Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Tutorials

LimeWire Pirate Edition

Paul Anderson by Paul Anderson
March 17, 2012
in Tutorials
0
limewire pirate edition 2
75
SHARES
1.3k
VIEWS
Share on FacebookShare on Twitter

Ever since back in 2010 when US District Judge Kimba Wood issued an injunction ordering LimeWire to disable the “the searching, downloading, uploading, file trading and/or file distribution functionality, and/or all limewire pirate edition 2functionality” of the famed file-sharing program users have been looking for an alternative to download content. Many most likely switched to BitTorrent, but some quit file-sharing altogether because they just couldn’t find an alternative that was similarly easy-to-use as LimeWire.

You might also like

Application hardening tips

Low Level IPhone programming

CDP Flood Attack

What these people, and sometimes others forget, is that LimeWire is still around, it’s just been modified to live on without the need for LimeWire LLC’s servers. Soon after the demise of the official version a secret team of developers brought LimeWire back to life with LimeWire Pirate Edition.

A hacker by the name of Meta Pirate turned the injunction upside down by releasing LimeWire Pirate Edition whereby “all dependencies on LimeWire LLC’s servers have been removed, all remote settings have been disabled, the Ask toolbar has been unbundled, and all features of LimeWire PRO have been activated for free.” The move didn’t please LimeWire or the RIAA, but it did please its millions of loyal fans.

LimeWire Pirate Edition is just as easy-to-use as the official version, and still offers the same features and functionality that users have come to expect. I’lll run through the setup guide and show you how to use it so that if you haven’t returned LimeWire or are thinking of trying it out fr the first time you’ll know how to use and what to expect. I’ll even show you a few tips and tricks for keeping safe along the way.

More info about the program:

Announcing the first release of LimeWire Pirate Edition:

  • Based on LimeWire 5.6 beta
    • Turbo-charged downloads
    • Optimized search results
    • AVG Anti-Virus
  • Built-in torrent search
  • No toolbars, adware or spyware
  • No connection problems

 

 

1. Download and Install LimeWire Pirate Edition (Windows, Mac, and Linux)

limewire pirate edition

2. Choose File Association, Run at Startup

If you’re using another BitTorrent program you’ll probably want to deselect the first box, and launching programs at system startup isn’t usually a good idea.

limewire pirate edition 9

3. Turn Off Adding to Public Shared List

This is very important. You never, ever, ever want to share files with others, at least not copyrighted files, and you certainly don’t want to automatically add files you download to your “Public Shared” list for others to download from you.

limewire pirate edition 3

4. Connection Difficulties?

Some might have difficulty connecting to the Gnutella network. There’s a rundown here of what steps you can take to remedy the problem, but it boils down to installing a fresh gnutella.net file (Windows |Mac).

5. Safety

Click on “Public Shared” to see what you’re sharing with the rest of the world. Sharing copyrighted material with others is known as illegal distribution and is precisely what runs afoul of the law. It’s okay to download copyrighted material, but it’s not okay to distribute it to others without copyright holder permission. So if you don’t want to get nasty letters from the RIAA and MPAA make sure that this list is always empty.

You might also wnat to consider using a VPN service like VyprVPN. A VPN is a virtual private network with “virtual” encrypted connections routed through the Internet to remote servers. The data traveling between you and those servers is encrypted, and the IP address that will appear while surfing or downloading content from the Internet will be that of the server and not your own.

6. Finding Content

This is the easy and fun part. Enter the name of what you’re looking for in the search query box and hit “Enter.” In the example below I look for a copy of Radiohead’s song “Creep.”

limewire pirate edition 5

To get more info on an item just select the “i” button to the right of the song. This way you can make sure it’s what you’re looking for. Click on an item once you have found what you want. Notice how in the left panel you can also narrow the search by album, artist, and category. Do you want a video of the song or an .MP3?

limewire pirate edition 6

The first time you try to download something without a copyright license it’ll ask you to confirm your choice. Select “yes” and check “Do not warn me again.” Your download should soon begin afterwards.

limewire pirate edition 7

Do you on plan on using LimeWire Pirate Edition or are you already comfortable with an alternative like BitTorrent?

Stay tuned.

SOURCE

Tags: limelimewirenewpriateupdateversionwire
Share30Tweet19
Paul Anderson

Paul Anderson

Editor and chief at ZeroSecurity. Expertise includes programming, malware analysis, and penetration testing. If you would like to write for ZeroSecurity, please click "Contact us" at the top of the page.

Recommended For You

Application hardening tips

by Paul Anderson
May 31, 2014
0
Application hardening tips

When a exploit has been discovered in an operating system or program the vendor pushes a patch or upgrade that eliminates the vulnerability. “Hardening” is the act of...

Read more

Low Level IPhone programming

by Paul Anderson
May 28, 2014
0
Low Level IPhone programming

Video from JailbreakCon Twitter: @JailbreakCon - http://twitter.com/JailbreakCon "Low Level iPhone Programming (And more!)" by winocm Slides: http://cl.ly/3B0U0i3X3n2W

Read more

CDP Flood Attack

by Paul Anderson
October 9, 2013 - Updated on February 24, 2014
0
Hacking With Netcat Basics

The Cisco Discovery Protocol (CDP) is a proprietary Data Link Layer protocol developed by Cisco Systems. It is used to share information about other directly connected Cisco equipment,...

Read more

LFI exploitation via php://input

by Paul Anderson
September 9, 2013 - Updated on September 16, 2013
0
LFI exploitation via php://input

Released by Zentrix, video description: Credits to my brothers Hooded Robin for teaching me this and also to Haxor. Special thanks to my brothers in Intra and Intra...

Read more

Safari Forensic Tutorial

by Paul Anderson
April 20, 2013
1
Safari Forensic Tutorial

Introduction In Mac OS X, iOS and in many apple products store serialized objects in property list files (.plist). These file are used to store information of applications,...

Read more
Next Post
Defend against USB infection – Autorun Eater

Defend against USB infection - Autorun Eater

Related News

NSA intercepting U.S. Routers

NSA intercepting U.S. Routers

June 6, 2014 - Updated on March 17, 2023
Netwire RAT seized by FBI and other worldwide police agencies

Netwire RAT seized by FBI and other worldwide police agencies

March 16, 2023
The Emotet botnet returns and is sending a slew of malicious emails

The Emotet botnet returns and is sending a slew of malicious emails

March 14, 2023
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology News
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact Us
  • List of our Writers

© 2022 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
  • Exploits
  • Data Breaches
  • Malware
  • Privacy
  • Mobile Security
  • Tools
  • Contact Us
  • Privacy Policy

© 2022 ZeroSecurity, All Rights Reserved.