SlideShare une entreprise Scribd logo
1  sur  11
LimeWire is a free peer-to-peer file sharing (P2P)
client program that runs on Windows, Mac OS X,
Linux, and other operating systems supported by the
Java software platform.LimeWire uses the gnutella
network as well as the BitTorrent protocol. A free
software version and a purchasable "enhanced"
version are available. The software is developed by
Lime Wire LLC, which is a subsidiary of Lime Group.
BitTorrent support is provided by libtorrent.
Creator Mark Gorton
Developer(s) Lime Wire LLC
Initial release May 29, 2000; 10 years ago (2000-05-29)
Discontinued 5.5.16 / September 30, 2010; 46 days
ago (2010-09-30)
Preview release 5.6.1 / May 7, 2010; 6 months ago (2010-05-
07)
Written in Java Platform Cross-platform
 Available in 31 languages
 Type Peer-to-peer file sharing
License GNU General Public License
Website LimeWire.com
Types of music available
Limewire’s target audience.
The target audience for limewire is mainly teenagers.
As the tend to download music. However limewire
can also be used for different purposes, so this also
attract a wider target audience from different age
groups. These purposes include programs such as
“cracked” versions of photoshop and other programs.
Advantages/ Features of using the
site.
 Ease of use. Just install, run, and search.
 Ability to search by artist, title, genre, or other meta-information.
 Elegant multiple search tabbed interface.
 "Swarm" downloads from multiple hosts help you get files faster.
 iTunes integration for Mac users.
 Unique "ultrapeer" technology reduces bandwidth requirements for most
users.
 Integrated chat.
 Browse host feature. Even works through firewalls.
 Added Bitzi metadata lookup.
 International versions: Now available in many new languages.
 Connects to the network using GWebCache, a distributed connection system.
 Automatic local network searches for lightning-fast downloads. If you're on
a corporate or university network, download files from other users on the
same network almost instantaneously!
 Support for MAGNET links that allow you to click on web page links that
access Gnutella
Disadvantages of using the site.
Copyright Infringement
The biggest drawback to P2P file sharing is the ability to break the law
and commit copyright infringement. For owners of intellectual
property, P2P file sharing sites are a nightmare.
Legitimate P2P companies place a disclaimer on the software to inform
people of copyright laws, reasons why the theft of intellectual
property is wrong and why the website does not endorse or
recommend engaging in illegal copyright infringement.
That being said, the reality of it is many people still commit copyright
infringement by exchanging movies, songs, games and other
copyrighted properties. It is important to understand that P2P
software and technology isn't what's illegal, but exchanging
copyrighted files and property is against the law. The drawback is the
software is the tool that enables this to occur and has become a large
controversial issue.
Malware
Unfortunately some P2P software comes with a bundle of
spyware and adware which takes residence in your
computer. Additionally there is always a risk of
downloading viruses or Trojans from other users.
Not everyone who engages in P2P file sharing is honorable
and some may use the interface for the purpose of
spreading nasty bugs to the computers of others. Before
using P2P it is of value to understand safe computer
practices and some of the potential risks that occur when
downloading. A good firewall and virus scanner that is
kept up to date is a must.
Advertisements
To use P2P websites users are prompted to download
the necessary software. One consideration is free vs.
paid software. Free versions will not cost any money
to download or install however they often come with
flashing ads and other annoying advertisements. This
may not be appealing to all users and some may
prefer to pay a bit of money to download software
that does not contain advertisements.
Trust Strangers
Most websites do not police the content that streams through P2P
and have no central location to store files that have been
checked for being illegal or virus-ridden. The weight falls on
users to decide and for those who aren't versed in copyright law
or risky computing this can be problematic.
P2P is legitimate software and serves a good purpose when used
properly, and as time goes on, the value of this technology
proves itself in both the business and social environment. Many
companies have recognized the value of P2P and have
integrated it into their workplaces.
That being said, unfortunately there is an entire culture that
abuses the technology in order to exploit both the law and
other people. This factor is the primarily cause for the biggest
disadvantages of P2P file sharing.
How the site markets itself.
The site is now shut down so there no information.
On May 12, 2010, Judge Kimba M. Wood of the United States District
Court ruled that LimeWire and its creator, Mark Gorton, had
committed copyright infringement, engaged in unfair competition,
and induced others to commit copyright infringement.[
On October
26, 2010, LimeWire was ordered to disable the "searching,
downloading, uploading, file trading and/or file distribution
functionality" after losing a court battle with the RIAA over claims of
copyright infringement. The RIAA also announced intentions to
pursue legal action over the damages caused by the program in
January to compensate the affected record labels. In retaliation, the
RIAA's website was taken offline on October 29 via denial-of-service
attacks executed by members of Operation Payback and Anonymous.
In response to the ruling, a company spokesperson said that the
company is not shutting down, but will be using its "best efforts" to
cease distributing and supporting P2P software

