HOME

TheInfoList



OR:

In
computing Computing is any goal-oriented activity requiring, benefiting from, or creating computing machinery. It includes the study and experimentation of algorithmic processes, and development of both hardware and software. Computing has scientific, e ...
and specifically in
Internet slang Internet slang (also called Internet shorthand, cyber-slang, netspeak, digispeak or chatspeak) is a non-standard or unofficial form of language used by people on the Internet to communicate to one another. An example of Internet slang is "LOL" m ...
, a leech is one who benefits, usually deliberately, from others' information or effort but does not offer anything in return, or makes only token offerings in an attempt to avoid being called a leech. In economics, this type of behavior is called "free riding" and is associated with the
free rider problem In the social sciences, the free-rider problem is a type of market failure that occurs when those who benefit from resources, public goods (such as public roads or public library), or services of a communal nature do not pay for them or under-p ...
. The term originated in the
bulletin board system A bulletin board system (BBS), also called computer bulletin board service (CBBS), is a computer server running software that allows users to connect to the system using a terminal program. Once logged in, the user can perform functions such as ...
era, when it referred to users that would download files and upload nothing in return. Depending on context, leeching does not necessarily refer to ''illegal'' use of computer resources, but often instead to ''greedy'' use according to etiquette: to wit, using too much of what is freely given without contributing a reasonable amount back to the community that provides it. The word is also used without any pejorative connotations, simply meaning to download large sets of information: for example the
offline reader An offline reader (sometimes called an offline browser or offline navigator) is computer software that downloads e-mail, newsgroup posts or web pages, making them available when the computer is offline: not connected to a server. Offline readers ...
br>Leech
the
Usenet Usenet () is a worldwide distributed discussion system available on computers. It was developed from the general-purpose Unix-to-Unix Copy (UUCP) dial-up network architecture. Tom Truscott and Jim Ellis conceived the idea in 1979, and it was ...
newsreader NewsLeecher, the audio recording softwar
SoundLeech
o
LeechPOP
a utility to download attachments from
POP3 In computing, the Post Office Protocol (POP) is an application-layer Internet standard protocol used by e-mail clients to retrieve e-mail from a mail server. POP version 3 (POP3) is the version in common use, and along with IMAP the most common p ...
mailboxes. The name derives from the
leech Leeches are segmented parasitic or predatory worms that comprise the subclass Hirudinea within the phylum Annelida. They are closely related to the oligochaetes, which include the earthworm, and like them have soft, muscular segmented bodie ...
, an animal that sucks blood and then tries to leave unnoticed. Other terms are used, such as "freeloader", "mooch" and "sponge", but leech is the most commonly used.


Examples

*
Wi-Fi Wi-Fi () is a family of wireless network protocols, based on the IEEE 802.11 family of standards, which are commonly used for local area networking of devices and Internet access, allowing nearby digital devices to exchange data by radio wave ...
leeches attach to open wireless networks without the owner's knowledge in order to access the Internet. One example of this is someone who connects to a café's free wireless service from their car in the parking lot in order to download large amounts of data. Piggybacking is a term used to describe this phenomenon. * Direct linking (or hot-linking) is a form of bandwidth leeching that occurs when placing an unauthorized linked object, often an image, from one site in a web page belonging to a second site (the leech). * In most
P2P P2P may refer to: * Pay to play, where money is exchanged for services * Peer-to-peer, a distributed application architecture in computing or networking ** List of P2P protocols * Phenylacetone, an organic compound commonly known as P2P * Poin ...
-networks, leeching can be defined as behavior consisting of downloading more data, over time, than the individual is uploading to other clients, thus draining speed from the network. The term is used in a similar way for shared
FTP The File Transfer Protocol (FTP) is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network. FTP is built on a client–server model architecture using separate control and data ...
directories. Mainly, leeching is taking without giving. * Claiming credit for, or offering for sale, freely available content created and uploaded by others to the Internet (
Plagiarism Plagiarism is the fraudulent representation of another person's language, thoughts, ideas, or expressions as one's own original work.From the 1995 '' Random House Compact Unabridged Dictionary'': use or close imitation of the language and thought ...
/
Copyfraud A copyfraud is a false copyright claim by an individual or institution with respect to content that is in the public domain. Such claims are wrongful, at least under US and Australian copyright law, because material that is not copyrighted is f ...
)


