Torrent Hash - Hash of all existing torrents
Please, pay attention to the fact that you are about to download the torrent NOT from torhash.net
torhash.net is just a torrent search engine, no torrents are hosted here.
torhash.net is just a torrent search engine, no torrents are hosted here.
Universal Document Converter v4.2 (www.OurNifty.com)
Infohash:
4FB906E60FC5382A449C88EB1D364AC731671F78
Type:
Applications
Title:
Universal Document Converter v4.2 (www.OurNifty.com)
Category:
Applications/Windows
Uploaded:
2009-12-25 (by OurNifty)
Description:
Universal Document Converter is the most complete solution for the conversion of documents into PDF, JPEG, TIFF or other graphical files. The underlying basis of the program is the technology of virtual printing.
As a result, exporting documents into a chosen format is not any more complicated than printing on a desktop printer. Popular Conversions: MS Word to PDF, Excel (*.xls) to PDF, PowerPoint to PDF, Visio to PDF, Outlook to PDF, Access to PDF, Adobe PDF to JPEG, AutoCAD (*.dwg) to PDF, DjVu file to PDF, Web page to JPEG, QuarkXPress to PDF.
Dont forget to visit: www.OurNifty.com
Files count:
1
Size:
5.51 Mb
Trackers:
udp://tracker.openbittorrent.com:80
udp://open.demonii.com:1337
udp://tracker.coppersurfer.tk:6969
udp://exodus.desync.com:6969
udp://open.demonii.com:1337
udp://tracker.coppersurfer.tk:6969
udp://exodus.desync.com:6969
Comments:
next_level_reaper (2009-12-25)
this upload has a virus!!Select local site
Global Sites F-Secure.fi F-Secure Italian site F-Secure UK site F-Secure.com Slovenia France Germany Italy Japan Sweden
F-Secure Virus Descriptions : Back Orifice
NAME: Back Orifice
ALIAS: BO, CDC-BO, BOSERVE, BOCLIENT, Orifice, Hacktool, Back_Orifice
There is no virus by this name. However, there is a toolkit from a hacker group Cult of the Dead Cow by this name.
This trojan horse allows an intruder to monitor and tamper with Windows 95 and Windows 98 computers over the Internet. There is no easy way for a computer user to know the attack is taking place, and there is no easy way to stop the attack once Back Orifice has installed itself on the computer.
In a typical attack, the intruder sends the Back Orifice trojan horse to his victim as a program attached to e-mail. When the e-mail recipient executes the program attachment, the trojan horse opens connections from the computer to the Internet. This allows the intruder to control the computer. The trojan horse is invisible and will restart itself automatically even if Windows is re-booted.
Back Orifice allows a hacker to view and modify any files on the hacked computer. It can create a log file of the computer users actions. It can take screen shots of the computer screen and send them back to the hacker. Or it can simply crash the computer.
F-Secure Anti-Virus detects and disinfects this trojan as Trojan.Win32.BO.
To manually remove Back Orifice, restart the machine in MS-DOS mode (Start/Shut Down/Restart in MS-DOS mode) and delete the BO server from Windows system directory. Usually this can be done by typing in the DOS prompt:
DEL C:\WINDOWS\SYSTEM\EXE~1
ALIAS: BOSniffer
This is a trojan which claims to detect Back Orifice, while in fact it is Back Orifice server itself. It is detected as Trojan.Win32.BO.b.
See: Netbus
K-kid (2009-12-25)
this is clean, false positives detected by antivirusTPBUROCK (2009-12-26)
No This is Virus ??100% virus
OurNifty (2010-01-03)
FILE ARE CLEAN BUT YOUR ANTIVIRUS IS SHOWING FALSE POSITIVE.www.OurNifty.com