computer.
9) Install Java JRE 1.6.0_21 32 bit.
10) Reinstall JDownloader from http://jdownloader.org/download/index.
11) If JDownloader works now celebrate!
11a) Re-enable your development tools and messaging system.
11b) Please let us know it worked.
11c) You are done (goto :EOF)

B. Fix Antivirus and Firewall
If JDownloader still not work and you are sure you have the correct version of Java installed, start here. Your security software is probably interfering with JDownloader communicating with the internet.

1) The easiest way to see if your security software is a problem is to disable it, reboot, and see whether that fixes JDownloader. If it does, restart your security software and follow the steps in this section.
2) Open your Firewall program and make sure that jdownloader.exe, java.exe, and javaw.exe are trusted to send on any port. Make sure that java.exe and javaw.exe can listen to any port on the local computer (or at least ports 9666 (FlashGot) and 1038, but plugins for JDownloader use ports 194 (IRC/chat), 1500 (DTC part of IRC), 8765 (Web Interface), 10025(Remote Control)).
3) Make sure your antivirus has no network scanning, link scanning, web protect, or any other interference with the network. If it has any of these features, uninstall or disable them and reboot your computer. They do not add to your computer security.
4) If JDownloader works now celebrate!
4a) Re-enable your development tools and messaging system.
4b) Please let us know it worked.
4c) You are done (goto :EOF)

For more about security software, see Choosing Security Software

C. Removing your old security software
If adjusting your security software does not work, then you should replace it with less intrusive (but just as safe) software. Parts C and D are used together.
1) Set a restore point
2) Browse to pctools.com. Download the "Free" Firewall, and ThreadFire. You can use other products, but my experience is that these do not use a lot of memory or CPU time. Browse to Microsoft.com and download Microsoft Security Essentials.
2a) Check the web site of your security software provider(s) and download the cleanup tool. Here is a link to more information about cleanup tools:
"**External links are only visible to Support Staff**
3) Uninstall your security software (or disable it if you cannot uninstall it - Do not try to uninstall Windows Firewall, just disable it.). This includes Antivirus, Firewall, and anything like antispyware. Run the cleanup tools. Restart your computer.
4) Delete the directories for the uninstalled programs.
5) Use he Registry Cleaner from either Comodo System Cleaner or Glary Utilities. Use the Registry Cleaner. This will remove items that the programs left behind in the registry. You should restart your computer.
6) Reinstall Java JRE 1.6.0_21
7) Reinstall JDownloader
8) Does JDownloader work now? 99% of the time it will.
9) If JDownloader still does not work, use the restore point from step 1 to restore your security software and contact us again. You may have to use
Advanced System Cleaning


D. Install new Security Software
Installation of security software known not to interfere with JDownloader.
10) Install ThreatFire (you may have to restart your computer). Allow it to update.
Threatfile is a program that warns you about "Virus like behavior". It will pop up questions about whether a program is allowed to do some things. At first there will be a lot of questions.
11) ThreatFire also has a scan for viruses called RootKits. Run the Intelli-Scan. The Intelli-scan does not scan your whole computer, only the parts likely to hide a virus.
12) Install the new Antivirus (you may have to restart your computer). Allow it to update.
This is a complete Antivirus. However, it does not have the extras to scan what you are doing on the internet. For Browser safety, try FireFox with NoScript and WOT (there is other browser security software, but this combination is known to work well).
13) In the Antivirus program, select Settings and click on Scan Settings and then Scan Exclusions. Click on Add File Type and select .part from the list of file types. There may be others you want to add later, but this exclusion speeds up JDownloader.
14) Run an Intelli-scan with the Antivirus. The Intelli-scan does not scan your whole computer, only the parts likely to hide a virus.
15) Now that you have run the scans, open the TreatFire Program, select Settings, and change the "Sensitivity Level" to 2 (learning mode) so that it won't bother you very much. After a week, set the Sensitivity Level to 3 (normal) or 4 (strict).
16) Install the new Firewall. (you may have to restart your computer).
17) Like ThreatFire, the Firewall will ask you a lot of questions. In settings, make sure Firewall Mode is "Allow All" (learning mode). Tick the box next to Automatically allow known applications. After a week, change the slider to Ask. This is a very powerful Firewall if used in "Expert Mode" you can control exactly which ports are open on which programs, and so on.
18) Try running JDownloader again. If it still does not work, you may need to use Advanced System Cleaning
19) Re-enable any programs that normally start with your systems. Make sure JDownloader is in the list.
20) Save another restore point.
21) Let us know about your experience.

