Converting a magnet link


If you’re using Ubuntu Linux, you can easily convert a torrent magnet link to a torrent file using a simple bash script. This is useful if you want to download a torrent file without having to open a web browser, or in my case, I use rTorrent which is a CLI torrent client for Linux.

To create the script, open a terminal window and type the following command:

nano magnet2torrent.sh

This will create a new file called magnet2torrent.sh. Open the file and paste the following code:


#!/bin/bash

#################################
#                               #
# Bash script to convert a      #
# magnet link to a torrent file #
#                               #
#  StrickStuff.com              #
#                               #
#################################


# Check that the user entered a valid magnet link
if [ "$#" -ne 1 ] || [ ! -z "${1##*magnet*}" ]; then
    echo "Usage: $0 "
    exit 1
fi

# Extract the info hash from the magnet link
hash="${1##*btih:}"
hash="${hash%%&*}"

# Download the torrent file from a torrent website
torrent_file="${hash}.torrent"
wget "https://itorrents.org/torrent/${hash}.torrent" -O "$torrent_file"

echo "Torrent file written to ${torrent_file}"

Save the file and exit the editor. To make the script executable, type the following command:

chmod +x magnet2torrent

Now you can use the script to convert a torrent magnet link to a torrent file. To do this, type the following command:

./magnet2torrent<magnet_link>

For example, to convert the magnet link magnet:?xt=urn:btih:0123456789ABCDEF to a torrent file, you would type the following command:

./magnet2torrent magnet:?xt=urn:btih:0123456789ABCDEF

The script will create a new torrent file called 0123456789ABCDEF.torrent in the current directory. You can then open the torrent file in a torrent client to download the files.

This is just a simple example of how you can use a bash script to convert a torrent magnet link to a torrent file. You can customize the script to meet your own needs. For example, you could add code to check if the torrent file already exists before creating it. You could also add code to extract the metadata from the torrent file and write it to a text file.

bash script to convert magnet links to torrent file

bash script to convert magnet links to torrent file

Artificial intelligence (AI) is already being used to create more sophisticated phishing emails. In the future, AI is likely to play an even greater role in phishing attacks, making them more difficult to detect and defend against.

One way that AI is being used in phishing attacks is to create more realistic and convincing emails. AI-generated emails can be tailored to specific individuals or organizations, making them more likely to be opened and clicked on. In addition, AI can be used to create emails that appear to come from legitimate senders, such as banks or government agencies.

Another way that AI is being used in phishing attacks is to automate the process of sending phishing emails. This allows cybercriminals to send out large volumes of phishing emails, increasing the chances that someone will fall victim to the attack. AI can also be used to target specific individuals or organizations with phishing emails, based on their online activity or other data.

AI is also being used to develop new types of phishing attacks. For example, AI can be used to create phishing emails that contain malicious attachments or links. These attachments or links can then be used to install malware on victims’ computers or steal their personal information.

In the future, AI is likely to play an even greater role in phishing attacks. As AI technology continues to develop, cybercriminals will be able to create even more sophisticated and effective phishing attacks. This is why it is important to be aware of the risks of phishing and to take steps to protect yourself from these attacks.

Here are some tips to help you protect yourself from phishing attacks:

  • Be suspicious of any email that asks for personal information, such as your password or credit card number.
  • Do not click on links or open attachments from emails that you do not recognize.
  • Use strong passwords and change them regularly.
  • Keep your software up to date with the latest security patches.
  • Use a firewall and antivirus software.
  • Be aware of the latest phishing scams and how to identify them.

If you think you may have been the victim of a phishing attack, it is important to take action immediately. Change your passwords, contact your bank or credit card company, and report the incident to the authorities.

Phishing attacks are a serious threat, but there are steps you can take to protect yourself. By being aware of the risks and taking steps to protect your information, you can help to keep yourself safe from these attacks.

 

Websites went down.

It appears that several of my domains ended up with infected pages. I do not know how that happened and neither does Dreamhost. This is currently my second fresh install. What a pain in the buttocks this was. 