Contenu connexe

Tendances

Tendances (20)

Web1, web2 and web 3
Web1, web2 and web 3Web1, web2 and web 3
Web1, web2 and web 3
 
Web 1.0 2.0-3.0-4.0 Overview
Web 1.0 2.0-3.0-4.0 OverviewWeb 1.0 2.0-3.0-4.0 Overview
Web 1.0 2.0-3.0-4.0 Overview
 
Web 3.0
Web 3.0Web 3.0
Web 3.0
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
 
Sopa pipa.key
Sopa pipa.keySopa pipa.key
Sopa pipa.key
 
Evolution of the World Wide Web
Evolution of the World Wide Web Evolution of the World Wide Web
Evolution of the World Wide Web
 
P2P Capstone
P2P CapstoneP2P Capstone
P2P Capstone
 
Computer Assignment Topic-Internet
Computer Assignment Topic-Internet Computer Assignment Topic-Internet
Computer Assignment Topic-Internet
 
Net nutrality
Net nutralityNet nutrality
Net nutrality
 
Internet and its uses
Internet and its usesInternet and its uses
Internet and its uses
 
Digital Literacy: Internet Misconceptions
Digital Literacy: Internet MisconceptionsDigital Literacy: Internet Misconceptions
Digital Literacy: Internet Misconceptions
 
Lesson 1: Intoduction to ICT
Lesson 1: Intoduction to ICTLesson 1: Intoduction to ICT
Lesson 1: Intoduction to ICT
 
IT in Business - Digital Piracy
IT in Business - Digital PiracyIT in Business - Digital Piracy
IT in Business - Digital Piracy
 
RIM On The Social Side
RIM On The Social SideRIM On The Social Side
RIM On The Social Side
 
History of internet
History of internetHistory of internet
History of internet
 
Polinter08
Polinter08Polinter08
Polinter08
 
SOPA 4 dummies
SOPA 4 dummiesSOPA 4 dummies
SOPA 4 dummies
 
2008 Online Piracy Trends
2008 Online Piracy Trends2008 Online Piracy Trends
2008 Online Piracy Trends
 
Copyright And Piracy
Copyright And PiracyCopyright And Piracy
Copyright And Piracy
 
World Wide Web and Internet
World Wide Web and InternetWorld Wide Web and Internet
World Wide Web and Internet
 

En vedette

Gcse contolled assessment radio tv news
Gcse contolled assessment radio tv newsGcse contolled assessment radio tv news
Gcse contolled assessment radio tv newsGraveney School
 
Conventions of radio news irene
Conventions of radio news ireneConventions of radio news irene
Conventions of radio news irenehaverstockmedia
 
Audiences
AudiencesAudiences
Audienceswmorris
 
Music Industry Audience Revision
Music Industry  Audience  RevisionMusic Industry  Audience  Revision
Music Industry Audience Revisionwmorris
 
Music industy and new media
Music industy and new mediaMusic industy and new media
Music industy and new mediaAlicia Cagle
 
Codes and conventions of the local radio news
Codes and conventions of the local radio newsCodes and conventions of the local radio news
Codes and conventions of the local radio newsellierogan
 
Tv news study guide
Tv news study guideTv news study guide
Tv news study guiderockinmole
 
A2 Media Music Industry & Digital Technology
A2 Media Music Industry & Digital TechnologyA2 Media Music Industry & Digital Technology
A2 Media Music Industry & Digital Technologyiangbland
 
GCSE Media Studies - Introduction to Television News
GCSE Media Studies - Introduction to Television NewsGCSE Media Studies - Introduction to Television News
GCSE Media Studies - Introduction to Television NewsMs Walters
 
conventions of a news show
conventions of a news showconventions of a news show
conventions of a news showteddiebmxa
 