Remember to always include a Log and list of links whenever you contact us about a problem.
__________________
Please, in each Forum, Read the Rules!.Helpful Links. Read before posting.

Last edited by drbits; 25.12.2010 at 03:57.
Reply With Quote
  #16  
Old 16.04.2010, 11:25
drbits's Avatar
drbits drbits is offline
JD English Support (inactive)
 
Join Date: Sep 2009
Location: Physically in Los Angeles, CA, USA
Posts: 4,437
Lightbulb Optimizing your number of connections

1) The first step is to find out your real your internet download speed. I prefer speedtest.net (speedguide.net and dslreports.com are other places to test). This figure is usually slower than your internet provider says. The result will normally be reported in Mbps (Mega bits per second).

JDownloader and most other programs report in KBps (Killo Bytes per second). To convert the speed test number to KBps, divide by 8 (convert to Bytes) and multiply by 1024 (convert from Mega to Killo). Call this D.

Suppose you have an average DSL connection and your download speed test result ix 1.28 Mbps download speed. This results in D=164 KBps.

2) The second step is to estimate the download speed of your most important sites. Let us suppose that you are a free user on Rapidshare, Hotfile, and MegaUpload. Set JDownloader to Max.Con.=1 and Max.Dls.=1. Download a large file show from each site and divide the size of the file by the number of seconds it took to download the file (exclude the time it says "Connecting" or the time for extracting. A movie is a good test file.

Suppose the files is 700 MB. If it takes approximately 7150 seconds to download, then you take 700*1024 KB and divide it by the number of seconds. This comes to 100.25 KBps. Average this for your most important hosts (assume this is the average). We will call this H. H=KBytes downloaded/seconds to download.

Depending on the host, H for free users could range from 1 KBps to 160 KBps. For a Premium user, H ranges from about 200 to 1000 KBps.

3) Your connection capacity C is your total download speed D divided by your speed from a host H. In this example, we get 164 KBps/100.25 KBps = 1.64

This means that the total number of connections should be limited to 2. If Max.Con. is 1, then Max.Dls can be 2. Max.Con.=2 with Max.Dls.=1 is not recommended.

If you have a top speed DSL connection (4Mbps gross) and your speed test result is 3.723 Mbps (this is close to the maximum). D=476.5 K Bytes per second. If the download speed from the hosts is the same, C = 4.75. Your optimum download speed is Max.Con.=1, Max.Dls.=5. You can reduce your speed per connection to about 1/2 of the maximum without worrying about disconnection and other bad outcomes (but it is not optimal). In this case, you could have Max.Con.=2, Max.Dls=5 or Max.Con=3, Max.Dls=3.

If you are a premium user with a maximum host speed H=400 KBps, then your settings should probably be Max.Con.=1, Max.Dls.=2.

If you have a medium speed cable connection that tests as 9.325 Mbps, Your download speed is D = 1193.6 if the 100.25 Host rate is unchanged, C=11.9. You could use Max.Con.=3 and Max.Dls.=4 or Max.Con.=4 and Max.Dls=3 or Max.Con.=2 and Max.Dls=6.

But if you have a good cable connection, you will probably pay for a premium account. If H=400 KBps then C= 2.984 which we can round to 3. Thus, it is optimal to have Max.Con.=1 and Max.Dls=3. Max.Con=2 and Max.Dls.=2 is not a bad choice.

If you have a "Full Channel Capacity" cable connection, and it tests at 40.0 Mbps, so D=5120 KBps. With a premium host download per connection H=400, then C=12.8. Max.Con.=4 and Max.Dls=3 would work well. Max.Con=2 and Max.Dls=4 could be used. Max.Con.=5 and Max.Dls=3 would also work well. Max.Con.=7 and Max.Dls=2 is reasonable. Max.Con. could be up to 20 with this kind of internet connection. It just slows the speed of each download connection.

