Knowledge

Leecher (computing)

Source 📝

332:
player). This can be used as either a noun ("Player One is a loot ninja!") or a verb ("Player One keeps ninja'ing all the drops!"). However, a "ninja" may not necessarily be "leeching", in that they do sometimes contribute to the goal, "ninja" more applies towards a player claiming an item unfairly, either because the group agreed to pass the item to a particular player in advance, or by taking the item before the group can determine which player gets the item fairly through whichever process the group agreed upon (usually rolling for it, which is simulated in many MMOs through a "/random" or "/roll" command).
328:
being Power Leveled, due to the disparity between target mobs and the player), a higher level player may deliberately encourage the lower level player to "leech" to avoid wasted time spent protecting the lower level player that could otherwise be directed towards more quickly accomplishing the goal of earning experience points. However, this is usually an arrangement between friends or guild-mates, and unsolicited requests to "leech" experience off of a higher level player is often considered extremely rude.
339:" where a player uses an attack at the right moment to kill an enemy and take the experience benefit (XP), which may benefit the player or not. In some games, XP is granted to the person who deals a final shot to an enemy, or to who deals a significant amount of damage regardless of who hit it last. Kill stealing can in this fashion be applied as a reverse leeching: it prevents another player from gaining XP at all regardless of their effort. 440:
that the user has uploaded as much as they downloaded) in a BitTorrent client is considered a minimum in the etiquette of that network. In the terminology of these BitTorrent sites, a leech becomes a seeder (a provider of the file) when they have finished downloading and continue to run the client. They will remain a seeder until the file is removed or destroyed (settings enable the torrent to stop
242: 36: 439:
usually begin to upload files almost as soon as they have started to download them, such users are usually not freeloaders (people who don't upload data at all to the swarm). Therefore, this kind of leeching is considered to be a legitimate practice. Reaching an upload/download ratio of 1:1 (meaning
327:
is possible, a higher level player may deliberately consent to a lower leveled player gaining experience without assisting, usually due to the danger to the lower leveled player. In situations where the amount of assistance the lower level player can provide is negligible (as is often the case when
318:
In online multi-player games, "to leech" generally means that a player be present and qualify for the presentation of a reward of some sort, without contributing to the team effort needed to earn that reward. Although in the past the term "leeching" has been applied to a player gaining any benefit
451:
leechers are those running specially modified clients which avoid uploading data. This has led to the development of a multitude of technologies to ban such misbehaving clients. For example, on BitTorrent, most private trackers do keep track of the amount of data a client uploads or downloads to
331:
In popular MMORPG's the alternative way to refer to a "leecher" (especially one that is "leeching" items, as opposed to experience) has arisen as being "Ninja" (referring to the notional lightning reflexes needed to claim the reward between its appearance and its retrieval by the more deserving
164:
use according to etiquette: to wit, using too much of what is freely given without contributing a reasonable amount back to the community that provides it. The word is also used without any pejorative connotations, simply meaning to download large sets of information: for example the
144:
is one who benefits, usually deliberately, from others' information or effort but does not offer anything in return, or makes only token offerings in an attempt to avoid being called a leech. In economics, this type of behavior is called "free riding" and is associated with the
194:
leeches attach to open wireless networks without the owner's knowledge in order to access the Internet. One example of this is someone who connects to a café's free wireless service from their car in the parking lot in order to download large amounts of data.