Hopefully, this will be the last time!  I changed my password for the second time, plus I added an additional FTP user to separate the most important sites in an effort to contain any future infections. 

EDIT: On a positive note, I updated WordPress and it appears to be working well. 


Infected websites suck!

 

Here’s the assignment for Lab3. The next class session will show us .

Public Class frmCompare

    '----JDS-----------------------
    'CREATED:    10/15/2014
    'CREATED BY: James Strickland
    'CLASS:      COP2010 - 090898
    'PURPOSE:    Write a Windows Application
    '            program that inputs
    '            three different integers
    '            and displays results
    '            in a listbox
    '----JDS-----------------------

    ' Declare variables
    ' inum=InputNumber
    Dim inum1, inum2, inum3 As Integer

    ' onum=OutputNumber
    Dim onum1, onum2, onum3, max, min As Integer

    Private Sub frmCompare_Load(sender As Object, _
                                e As EventArgs) _
                            Handles MyBase.Load

        ' Hide the "About" label at form load
        lblAbout.Visible = False

    End Sub


    Private Sub btnGo_Click(sender As Object, _
                        e As EventArgs) _
                        Handles btnExe.Click

        ' The following code is executed 
        ' when the EXECUTE button is pressed

        ' Get the users 3 numbers and load
        ' them into the 3 input variables
        inum1 = txtInput1.Text
        inum2 = txtInput2.Text
        inum3 = txtInput3.Text

        ' Clear list box encase user wants to 
        ' repeat program without scrolling 
        ' down listbox.
        LstBoxResults.Items.Clear()

        ' Display numbers as user entered them
        ' seperated by comma
        LstBoxResults.Items.Add("Numbers in User Order:")
        LstBoxResults.Items.Add(inum1 & ", " & inum2 & ", " & inum3)
        LstBoxResults.Items.Add("") ' simply creates a space between answers

        ' Display Sum of users entered numbers
        LstBoxResults.Items.Add("Sum of numbers:") ' Displays to user
        LstBoxResults.Items.Add(inum1 + inum2 + inum3) ' does the math
        LstBoxResults.Items.Add("") ' simply creates a space between answers

        ' Display Average of numbers
        LstBoxResults.Items.Add("Average of Numbers:") ' Displays to user
        LstBoxResults.Items.Add((inum1 + inum2 + inum3) \ 3) ' does the math
        LstBoxResults.Items.Add("") ' simply creates a space between answers

        ' Display Product of numbers
        LstBoxResults.Items.Add("Product of numbers:") ' Displays to user
        LstBoxResults.Items.Add(inum1 * inum2 * inum3) ' Does the math
        LstBoxResults.Items.Add("") ' simply creates a space between answers

        ' Display Largest of the 3 numbers
        LstBoxResults.Items.Add("Largest of the 3:")
        max = inum1 ' Init variable mas a first number entered, the compare below...

        If inum2 > max Then
            max = inum2 ' inum2 greater than max, init max as inum2 (inum2 is smaller)
        End If

        If inum3 > max Then
            max = inum3 ' inum3 greater than max, init max as inum3 (inum3 is smaller)
        End If

        LstBoxResults.Items.Add(max)
        LstBoxResults.Items.Add("") ' simply creates a space between answers

        ' Display Smallest of the 3 numbers
        LstBoxResults.Items.Add("Smallest of the 3:")
        min = inum1 ' init min as inum1

        If inum2 < min Then
            min = inum2 ' inum2 less than min, init min as inum2 (inum2 is bigger)
        End If

        If inum3 < min Then
            min = inum3 ' inum3 less than min, init min as inum3 (inum3 is bigger)
        End If

        LstBoxResults.Items.Add(min) ' Display results of min
        LstBoxResults.Items.Add("") ' simply creates a space between answers

    End Sub

    ' Close/Exit the program
    Private Sub btnExit_Click(ByVal sender As System.Object, _
                              ByVal e As System.EventArgs) _
                              Handles btnExit.Click
        Close()

    End Sub



    Private Sub btnAbout_Click(sender As Object, _
                               e As EventArgs) _
                               Handles btnAbout.Click
        ' The below code hides the form content and 
        ' displays information about the programmer
        ' (when the user presses the "about" button)
        ' which happens to be me. For those who does
        ' not know me, I am a big deal around here..
        ' I mean, I didn't want to say nuthin.......