In summary:
Code:
C = Speed Test
    Host Speed
And generally, keep Max.Con. low unless you have a very fast connection.

Download accelerators such as FlashGet or Down Them All generally use a Max.Con. of 4 and Max.Dls.=2 or 3. This C'=12 is generally safe for download speeds D > 600KBps, but it wastes as much as 10% of your download capacity in overhead.

In general, these are optimal settings:
Code:
                           Sample Download Speed D 
 C      Max.Con.            at H=400KBps           
<6      1                 <2400 KBps or 18.75 Mbps
<9      1 or 2            <3600 KBps or 28.125 Mbps
<12     1, 2, or 3        <4800 KBps or 37.5 Mbps  (max. for Cable)
<16     2, 3, or 4        <6400 KBps or 50 Mbps     (Needs Fiber)
<24     3, 4, or 5        <9600 KBps or 75 Mbps
<48     4, 5, 6, or 7     <19200 KBps or 150 Mbps
Max.Dls. is C/Max.Con. rounded up.

Last edited by drbits; 16.04.2010 at 11:51.
Reply With Quote
  #17  
Old 21.04.2010, 07:18
drbits's Avatar
drbits drbits is offline
JD English Support (inactive)
 
Join Date: Sep 2009
Location: Physically in Los Angeles, CA, USA
Posts: 4,437
Default Optimize your internet connection

First, with nothing else running on your computer, browse to speedtest.net and test your actual connection speed.

Then I suggest you visit speedguide.com. If you are running Windows Version 6.x (Vista, 2008, "7"), download the patch, apply it to your computer and reboot. The rest is for earlier versions of Windows.

If you are using an earlier version of Windows, Download the free TCP Optimizer. On the top, adjust the slide to your internet connection speed. On the bottom right, set Optimal settings, Click on Apply changes, and restart your computer.

This gets your TCP stack close to optimal, but there is more to do. Run TCP Optimizer again and change the setting on the bottom right to Custom settings.

Click on the Largest MTU tab and test your optimal MTU. Enter the MTU in the box in the middle of the right side of the first tab.

Use the Latency tab to estimate the time it takes for a packet to travel to and from servers. If your MTU is 1500, use packet size 1472 (this is your MSS) If your MTU is 1492, set the packet size to 1452 (this is your MSS), add your most important hosts to the list and run the test. Write down the largest value returned and your MSS.

Now we put this together Take you connection speed and divide by 8 to get bytes. Convert it from megabytes to bytes by multiplying by 1024 * 1024. Now you have your maximum bytes per second if you were communicating with the test server.

To tune your TCP for your most important servers, multiply your bytes per second by your largest latency. Round this up to a multiple of your MSS. Enter this in the TCP Receive Window on the first tab of the TCP Optimizer. The sets up your TCP so that it has a large enough buffer to accept a stream of data from the server without having to make extra stops.

As an example, my MTU is 1492 (so my MSS is 1452). When I run the speed test, I get 1.20 megabits/second. I convert this to bytes/second and get 1577286. My longest latency (to the closest rapidshare servers) is .28 seconds. I multiply my bytes/second by my latency and I get around 44040. I divide that by my MSS (to get the number of packets the buffer has to hold), round up, and multiply by MSS (I get 45012). I would enter that in the TCP Receive Window, Apply the changes, and restart.

When you see ads for programs that can increase your internet speed by 300%, this is all they do.
Reply With Quote
  #18  
Old 08.05.2010, 10:06
drbits's Avatar
drbits drbits is offline
JD English Support (inactive)
 
Join Date: Sep 2009
Location: Physically in Los Angeles, CA, USA
Posts: 4,437
Default Removing Win-Waste (Windows waste and security holes)

First, most of this information is in the registry and so it is important to backup the registry. Download erunt-setup.exe from "www.larshederer.homepage.t-online.de/erunt/". The program is easy to install. It will save a copy of your registry into a subdirectory in your Windows directory (a different directory name per day). Read the FAQ in the web site, you have to open the Control Panel, select the UAC control, and turn off UAC (which prevents you from easily acting as administrator if you leave it on). The FAQ says that you may get an error 3 message, because the OS installer is poorly designed (you should ignore the message). Run the ERUNT program before working with things that change the registry.