212:-networks, leeching can be defined as behavior consisting of downloading more data, over time, than the individual is uploading to other clients, thus draining speed from the network. The term is used in a similar way for shared 205:(or hot-linking) is a form of bandwidth leeching that occurs when placing an unauthorized linked object, often an image, from one site in a web page belonging to a second site (the leech). 314:) the term "leech" is given to someone who avoids confrontation and sits out while another player fights and gains experience for the person, or "leecher", who is avoiding confrontation. 389:
Bandwidth leeching can be prevented by running an anti-leeching script on the website's server. It can automatically ban IPs that leech, or can redirect them to faulty files.
182:, an animal that sucks blood and then tries to leave unnoticed. Other terms are used, such as "freeloader", "mooch" and "sponge", but leech is the most commonly used. 420:, a leech is a user who disconnects as soon as they have a complete copy of a particular file, while minimizing or completely suppressing data upload. 357:
policy, which requires the upload of a certain amount for every amount downloaded. This continues to be found in the internet era, in systems such as
323:
without meaningful contribution. However, while this usually carries negative connotations, this is not always the case; for instance, in MMOs where
574: 537: 366:
Wi-Fi networks can implement various authentication and access control technologies in order to prevent leeching. The most common are client
263: 53: 289: 119: 100: 636: 631: 479:. But with rising downloads, uploads are still guaranteed, although few contributors in the system account for most services. 72: 267: 196: 57: 588:
leech mode is the jargon terminology for an access mode on an FTP site that allows the user to download any number of files
307: 79: 358: 501: 219:
Claiming credit for, or offering for sale, freely available content created and uploaded by others to the Internet (
86: 432: 209: 626: 375: 252: 68: 271: 256: 46: 506: 383: 475:
Leeching is often seen as a threat to peer-to-peer sharing and as the direct opposite of the practice of
399: 350: 150: 405: 527: 476: 441: 169: 488: 436: 424: 146: 93: 570: 533: 303: 564: 319:
due solely to the efforts of others, the term is now most often limited to players that gain
320: 461: 413: 324: 202: 153:
era, when it referred to users that would download files and upload nothing in return.
137: 620: 336: 611: 402: 17: 469: 453: 409: 367: 241: 172: 35: 457: 379: 371: 220: 465: 417: 224: 133: 529:
Steal this File Sharing Book: What They Won't Tell You about File Sharing
551:
Leech sites provide free, unlimited access to all the files you want.
496: 311: 166: 435:(which means they do not have the complete file yet). As BitTorrent 601:
Measuring Web Feature Impacts In Peer-To-Peer File Sharing Systems.
354: 353:
era of the 1980s and early 1990s, many systems have implemented a
191: 179: 444:
at a certain share ratio, or after X hours have passed seeding).
599:
Yang, S., Jin, H., Liao, X., Yao, H., Huang, Q., Tu, X. (2009).
235: 213: 29: 27:
One who benefits from others' effort, Without giving in return
468:) have been brought in place. Note that BitTorrent is not a 156:
Depending on context, leeching does not necessarily refer to
216:
directories. Mainly, leeching is taking without giving.
60:. Unsourced material may be challenged and removed. 160:use of computer resources, but often instead to 456:systems like DLP (Dynamic Leecher Protection) ( 472:, it is only a P2P file distribution system. 8: 603:Hushing University of Science and Technology 270:. Unsourced material may be challenged and 199:is a term used to describe this phenomenon. 302:In games (whether a traditional tabletop 290:Learn how and when to remove this message 120:Learn how and when to remove this message 518: 7: 268:adding citations to reliable sources 58:adding citations to reliable sources 431:is used for all users who are not 25: 240: 34: 45:needs additional citations for 452:avoid leeching, while on real 1: 149:. The term originated in the 502:Parasitism (social offense) 653: 178:The name derives from the 569:. Gale Group. p. 6. 