Gaming

In games (whether a traditional tabletop RPG, LARPing, or even
MMORPG A massively multiplayer online role-playing game (MMORPG) is a video game that combines aspects of a role-playing video game and a massively multiplayer online game. As in role-playing games (RPGs), the player assumes the role of a Player charac ...
) the term "leech" is given to someone who avoids confrontation and sits out while another player fights and gains experience for the person, or "leecher", who is avoiding confrontation. * In online multi-player games, "to leech" generally means that a player be present and qualify for the presentation of a reward of some sort, without contributing to the team effort needed to earn that reward. Although in the past the term "leeching" has been applied to a player gaining any benefit due solely to the efforts of others, the term is now most often limited to players that gain
experience Experience refers to conscious events in general, more specifically to perceptions, or to the practical knowledge and familiarity that is produced by these conscious processes. Understood as a conscious event in the widest sense, experience involv ...
without meaningful contribution. However, while this usually carries negative connotations, this is not always the case; for instance, in MMOs where
power leveling An experience point (often abbreviated as exp or XP) is a unit of measurement used in some tabletop role-playing games (RPGs) and role-playing video games to quantify a player character's life experience and progression through the game. Experien ...
is possible, a higher level player may deliberately consent to a lower leveled player gaining experience without assisting, usually due to the danger to the lower leveled player. In situations where the amount of assistance the lower level player can provide is negligible (as is often the case when being Power Leveled, due to the disparity between target mobs and the player), a higher level player may deliberately encourage the lower level player to "leech" to avoid wasted time spent protecting the lower level player that could otherwise be directed towards more quickly accomplishing the goal of earning experience points. However, this is usually an arrangement between friends or guild-mates, and unsolicited requests to "leech" experience off of a higher level player is often considered extremely rude. * In popular MMORPG's the alternative way to refer to a "leecher" (especially one that is "leeching" items, as opposed to experience) has arisen as being "Ninja" (referring to the notional lightning reflexes needed to claim the reward between its appearance and its retrieval by the more deserving player). This can be used as either a noun ("Player One is a loot ninja!") or a verb ("Player One keeps ninja'ing all the drops!"). However, a "ninja" may not necessarily be "leeching", in that they do sometimes contribute to the goal, "ninja" more applies towards a player claiming an item unfairly, either because the group agreed to pass the item to a particular player in advance, or by taking the item before the group can determine which player gets the item fairly through whichever process the group agreed upon (usually rolling for it, which is simulated in many MMOs through a "/random" or "/roll" command). * This is different from "killstealing" where a player uses an attack at the right moment to kill an enemy and take the experience benefit (XP), which may benefit the player or not. In some games, XP is granted to the person who deals a final shot to an enemy, or to who deals a significant amount of damage regardless of who hit it last. Killstealing can in this fashion be applied as a reverse leeching: it prevents another player from gaining XP at all regardless of their effort.


Prevention

* Since the
BBS BBS may refer to: Ammunition * BBs, BB gun metal bullets * BBs, airsoft gun plastic pellets Computing and gaming * Bulletin board system, a computer server users dial into via dial-up or telnet; precursor to the Internet * BIOS Boot Specificat ...
era of the 1980s and early 1990s, many systems have implemented a
ratio In mathematics, a ratio shows how many times one number contains another. For example, if there are eight oranges and six lemons in a bowl of fruit, then the ratio of oranges to lemons is eight to six (that is, 8:6, which is equivalent to the ...
policy, which requires the upload a certain amount for every amount downloaded. This continues to be found in the internet era, in systems such as BitTorrent. * Wi-Fi networks can implement various authentication and access control technologies in order to prevent leeching. The most common are client
MAC address A media access control address (MAC address) is a unique identifier assigned to a network interface controller (NIC) for use as a network address in communications within a network segment. This use is common in most IEEE 802 networking techno ...
authorization tables (
deprecated In several fields, especially computing, deprecation is the discouragement of use of some terminology, feature, design, or practice, typically because it has been superseded or is no longer considered efficient or safe, without completely removing ...
due to insecurity),
Wired Equivalent Privacy Wired Equivalent Privacy (WEP) was a security algorithm for 802.11 wireless networks. Introduced as part of the original IEEE 802.11 standard ratified in 1997, its intention was to provide data confidentiality comparable to that of a traditional wi ...
(
deprecated In several fields, especially computing, deprecation is the discouragement of use of some terminology, feature, design, or practice, typically because it has been superseded or is no longer considered efficient or safe, without completely removing ...
due to insecurity), and
Wi-Fi Protected Access Wi-Fi Protected Access (WPA), Wi-Fi Protected Access II (WPA2), and Wi-Fi Protected Access 3 (WPA3) are the three security and security certification programs developed after 2000 by the Wi-Fi Alliance to secure wireless computer networks. The All ...
. * Bandwidth leeching can be prevented by running an anti-leeching script on the website's server. It can automatically ban IPs that leech, or can redirect them to faulty files.