Some of the names below may be different, depending on your OS version.

There is also a part of the Control Panel called "Help and Support" (or something similar). You can save a system restore point using that tool. This backs up part of the registry and most of the important Windows files. I have my computer set up to save a Restore Point daily and to run ERUNT (autobackup program comes with ERUNT) whenever I start my computer. If things go very wrong, you can restart your computer in Safe mode (Press F8 about once per second when the computer is starting up and it should give you a chance to choose Safe Mode). At some point, it will ask you whether you want Safe Mode or System Restore. To restore the system to a restore point, choose System Restore and identify the restore point you want.

If you are running as an administrator and right click on Control Panel, you should be able to choose "Explore" (or Open). This will show you the real control panel (without the index-interface). Each item listed is a special program for controlling part of the operating system.

Network Connections

The first thing to open is Network Connections. Ideally, there will only be one entry, possibly a second entry for your security software. For other entries (USB, FireWire, NetBT, Direct Connect, and so on) right click ans select Disable. If it turns out that you need one of them, you can just re-enable it. But these are other ways of connecting to the internet or a local computer, and they are usually not necessary unless you have a Server or need to run special software to recover a dead computer.

Right click on your TCP-IP (or Internet) connection (the specific name varies, it is usually the name of your internet carrier). Right click and select properties. This will list your network card at the top (do not change this if you aren't sure what you are doing) and below that a list of drivers for your internet connection. You actually only need "Internet Protocol" and possibly one for your security software. Other "Clients, Services, and Protocols" are for special purposes or for use with a server. Anything like MS Tunneling Protocol, IPv6, NetBT, or Browser (this is not your web browser) should be uninstalled unless you are connected to a server or using a VPN (virtual connection so that your computer looks like it is in your office). These four in particular are huge security holes. If you do not have a Local Area Network, (other computer connected to yours), make sure File and Printer Sharing is uninstalled (this is also called the Server service and it is another huge security hole).

Click on Internet Protocol. Click on Properties. Normally, you will see Obtain an IP address automatically and Obtain a DNS server automatically (the rest of the page is for setting static addresses). Click on Advanced. If you are not in a network with a server, click on the WINS tab and make sure the list of WINS servers is empty and click on Disable NetBios over TCP/IP. Click OK twice to get back to the properties for your internet connection.

If there is an Advanced tab, this is for your Windows Firewall or other security software. Your Windows Firewall should be OFF if you are using a better firewall. Regardless of which firewall you choose, you should set-up Windows Firewall. Make sure to tick "Display a notification when Windows Firewall blocks a program". It is important to ALWAYS have your security software inform you immediately of every problem, and good software will allow you to select the action to take. Make sure that jdownloader.exe, java.exe, and javaw.exe are in the exceptions list. Check the JDownloader directory, the "program files\Java\jre6\bin" directory and the Windows directory to assure you enable Java where ever it is installed.

Exit from your network connections. Make sure to adjust any other security software in the same way.

Services

Please save a Restore Point before changing any services or devices.

You should still have Control Panel open. Open Administrative Tools. Open Services and expand the Services window so you can see things better. There are lists of services you can safely disable on the internet (it depends on your OS version and what software you have installed). If this is the only local computer (the rest are on the internet), you can safely disable anything designed to coordinate with a server or a local computer. This includes:
Browser, Clipbook, Java Quick Starter, NMindexingservice (if you do not allow the OS to index your disks), Remote Desktop, Security Center, Server Service, TCP/IP Netbios helper, Terminal Services, and Windows Media Player Networking. For each of the services that are underlined (and any others you want to disable), double click on the service name and change "Startup type" to Disabled.

Services that should be left Automatic include any special service for your hardware (keyboard, video card, and so on), Automatic Updates, Background Intelligent Transfer Service, Cryptographic Service, DHCP Client, DNS Client, Event Log, Fax, IPSEC, Machine Debug Manager, .Net Framework NGEN, Plug and Play, Protected Storage, Remote Procedure Call, Secondary Login, Security Accounts, System Event Notifier, System Restore Service, Windows Audio and Windows Management Instrumentation. If you use them, Task scheduler, Themes, and Windows Firewall/Internet Connection Sharing.

