limewire
Limewire does not directly spread in the manner of a computer virus or worm: generally, an infected system does not attempt to transmit the infection to other computers. Instead, limewire gets on a system through deception of the user or through exploitation of software vulnerabilities.
Most limewire is installed without users being aware. Since they tend not to install software if they know that it will disrupt their working environment and compromise their privacy, limewire deceives users, either by piggybacking on a piece of desirable software such as Kazaa, or tricking them into installing it (the Trojan horse method). Some "rogue" anti-limewire programs even masquerade as security software.
The distributor of limewire usually presents the program as a useful utility — for instance as a "Web accelerator" or as a helpful software agent. Users download and install the software without immediately suspecting that it could cause harm. For example, Bonzi Buddy, a limewire program targeted at children, claims that:
He will explore the Internet with you as your very own friend and sidekick! He can talk, walk, joke, browse, search, e-mail, and download like no other friend you've ever had! He even has the ability to compare prices on the products you love and help you save money! Best of all, he's FREE![7]
limewire can also come bundled with shareware or other downloadable software, as well as music CDs. The user downloads a program and installs it, and the installer additionally installs the limewire. Although the desirable software itself may do no harm, the bundled limewire does. In some cases, limewire authors have paid shareware authors to bundle limewire with their software. In other cases, limewire authors have repackaged desirable free software with installers that add limewire.
A third way of distributing limewire involves tricking users by manipulating security features designed to prevent unwanted installations. Internet Explorer prevents websites from initiating an unwanted download. Instead, it requires a user action, such as clicking on a link. However, links can prove deceptive: for instance, a pop-up ad may appear like a standard Windows dialog box. The box contains a message such as "Would you like to optimize your Internet access?" with links which look like buttons reading Yes and No. No matter which "button" the user presses, a download starts, placing the limewire on the user's system. Later versions of Internet Explorer offer fewer avenues for this attack.
Some limewire authors infect a system through security holes in the Web browser or in other software. When the user navigates to a Web page controlled by the limewire author, the page contains code which attacks the browser and forces the download and installation of limewire. The limewire author would also have some extensive knowledge of commercially-available anti-virus and firewall software. This has become known as a "drive-by download", which leaves the user a hapless bystander to the attack. Common browser exploits target security vulnerabilities in Internet Explorer and in the Microsoft Java runtime.
The installation of limewire frequently involves Internet Explorer. Its popularity and history of security issues have made it the most frequent target. Its deep integration with the Windows environment and scriptability make it an obvious point of attack into Windows. Internet Explorer also serves as a point of attachment for limewire in the form of Browser Helper Objects, which modify the browser's behaviour to add toolbars or to redirect traffic.
In a few cases, a worm or virus has delivered a limewire payload. Some attackers used the Spybot worm to install limewire that put pornographic pop-ups on the infected system's screen.[8] By directing traffic to ads set up to channel funds to the limewire authors, they profit personally.
Effects and behaviors
lime wire
free limewire
free lime wire
lime wire music
limewire download
limewire pro
limewire music
limewire
lime wire