Writing a radio script
Writing a radio scriptWriting a radio script
Writing a radio scriptDavid Brewer
 
Example radio script
Example radio scriptExample radio script
Example radio scriptISM
 
B322 GCSE Media Exam Revision Session
B322 GCSE Media Exam Revision SessionB322 GCSE Media Exam Revision Session
B322 GCSE Media Exam Revision Sessionrhughes82
 

En vedette (14)

Gcse contolled assessment radio tv news
Gcse contolled assessment radio tv newsGcse contolled assessment radio tv news
Gcse contolled assessment radio tv news
 
Conventions of radio news irene
Conventions of radio news ireneConventions of radio news irene
Conventions of radio news irene
 
Audiences
AudiencesAudiences
Audiences
 
Music Industry Audience Revision
Music Industry  Audience  RevisionMusic Industry  Audience  Revision
Music Industry Audience Revision
 
Music industy and new media
Music industy and new mediaMusic industy and new media
Music industy and new media
 
Codes and conventions of the local radio news
Codes and conventions of the local radio newsCodes and conventions of the local radio news
Codes and conventions of the local radio news
 
Tv news study guide
Tv news study guideTv news study guide
Tv news study guide
 
A2 Media Music Industry & Digital Technology
A2 Media Music Industry & Digital TechnologyA2 Media Music Industry & Digital Technology
A2 Media Music Industry & Digital Technology
 
GCSE Media Studies - Introduction to Television News
GCSE Media Studies - Introduction to Television NewsGCSE Media Studies - Introduction to Television News
GCSE Media Studies - Introduction to Television News
 
Radio news conventions
Radio news conventionsRadio news conventions
Radio news conventions
 
conventions of a news show
conventions of a news showconventions of a news show
conventions of a news show
 
Writing a radio script
Writing a radio scriptWriting a radio script
Writing a radio script
 
Example radio script
Example radio scriptExample radio script
Example radio script
 
B322 GCSE Media Exam Revision Session
B322 GCSE Media Exam Revision SessionB322 GCSE Media Exam Revision Session
B322 GCSE Media Exam Revision Session
 

Similaire à Limewire

Similaire à Limewire (20)

Legal issues in p2 p sharing and bittorent
Legal issues in p2 p sharing and bittorentLegal issues in p2 p sharing and bittorent
Legal issues in p2 p sharing and bittorent
 
Bit Torrent presentation
Bit Torrent presentationBit Torrent presentation
Bit Torrent presentation
 
Gruop 1
Gruop 1 Gruop 1
Gruop 1
 
Bittorrent - Piracy Sailing on Web 2.0
Bittorrent - Piracy Sailing on Web 2.0Bittorrent - Piracy Sailing on Web 2.0
Bittorrent - Piracy Sailing on Web 2.0
 
Bit torrent documentation
Bit torrent documentationBit torrent documentation
Bit torrent documentation
 
Intellectual Property Rights And The Internet
Intellectual Property Rights And The InternetIntellectual Property Rights And The Internet
Intellectual Property Rights And The Internet
 
Intellectual Property Rights And The Internet
Intellectual Property Rights And The InternetIntellectual Property Rights And The Internet
Intellectual Property Rights And The Internet
 
Intellectual Property Rights And The Internet
Intellectual Property Rights And The InternetIntellectual Property Rights And The Internet
Intellectual Property Rights And The Internet
 
Software piracy and copyright infringement
Software piracy and copyright infringementSoftware piracy and copyright infringement
Software piracy and copyright infringement
 
read below.docx
read below.docxread below.docx
read below.docx
 
Innovation Case Study BitTorrent
Innovation Case Study BitTorrentInnovation Case Study BitTorrent
Innovation Case Study BitTorrent
 
P2p networks
P2p networksP2p networks
P2p networks
 
Polinter10
Polinter10Polinter10
Polinter10
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
U torrent as a P2P application.pdf
U torrent as a P2P application.pdfU torrent as a P2P application.pdf
U torrent as a P2P application.pdf
 
Peer to Peer networks and piracy
Peer to Peer networks and piracyPeer to Peer networks and piracy
Peer to Peer networks and piracy
 