        ' Clear Form
        btnExe.Visible = False
        lblEnterNumbers.Visible = False
        lblInstruction.Visible = False
        txtInput1.Visible = False
        txtInput2.Visible = False
        txtInput3.Visible = False
        LstBoxResults.Visible = False

        ' About Programmer
        lblAbout.Visible = True

    End Sub

End Class

 

Today I received a phone call at 5:24PM (CST) from (281) 593-3503 showed up on caller ID as Cleveland, TX.

This is the 2nd call from this person, who had a strong foreign accent. The first time I received a call from him, I told him I wasn’t interested and hung up. This time I was bored, so decided to go along with him.

Here’s how the conversation went:

He started out by telling me he has been monitoring infected files on my computer. He then asked me is my computer connected to the internet.
I said yes.

He asked what I seen on my screen, I said google

He asked me to close the window and press <windows/flag> key and “R”, I complied.

Capture

 

 

 

 

 

He asked me what I saw, I told him the run screen.

He asked me to type “inf hiddenfiles” then asked me if I knew what it was, I said no. then pressed enter after he instructed me to.

This opened a window

Capture2

 

He then asked me if I knew what these files were, I said no.  He said that they were a list of infected files. These are infact driver information files (windows/inf)

Then then asked me to go to a website by way of <win/flag> + R (run command) ( http://rescue12.webs.com )

scam_site

 

 

 

 

 

 

Then he asked me to download teamviewer and install it on my computer.  Since There was no way  I was going to give him access to my computer, I went ahead and pulled the plug.

I asked him, since he seen infected files from my computer, what was the IP address of my computer.  He didn’t have an answer.  I then asked him who my ISP was, he didn’t have an answer… I figured I spent enough time of the phone with this idiot… so I told him I knew what he was up to and was reporting it to the authorities.  He said go ahead, then hung up.

Now, here’s some relevant data for us geeks:

Who is for the website hosting the probably viruses:

I’m not being paid to do this, so I’m not going to load the files and see what wireshark shows… and perhaps trace the IP, which I would assume would be in a foreign country.

Bottom line everyone… if someone sends you links and they don’t look right… double check before you give anyone remote access to your computer. It is extremely easy to gain prolong access to your computer if you just give me 10 secs of remote access to your computer. If you get a phone call from your ISP (cox or centurylink) then perhaps it may be a legitimate phone call, but VERIFY.

I also asked for a call back number, and he gave me: 201-234-4604, I did not try to call it.

Yet another year is about to pass, as such, so should the old look. I was going for a “paper” look, to match the “theme” I have for my main site. Doesn’t really match, but it will work.  It is my intention to write more in my blog in 2012.

I really hope 2012 to be a prosperous year for our family. We certainly need some prosperity! I will go back to school next month getting my computer certifications. North West Florida State College is my weapon of choice.  I should come out with Comptia A+, Security+, Linux+, and Network+ and a College Certificate in IT Technology.

Recently finished my degree, and have started studying for my A+ certification.  While finishing up my degree, I discovered that the Air Force will pay $4500 dollars to take classes for certifications.  Further research revealed that the Air Force offered free training CBT’s (Computer Based Training).  These CBT’s cover A+ and Network + just to cover a few.  My goal is to be certified on A+, Network+ and Security+ prior to me getting out of the Military in 4 years.  The only thing the Air Force will not pay for is the test fee’s.

Stumbled upon this cartoon:
Paper Airplanes

Thought this was hilarious!!!  Of course, since I’m not much of a C++ programmer, I would do something like this:

Sub airplanes()

Range("A1").Value = "I will not throw paper airplanes in class"
Range("A1").Copy
Range("A2:A500").PasteSpecial

End Sub

throw this in a spreadsheet then email it to the teacher!!! Ok, so this method wouldn’t be as cool as the pic, but it would work and save time! Wonder how you could do this in BASH…