Trusty Files : Personal , Private, Mobile, & Public File Sharing
Home Download Now Why TrustyFiles Software Help Tell a Friend Support Newsletter Links
Personal File Sharing Free Download
Software Help
Help Center
  Help Home
  Software Features
Personal File Sharing
Private File Sharing
Mobile File Sharing
Public File Sharing
Free and Legal Files
P2P links
Artists and Businesses
    Getting Started  
Startup and Home Page
Network Connection Guide
Search Entry
Search Results
Keyword Search Tips
Download Tips
Using Bit Torrent
    Sharing and More  
Sharing Files
My Files
Playing files
Free and Legal Files
P2P file links
Virus scanning
Problems? Start here
Bogus Files
P2P Connections
Startup and Operation
Download Tips
Windows XP SP2 Advisory
Advanced Networking
    Other links  
What's New: TrustyFiles user home page
Consumer Advisories
Child Protection Guide
Software License
P2P directory
  TrustyFiles user  photo

Blocklist Overview

TrustyFiles uses a Blocklist as a security measure to protect you from invasive users and bad files. Content owners, marketers, advertisers, and other users can capture your Internet address, monitor your activity, and insert bogus, misleading, and virus-infected files into the P2P networks. Review consumer P2P risks.

A blocklist contains the Internet (IP) addresses reported to be owned or used by such organizations. The TrustyFiles software blocks these addresses from running searches or downloading files from your computer. Suspicious organizations and Internet addresses regularly change. You should update your Blocklist regularly.

Blocklists are compiled by volunteers for different uses, such as P2P file sharing, web browsing, and general firewalls. TrustyFiles has no control over these sites and lists and cannot guarantee their accuracy or total security.

The use of a blocklist does not relieve you of your responsibility to use the software and network in a safe and legal manner.

Blocklist Manager

TrustyFiles 3.0 contains a blocklist manager with a default blocklist location. To update your blocklist:

  • Go to Tools > Preferences > Block List
  • Select 'Update'. Give the software up to 30 seconds to connect. If it doesn't connect, click Cancel.

If the update doesn't work, try the following in order.

1. Try Update 2 or 3 times. On occasion there may be a software or server error in connecting.

2. Verify the URL. Click 'Set Url'. The location should be as below. If it isn't, copy and paste the URL in the Set Url dialog box, click OK, and click Update to use the new URL.

The current URL is:


3. Use our archive URL. The direct URL is hosted on an external server we don't control. There may be times when the file is not available. We will occasionally archive the file on our servers. However the archive file will be updated only once a month or two. Update the blocklist archive URL as in step 2 above.

The archive URL is:


4. Manually update the blocklist. Use Manual Update for a custom blocklist, to get the latest blocklist if the current blocklist URL does not work, or as a last resort if step 3 doesn't work.

  1. Create a blocklist per the format below or download and unzip the blocklist zip file.
  2. Rename the file to Blocklist.dat.
  3. Make sure TrustyFiles is shut down.
  4. Copy or move the file to c:\Progam Files\TrustyFiles\Data\Blocklist.dat

Blocklist Format and Location

The TrustyFiles Blocklist is stored at c:\Progam Files\TrustyFiles\Data\Blocklist.dat (or the appropriate directory if you changed the Program directory). The file uses Peer Guardian format (note this is changed from TrustyFiles 2.4). Here's an example entry line:

General Blocklist Updating

Blocklists may not be totally accurate, current, or available. You should update your Blocklist regularly.

Any changes you've made to your current blocklist WILL BE LOST upon update You should manually record any changes so you can re-enter them after update.

Recommend Links

Bluetack. An extensive Internet security portal with blocklist files, sources, online converter, software, and forum.

  DiaRIAA Privacy and Security Guide. Includes links to Articles, Lawsuits: How to Avoid & What To Do, The EFF, and Privacy Companies and Sites.
Use > HomeHow TrustyFiles can help youPersonalPrivatePublicArtists
Product > Download Software FAQs Support Newsletter
Links > TopP2P file links
Corporate > About Artists & Distributors Press Link to Us Contacts
Legal > Content Advisory Your Privacy Terms of Use

TrustyFiles searches for files from users with eDonkey, eMule, Bit Torrent, Bit Comet, Morpheus, Limewire, Bearshare, Shareaza, Kazaa, Grokster, and iMesh P2P software, as well as other compatible software on the eDonkey, Overnet, Bit Torrent, Gnutella, Gnutella 2, and Kazaa/Fast Track networks.

TrustyFiles can start a P2P download from web sites or anyplace with Magnet, ED2K, and Sig2dat Links.

TrustyFiles, TrustyFiles Pro, Ultimate P2P, TrustyDownload, TopP2P, P2PFiles, P2P It!, Got Files?, and The RazorPop Network are trademarks of RazorPop, Inc. Copyright 2003-5 RazorPop, Inc. All Rights Reserved.