Essay On Piracy
Essay On PiracyEssay On Piracy
Essay On Piracy
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Make useof file-sharing
Make useof file-sharingMake useof file-sharing
Make useof file-sharing
 
L I M E W I R E
L I M E W I R EL I M E W I R E
L I M E W I R E
 

Plus de wmorris

Social Implications
Social Implications Social Implications
Social Implications wmorris
 
Synergy revision 10
Synergy revision 10Synergy revision 10
Synergy revision 10wmorris
 
Synergy revision
Synergy revisionSynergy revision
Synergy revisionwmorris
 
Synergy revision
Synergy revisionSynergy revision
Synergy revisionwmorris
 
Sony qriocity by anand, neha, urvi and samantha
Sony qriocity by anand, neha, urvi and samanthaSony qriocity by anand, neha, urvi and samantha
Sony qriocity by anand, neha, urvi and samanthawmorris
 
Spotify presentation
Spotify presentationSpotify presentation
Spotify presentationwmorris
 
Narrative theories
Narrative theoriesNarrative theories
Narrative theorieswmorris
 
Gender representation
Gender representationGender representation
Gender representationwmorris
 
Postmodernism
PostmodernismPostmodernism
Postmodernismwmorris
 
Lesson 01 yr12 a2
Lesson 01 yr12 a2Lesson 01 yr12 a2
Lesson 01 yr12 a2wmorris
 
Marxist approach to music videos
Marxist approach to music videosMarxist approach to music videos
Marxist approach to music videoswmorris
 
Questionnaire Results1
Questionnaire Results1Questionnaire Results1
Questionnaire Results1wmorris
 
Questionnaire Results
Questionnaire ResultsQuestionnaire Results
Questionnaire Resultswmorris
 
My Space Powerpoint
My Space PowerpointMy Space Powerpoint
My Space Powerpointwmorris
 
Presentation1 [Recovered]
Presentation1 [Recovered]Presentation1 [Recovered]
Presentation1 [Recovered]wmorris
 
Hardware Revision
Hardware RevisionHardware Revision
Hardware Revisionwmorris
 

Plus de wmorris (20)

Social Implications
Social Implications Social Implications
Social Implications
 
Synergy revision 10
Synergy revision 10Synergy revision 10
Synergy revision 10
 
Synergy revision
Synergy revisionSynergy revision
Synergy revision
 
Synergy revision
Synergy revisionSynergy revision
Synergy revision
 
Me pre
Me preMe pre
Me pre
 
Me pre
Me preMe pre
Me pre
 
Sony qriocity by anand, neha, urvi and samantha
Sony qriocity by anand, neha, urvi and samanthaSony qriocity by anand, neha, urvi and samantha
Sony qriocity by anand, neha, urvi and samantha
 
Spotify presentation
Spotify presentationSpotify presentation
Spotify presentation
 
Narrative theories
Narrative theoriesNarrative theories
Narrative theories
 
Gender representation
Gender representationGender representation
Gender representation
 
Postmodernism
PostmodernismPostmodernism
Postmodernism
 
Lesson 01 yr12 a2
Lesson 01 yr12 a2Lesson 01 yr12 a2
Lesson 01 yr12 a2
 
Marxist approach to music videos
Marxist approach to music videosMarxist approach to music videos
Marxist approach to music videos
 
Questionnaire Results1
Questionnaire Results1Questionnaire Results1
Questionnaire Results1
 
Questionnaire Results
Questionnaire ResultsQuestionnaire Results
Questionnaire Results
 
Lastfm
LastfmLastfm
Lastfm
 
My Space Powerpoint
My Space PowerpointMy Space Powerpoint
My Space Powerpoint
 
Presentation1 [Recovered]
Presentation1 [Recovered]Presentation1 [Recovered]
Presentation1 [Recovered]
 
Double
DoubleDouble
Double
 
Hardware Revision
Hardware RevisionHardware Revision
Hardware Revision
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Dernier (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Limewire