566:World of Computer Science 464:) or uploader rewarding ( 563:Narins, Brigham (2002). 382:due to insecurity), and 376:Wired Equivalent Privacy 335:This is different from " 69:"Leecher" computing 637:Tragedy of the commons 632:Video game terminology 507:Tragedy of the commons 384:Wi-Fi Protected Access 370:authorization tables ( 398:Amongst users of the 151:bulletin board system 526:Wang, Wally (2004). 374:due to insecurity), 264:improve this section 136:and specifically in 54:improve this article 532:. No Starch Press. 489:Free-rider problem 425:BitTorrent tracker 147:free rider problem 576:978-0-7876-5067-4 539:978-1-59327-050-6 423:However, on most 403:file distribution 300: 299: 292: 130: 129: 122: 104: 18:Leech (computing) 16:(Redirected from 644: 604: 597: 591: 590: 585: 583: 560: 554: 553: 548: 546: 523: 458:eMule Xtreme Mod 427:sites, the term 295: 288: 284: 281: 275: 244: 236: 125: 118: 114: 111: 105: 103: 62: 38: 30: 21: 652: 651: 647: 646: 645: 643: 642: 641: 627:Computer jargon 617: 616: 612:Leech - Meaning 608: 607: 598: 594: 581: 579: 577: 562: 561: 557: 544: 542: 540: 525: 524: 520: 515: 485: 462:eDonkey network 414:eDonkey network 396: 346: 296: 285: 279: 276: 261: 245: 234: 188: 126: 115: 109: 106: 63: 61: 51: 39: 28: 23: 22: 15: 12: 11: 5: 650: 648: 640: 639: 634: 629: 619: 618: 615: 614: 606: 605: 592: 575: 555: 538: 517: 516: 514: 511: 510: 509: 504: 499: 494: 491: 484: 481: 447:The so-called 412:, such as the 395: 392: 391: 390: 387: 363: 362: 345: 342: 341: 340: 333: 329: 325:power leveling 298: 297: 280:September 2022 248: 246: 239: 233: 230: 229: 228: 217: 206: 203:Direct linking 200: 187: 184: 138:Internet slang 128: 127: 42: 40: 33: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 649: 638: 635: 633: 630: 628: 625: 624: 622: 613: 610: 609: 602: 596: 593: 589: 578: 572: 568: 567: 559: 556: 552: 541: 535: 531: 530: 522: 519: 512: 508: 505: 503: 500: 498: 495: 492: 490: 487: 486: 482: 480: 478: 473: 471: 467: 463: 459: 455: 450: 445: 443: 438: 434: 430: 426: 421: 419: 415: 411: 407: 404: 401: 393: 388: 385: 381: 377: 373: 369: 365: 364: 360: 356: 352: 348: 347: 343: 338: 337:kill stealing 334: 330: 326: 322: 317: 316: 315: 313: 309: 305: 294: 291: 283: 273: 269: 265: 259: 258: 254: 249:This section 247: 243: 238: 237: 231: 226: 222: 218: 215: 211: 207: 204: 201: 198: 193: 190: 189: 185: 183: 181: 176: 174: 171: 168: 163: 159: 154: 152: 148: 143: 139: 135: 124: 121: 113: 102: 99: 95: 92: 88: 85: 81: 78: 74: 71: –  70: 66: 65:Find sources: 59: 55: 49: 48: 43:This article 41: 37: 32: 31: 19: 600: 595: 587: 580:. Retrieved 565: 558: 550: 543:. Retrieved 528: 521: 474: 454:P2P networks 448: 446: 428: 422: 410:P2P networks 397: 394:P2P networks 301: 286: 277: 262:Please help 250: 197:Piggybacking 177: 161: 157: 155: 141: 131: 116: 110:January 2017 107: 97: 90: 83: 76: 64: 52:Please help 47:verification 44: 470:P2P network 408:and common 368:MAC address 173:NewsLeecher 621:Categories 513:References 493:LeechModem 400:BitTorrent 380:deprecated 372:deprecated 359:BitTorrent 349:Since the 344:Prevention 321:experience 310:, or even 221:Plagiarism 170:newsreader 80:newspapers 466:Gnutella2 418:Gnutella2 251:does not 225:Copyfraud 134:computing 483:See also 406:protocol 208:In most 186:Examples 477:seeding 442:seeding 437:clients 433:seeders 429:leecher 308:LARPing 272:removed 257:sources 158:illegal 94:scholar 582:6 June 573:  545:6 June 536:  497:Lurker 312:MMORPG 232:Gaming 167:Usenet 162:greedy 96:  89:  82:  75:  67:  355:ratio 192:Wi-Fi 180:leech 142:leech 101:JSTOR 87:books 584:2020 571:ISBN 547:2020 534:ISBN 255:any 253:cite 140:, a 73:news 449:bad 416:or 351:BBS 304:RPG 266:by 214:FTP 210:P2P 175:. 132:In 56:by 623:: 586:. 549:. 460:, 306:, 386:. 378:( 361:. 293:) 287:( 282:) 278:( 274:. 260:. 227:) 223:/ 123:) 117:( 112:) 108:( 98:· 91:· 84:· 77:· 50:. 20:)

Index

Leech (computing)

verification
improve this article
adding citations to reliable sources
"Leecher" computing
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
computing
Internet slang
free rider problem
bulletin board system
Usenet
newsreader
NewsLeecher
leech
Wi-Fi
Piggybacking
Direct linking
P2P
FTP
Plagiarism
Copyfraud

cite
sources

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.