Torrent Hash - Hash of all existing torrents
Please, pay attention to the fact that you are about to download the torrent NOT from torhash.net
torhash.net is just a torrent search engine, no torrents are hosted here.

ABBYY FineReader 10.0.102.130 Corporate Edition Multilang

Infohash:

96930479693DFA373EBAF9F2D1B2E289A8A4238C

Type:

Software PC

Title:

ABBYY FineReader 10.0.102.130 Corporate Edition Multilang

Category:

Applications/Windows

Uploaded:

2010-09-25 (by nikita200 )

Description:

ABBYY FineReader 10.0.102.130 Corporate Edition Multilang ABBYY FineReader is an intelligent and easy-to-use OCR (Optical Character Recognition) and PDF conversion software that is the optimal alternative to manual data entry and typing. It is an ideal choice for professionals that want to save time and effort while producing excellent results. It provides powerful functionality for converting images received from a scanner, a digital camera or by fax, as well as PDF files, into editable and searchable formats. The program accurately retains formatting and layout of documents and supports a wide range of recognition languages and output file formats. Key Features * Outstanding OCR Accuracy and Format Retention * Intelligent Reconstruction of Complex Document Structure and Formatting * Recognition of Digital Camera and Mobile Phone Camera Images * Comprehensive Language Support * Intelligent Interface with Quick Tasks * Complete Integration with Popular Office Applications * PDF Conversion, Archiving and Securing * Barcode Recognition * High Speed Multicore Processing * Powerful Networking and Collaboration Features * Useful Bonus Application – ABBYY Screenshot Reader PC with 1 GHz or higher;. Microsoft® Windows® 7, Microsoft Windows Vista®, Microsoft Windows Server 2003, Microsoft Windows Server 2008, Microsoft Windows XP; To work with localized interfaces, corresponding language support is required. 512 MB available RAM. In a multiprocessor system, an additional 256 MB of RAM is required for each additional processor core; 650 MB for typical program installation and 650 MB for program operation; TWAIN- or WIA-compatible scanner, digital camera or fax-modem (optional); Video card and monitor (1024×768 or higher); Keyboard, mouse or other pointing device.

Files count:

1

Size:

442.60 Mb

Trackers:

udp://tracker.openbittorrent.com:80
udp://open.demonii.com:1337
udp://tracker.coppersurfer.tk:6969
udp://exodus.desync.com:6969

Comments:

Robicika (2010-09-27)

my AVG found a virus in the exe file!!

 nikita200 (2010-10-02)

@Robicika
No panic: false positive.

Robicika (2010-10-08)

Thx

Vladi1204 (2010-10-30)

Do not use 10.0.102.130.exe, throw it, it kills the boot Windiws.
Otherwise it works very well

minreal (2010-12-02)

@Vladi1204: could you explain that a bit more? Is it a virus, or, or? Does this release work 100% properly? Thanks.

fedfue (2010-12-06)

My AVG found Trojan horse Dropper.Generic2.FAN in 10.0.102.130.exe (which is the file you are supposed to copy and run). Could you please explain what this does (maybe it's a false alarm)?
Also, I'm a bit confused by Vladi1204's comment. What do you mean it kills the boot Windows and are you supposed to not to run 10.0.102.130.exe at all? If that's the case, how did you install it correctly if the instructions require to run this file?

ticateban (2011-02-09)

Thanks so much

Traumaticparoxyst (2011-02-21)

Sigh! Is it not lame to take time to write lame stuff about viruses and not working and even destroying windows. You guys that write this shitthrowing stuff are most probably guys that hate TPB and the fact that ge get your stuff for free. It´s obvious that you have failed and all you can resort to is writing this to scare off people to download, that´s just sad.
This file works just as it soppose to and don´t worry about the shit they write.

Traumaticparoxyst (2011-02-21)

It DOES include:Trojan horse Dropper.Generic2.FAN
I believe it just another variant from original Trojan.Dropper.Generic.
A quote from symantec:
A Trojan.Dropper is a type of Trojan whose purpose is to deliver an enclosed payload onto a destination host computer. A dropper is a means to an end rather than the end itself. In other words, the dropper is usually used at the start or in the early stages of a malware attack.
Once a dropper is executed, its own code is simply to load itself into memory and then extract the malware payload and write it to the file system. It may perform any installation procedures and execute the newly dropped malware. The dropper usually ceases to execute at this point as its primary function has been accomplished.
Droppers are used by malware creators to disguise their malware. They create confusion amongst users by making them look like legitimate applications or well known and trusted files.
Source: Symantec.com

ImSoJaded (2011-05-04)

/sigh
If you trust Symantec, you might as well trust politicians. Did you know that anti-virus developers regularly include cracks and keygens - even if they do not include malicious code - in their definition files so as to deter n00bs from using illegal downloads?