  • 1.
  • 2. LimeWire is a free peer-to-peer file sharing (P2P) client program that runs on Windows, Mac OS X, Linux, and other operating systems supported by the Java software platform.LimeWire uses the gnutella network as well as the BitTorrent protocol. A free software version and a purchasable "enhanced" version are available. The software is developed by Lime Wire LLC, which is a subsidiary of Lime Group. BitTorrent support is provided by libtorrent.
  • 3. Creator Mark Gorton Developer(s) Lime Wire LLC Initial release May 29, 2000; 10 years ago (2000-05-29) Discontinued 5.5.16 / September 30, 2010; 46 days ago (2010-09-30) Preview release 5.6.1 / May 7, 2010; 6 months ago (2010-05- 07) Written in Java Platform Cross-platform  Available in 31 languages  Type Peer-to-peer file sharing License GNU General Public License Website LimeWire.com
  • 4. Types of music available
  • 5. Limewire’s target audience. The target audience for limewire is mainly teenagers. As the tend to download music. However limewire can also be used for different purposes, so this also attract a wider target audience from different age groups. These purposes include programs such as “cracked” versions of photoshop and other programs.
  • 6. Advantages/ Features of using the site.  Ease of use. Just install, run, and search.  Ability to search by artist, title, genre, or other meta-information.  Elegant multiple search tabbed interface.  "Swarm" downloads from multiple hosts help you get files faster.  iTunes integration for Mac users.  Unique "ultrapeer" technology reduces bandwidth requirements for most users.  Integrated chat.  Browse host feature. Even works through firewalls.  Added Bitzi metadata lookup.  International versions: Now available in many new languages.  Connects to the network using GWebCache, a distributed connection system.  Automatic local network searches for lightning-fast downloads. If you're on a corporate or university network, download files from other users on the same network almost instantaneously!  Support for MAGNET links that allow you to click on web page links that access Gnutella
  • 7. Disadvantages of using the site. Copyright Infringement The biggest drawback to P2P file sharing is the ability to break the law and commit copyright infringement. For owners of intellectual property, P2P file sharing sites are a nightmare. Legitimate P2P companies place a disclaimer on the software to inform people of copyright laws, reasons why the theft of intellectual property is wrong and why the website does not endorse or recommend engaging in illegal copyright infringement. That being said, the reality of it is many people still commit copyright infringement by exchanging movies, songs, games and other copyrighted properties. It is important to understand that P2P software and technology isn't what's illegal, but exchanging copyrighted files and property is against the law. The drawback is the software is the tool that enables this to occur and has become a large controversial issue.
  • 8. Malware Unfortunately some P2P software comes with a bundle of spyware and adware which takes residence in your computer. Additionally there is always a risk of downloading viruses or Trojans from other users. Not everyone who engages in P2P file sharing is honorable and some may use the interface for the purpose of spreading nasty bugs to the computers of others. Before using P2P it is of value to understand safe computer practices and some of the potential risks that occur when downloading. A good firewall and virus scanner that is kept up to date is a must.
  • 9. Advertisements To use P2P websites users are prompted to download the necessary software. One consideration is free vs. paid software. Free versions will not cost any money to download or install however they often come with flashing ads and other annoying advertisements. This may not be appealing to all users and some may prefer to pay a bit of money to download software that does not contain advertisements.
  • 10. Trust Strangers Most websites do not police the content that streams through P2P and have no central location to store files that have been checked for being illegal or virus-ridden. The weight falls on users to decide and for those who aren't versed in copyright law or risky computing this can be problematic. P2P is legitimate software and serves a good purpose when used properly, and as time goes on, the value of this technology proves itself in both the business and social environment. Many companies have recognized the value of P2P and have integrated it into their workplaces. That being said, unfortunately there is an entire culture that abuses the technology in order to exploit both the law and other people. This factor is the primarily cause for the biggest disadvantages of P2P file sharing.
  • 11. How the site markets itself. The site is now shut down so there no information. On May 12, 2010, Judge Kimba M. Wood of the United States District Court ruled that LimeWire and its creator, Mark Gorton, had committed copyright infringement, engaged in unfair competition, and induced others to commit copyright infringement.[ On October 26, 2010, LimeWire was ordered to disable the "searching, downloading, uploading, file trading and/or file distribution functionality" after losing a court battle with the RIAA over claims of copyright infringement. The RIAA also announced intentions to pursue legal action over the damages caused by the program in January to compensate the affected record labels. In retaliation, the RIAA's website was taken offline on October 29 via denial-of-service attacks executed by members of Operation Payback and Anonymous. In response to the ruling, a company spokesperson said that the company is not shutting down, but will be using its "best efforts" to cease distributing and supporting P2P software