From professional translators, enterprises, web pages and freely available translation repositories.
gooofull informa que shareaza 2.7.5 debe ser utilizado segun la normativa de propiedad intelectual y el vigente código penal.
gooofull informs that shareaza 2.7.5 must be used according to rules of intellectual property and the current penal code.
no solo eso, shareaza es completamente gratis y no te va a mostrar ningún tipo de publicidad. no va instalar ningún programa de terceros que puede hacer que tu computadora sea un desastre total.
not only that, shareaza is totally free and will not display any kind of publicity. it will not install any third party programs that may turn your computer into a total disaster.
shareaza, el cliente más lujoso y sofisticado que puedes encontrar. puede utilizar el poder de cuatro redes peer-to-peer (p2p).
gnutella2 (g2). not only that. shareaza is the most luxurious and sophisticated client p2p you can find
para infectar otros sistemas de las redes peer-to-peer, realiza las siguientes operaciones: extrae carpetas compartidas tras emplear las siguientes claves del registro: • software\microsoft\windows\currentversion\uninstall\emule plus_is1 • software\kazaa\localcontent • software\emule • software\dc++ • software\shareaza\shareaza\downloads • software\bearshare\general • software\imesh\general • \local settings\application data\ares\my shared folder al tener éxito, crea el siguiente fichero: • nissan.exe estos ficheros son copias del programa malicioso.
in order to infect other systems in the peer to peer network community the following action is performed: it retrieves shared folders by querying the following registry keys: • software\microsoft\windows\currentversion\uninstall\emule plus_is1 • software\kazaa\localcontent • software\emule • software\dc++ • software\shareaza\shareaza\downloads • software\bearshare\general • software\imesh\general • \local settings\application data\ares\my shared folder if successful, the following file is created: • nissan.exe these files are copies of the malware itself.