P2P networks

Amongst users of the BitTorrent file distribution
protocol Protocol may refer to: Sociology and politics * Protocol (politics), a formal agreement between nation states * Protocol (diplomacy), the etiquette of diplomacy and affairs of state * Etiquette, a code of personal behavior Science and technolog ...
and common
P2P network Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network. They are said to form a peer-to-peer n ...
s, such as the eDonkey network or
Gnutella2 Gnutella2, often referred to as G2, is a peer-to-peer protocol developed mainly by Michael Stokes and released in 2002. While inspired by the gnutella protocol, G2 shares little of its design with the exception of its connection handshake and ...
, a leech is a user who disconnects as soon as they have a complete copy of a particular file, while minimizing or completely suppressing data upload. However, on most BitTorrent tracker sites, the term ''leecher'' is used for all users who are not seeders (which means they do not have the complete file yet). As BitTorrent clients usually begin to upload files almost as soon as they have started to download them, such users are usually not freeloaders (people who don't upload data at all to the swarm). Therefore, this kind of leeching is considered to be a legitimate practice. Reaching an upload/download ratio of 1:1 (meaning that the user has uploaded as much as they downloaded) in a BitTorrent client is considered a minimum in the etiquette of that network. In the terminology of these BitTorrent sites, a leech becomes a seeder (a provider of the file) when they have finished downloading and continue to run the client. They will remain a seeder until the file is removed or destroyed (settings enable the torrent to stop
seeding The term seeding and related terms such as seeded are used in several different contexts: *Sowing, planting seeds in a place or on an object *Cloud seeding, manipulating cloud formations *Seeding (computing), a concept in computing and peer-to-pee ...
at a certain share ratio, or after X hours have passed seeding). The so-called ''bad'' leechers are those running specially modified clients which avoid uploading data. This has led to the development of a multitude of technologies to ban such misbehaving clients. For example, on BitTorrent, most private trackers do keep track of the amount of data a client uploads or downloads to avoid leeching, while on real
P2P network Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network. They are said to form a peer-to-peer n ...
s systems like DLP (Dynamic Leecher Protection) (
eMule Xtreme Mod eMule is a free peer-to-peer file sharing application for Microsoft Windows. Started in May 2002 as an alternative to eDonkey2000, eMule now connects to both the eDonkey network and the Kad network. The distinguishing features of eMule are ...
, eDonkey network) or uploader rewarding (
Gnutella2 Gnutella2, often referred to as G2, is a peer-to-peer protocol developed mainly by Michael Stokes and released in 2002. While inspired by the gnutella protocol, G2 shares little of its design with the exception of its connection handshake and ...
) have been brought in place. Note that BitTorrent is not a
P2P network Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network. They are said to form a peer-to-peer n ...
, it is only a P2P file distribution system. Leeching is often seen as a threat to peer-to-peer sharing and as the direct opposite of the practice of
seeding The term seeding and related terms such as seeded are used in several different contexts: *Sowing, planting seeds in a place or on an object *Cloud seeding, manipulating cloud formations *Seeding (computing), a concept in computing and peer-to-pee ...
. But with rising downloads, uploads are still guaranteed, although few contributors in the system account for most services.Yang, S., Jin, H., Liao, X., Yao, H., Huang, Q., Tu, X. (2009). ''Measuring Web Feature Impacts In Peer-To-Peer File Sharing Systems.'' Hushing University of Science and Technology


See also

*
Free-rider problem In the social sciences, the free-rider problem is a type of market failure that occurs when those who benefit from resources, public goods (such as public roads or public library), or services of a communal nature do not pay for them or under-p ...
* LeechModem *
Lurker In Internet culture, a lurker is typically a member of an online community who observes, but does not participate. The exact definition depends on context. Lurkers make up a large proportion of all users in online communities. Lurking allows use ...
*
Parasitism (social offense) Social parasitism was a political crime in the Soviet Union in which the perpetrator was accused of living at the expense of other people or society. A number of Soviet intellectuals and dissidents were accused of the crime of parasitism, includi ...
*
Tragedy of the commons Tragedy (from the grc-gre, τραγῳδία, ''tragōidia'', ''tragōidia'') is a genre of drama based on human suffering and, mainly, the terrible or sorrowful events that befall a main character. Traditionally, the intention of tragedy ...


References

{{reflist Computer jargon Video game gameplay Tragedy of the commons
Leech - Meaning