Torrent Hash - Hash of all existing torrents
Please, pay attention to the fact that you are about to download the torrent NOT from torhash.net
torhash.net is just a torrent search engine, no torrents are hosted here.
torhash.net is just a torrent search engine, no torrents are hosted here.
Perfect Uninstaller 6.2.1 Portable
Infohash:
6D1EA631E09CB072B6EDA118E02F469743D410F4
Type:
Applications
Title:
Perfect Uninstaller 6.2.1 Portable
Category:
Applications/Windows
Uploaded:
2008-09-17 (by NoExcuses )
Description:
Perfect Uninstaller v6.2.1 Portable
No Need to install it.
Or, if you want to, Setup and Serials are included.
More infos at:
http://www.perfectuninstaller.com/
This package contains a first Portable version built using RunHiddenConsole.exe to start the Batch file that changes some values in Registry, runs the program and deletes the Registry values when exiting from the program just to avoid having the sloppy DOS window in the background. Some AVs complain with it recognizing RunHiddenConsole.exe as a malicious/potentially harmful program as it can be used to hide malicious behaviours. If it's your case, or just don't trust in the first one, use the second version.
The Portable SFX EXE files are built up using WinRAR. You can use it to extract the files and check them one by one if you want to be sure of what is running on your machine.
SUGGESTIONS ON USING P2P DOWNLOADS
==================================
1) It's always better to run all downloaded programs using Sandboxie or a similar virtual machine.
2) When in doubt, scan them with an Internet Scan service as the ones provided by Jotti and VirusTotal
http://virusscan.jotti.org/
http://www.virustotal.com/
This will ***NOT*** give you any warranty that a file passing their analysis is clean, nor that if they see them as a troian it's so or not just another false positive, but helps you to decide and at least ask for help or infos.
3) Remember, trust nobody, and when in doubt, go to point 1)
4) If you find any upload containing trojans or whatsoever malicious or unclean, Instead of start cursing in the comments of the upload, take the time to go to the Suprbay Forum at:
http://suprbay.org/forumdisplay.php?f=34
and report links and comments there, and someone will take care of all the nasties.
That's the only way to keep TPB and its uploads fresh and clean.
That's for what is regarding security. If after testing it you see that you like it and need this program, show your support by buying it!
Enjoy and remember to seed... :o)
Tags:
Files count:
4
Size:
6.61 Mb
Trackers:
udp://tracker.openbittorrent.com:80
udp://open.demonii.com:1337
udp://tracker.coppersurfer.tk:6969
udp://exodus.desync.com:6969
udp://open.demonii.com:1337
udp://tracker.coppersurfer.tk:6969
udp://exodus.desync.com:6969
Comments:
Ov4ar (2008-09-17)
10x man, is this better scanning algorithm than Revo, Smarty or Your Uninstaller ? What do you think about this 4 :)NoExcuses (2008-09-18)
Well, in reality I have a different approach to new installations. before to install anything new I always make a Ghost image of my boot partiton, and then I install what I want to try. If it's OK, it remains there and I make another image for safety. If I don't like it, I just restore the previous image, so I'm sure there is really nothing in my system of this program. It's already some years that I work in this way, and it was saving my back in some dirty situations. I've used sometimes some of these uinistallers, but I find my method a lot more reliable, and I have the backups too, so, if anything goes wrong, at least I go back to one of my previous backups and I have only to install what I was installing afterwards. It's pretty useful also for testing some untested apps like the ones found around in internet, instead to try to uninstall them I rely more in restoring a previous imageOv4ar (2008-09-18)
That is the safest method.And there are so many uninstallers.
You can use ShadowMode session too with ShadowUser, ShadowDefender or Returnil :)
NoExcuses (2008-09-19)
I continue to prefer to restore my Ghost image, after this I'm really sure that nothing is remaining of a previous installation, as the installation has never been done on this backup. More sure than this will be hard... :o)SumeklamKidd (2009-03-22)
Backdoor.Win32.Hupigon.~DRNG@10749194found with COMODO.
Just to add my two cents worth.
Other than that, it works fine.