If you stop the Automatic services in the previous paragraph, either the system will crash or it might not restart.

Close the Services Window. Restart your computer.

Devices

Please save a Restore Point before changing any services or devices.

Go back to Control Panel, Administrative Tools. In Administrative Tools, you should find Computer Management. Open that by double clicking. You could have gotten to Services from here using the last part of the tree on the left. The Event Viewer is where you view detailed messages from various parts of the computer. Do not try to open Shared Folders if you turned off File and Printer Sharing or the Server service.

Click on Device manager. It might take a few seconds to come up if your computer is busy. Extend the window vertically, so you can see more. What you see in the tree is the various kinds of devices in your computer. Any red Xes are devices that are disabled. Any Yellow marks are devices that need to be repaired (usually rebooting your computer fixes this, but sometimes a driver has to be uninstalled and reinstalled).

This is not a try changing it and see what happens part of the software. The devices you see are the devices that the operating system found when scanning for Plug-N-Play devices.

Click on View and then Show Hidden Devices.

Unlike the services, when you click or double click on a device, no help appears. You can use your browser to get any information you need.

If you never use your Modem, it is a good idea to disable it (some viruses use it). Click on Modems to display the list of modems. Right click on the modem and click on Disable. It is a good idea to Disable instead of Uninstall, at least for a few weeks.

If you think something looks like the Control panel, it might be the same devices, but different controls. For example, if you Click on the "Sound, Video, and Game Controllers" category, you may see a huge list and you might never use some of those drivers, but do not change anything unless you are sure. Again, you cannot tune these drivers here, just install, enable, update, disable, or uninstall.

Click on "Non-Plug and Play Drivers". This opens the list of higher level drivers and drivers for very old equipment. A light grey diamond to the left of a driver name means that the driver is either broken or disabled.

To see what driver properties look like, double click on "Beep" (the little beep speaker inside your computer). The general tab is general information about the driver, a Troubleshoot button (usually not useful), and Device usage allows you to enable/disable the device. If you disable Beep, then your computer won't Beep. The Driver tab allows you to start, stop, or change when the driver is started during boot. The driver details button give you a list of files that make up the driver. The details tab is expert-only information.

Here you should see "NetBios over Tcpip" (open the properties, click on the Driver tab, and change Startup to Disabled, then Click OK). Do the same for MStun (MS Tunneling interface), and IPv6 (TCPIP6). After each change, the system will ask to reboot your computer. Allow a reboot after the last change.
Reply With Quote
Old 16.05.2010, 12:22
remi
Message deleted by Think3r.
  #19  
Old 25.05.2010, 16:07
z98
Guest
 
Posts: n/a
Default

Hi! Thank you for this guide! I think it'll be very helpful to me as I'm setting up a new PC I'm getting today. I just had one quick question about the x7.to links - I'm not which to use for this processor:
Intel Core i7-860 processor(8MB Cache, 2.80GHz)

According to wikipedia its:
Intel Core i7 is Intel's brand name for several families of desktop and laptop 64-bit x86-64 processors

Silly question, I know. Any help would be great - I don't want to mess anything up on day 1!
Reply With Quote
  #20  
Old 26.05.2010, 05:11
drbits's Avatar
drbits drbits is offline
JD English Support (inactive)
 
Join Date: Sep 2009
Location: Physically in Los Angeles, CA, USA
Posts: 4,437
Default

For an i7, you probably need the x64 patch. Fortunately, the patches will only install on the correct processor. The 786 (as much of the industry calls it) is a 64 bit processor that is almost compatible with AMD's x64 standard. Just like the the AMD 64 bit processors, they also will run in x86 emulation mode.

However, Windows and the drivers are running in 64 bit mode, so you need the 64 bit patch.
Reply With Quote
Reply

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump

All times are GMT +2. The time now is 07:53.
Provided By AppWork GmbH | Privacy | Imprint
Parts of the Design are used from Kirsch designed by Andrew & Austin
Powered by vBulletin® Version 3.8.10 Beta 1
Copyright ©2000 - 2019, Jelsoft Enterprises Ltd.