Download Secustar DriveCrypt Plus Pack v2.6 keygen by dT

Added to site2004-01-03
Rating91/100
Votes7


secustardrivecryptpluspackv2.6keygendt.zip (44595 bytes)

namesizecompressed
FILE_ID.DIZ 324 159
keygen.exe 43520 39940
Dt.nfo 15351 4192

FILE_ID.DIZ

Secustar DriveCrypt Plus Pack v2.6 Datecode 030827 [01/02]
    █                    █    <12/10/2003>
█▀▀ █ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ █ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀█
█ █▀█▄█▀▄█▀█▄█▀█▄█▀█▀█▄▄▀█▄█▀█▄█▀█▄█▀█▀█ █
▓ ▓ ▓ ▓  ▓▄▓ ▄▄▓ ▓ ▓ ▓   ▓ ▓▄▓ ▄▄▓ ▓ ▓ ▓ ▓
█ █▄▀ █  █   █ ▀ █ ▀ ▀   █ █   █ ▀ █ ▀ ▀ █
█▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄█



Dt.nfo

          █▀▀▀▀▀▀█
          █ ████ ▀▀▀▀█       █▀▀▀▀▀█                █▀▀▀▀▀▀▀▀▀▀█
 █▀▀▀▀▀▀▀▀▀ ██▓█ ███▄ ▀▀▀▀▀▀▀▀ ███▄ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ ███▄ ███▄ ▀▀▀▀▀▀▀▀▀▀▀▀▀▄
 █ ███████▀ ██▒█ █████████████ █████████████ █████████████ █████████████████▄ █
 █ ████▓█   ██░█ ██░█   █▓████ ██░█   █▓██░█ ██░█▓█   ██░█ ██░█  █▓██░█  ██░█ █
 █ ████▓█   ██ █ ██ █  ▄█████▀ ██ █   █▓██ █ ██ █▓█   ██ █ ██ █  █▓██ █  ██ █ █
 █ ████▓█   ██░█ ██░█          ██░█  ▄████░▀ ██░█▓█   ██░█ ██░█  █▓██░█  ██░█ █
 ▀▄ █████   ██▒█ ██▒█   `2003'  ████▄         █████   ██▒█ ██▒█  █████ ▄████ ▄▀
  ▀▄ ▀▀███████▓█ ██▓█ .m4g3!sk@. ▀▀████████▄ ▄ ▀▀███████▓█ ██▓█  ██▀▀  ██▀▀ ▄▀
    ▀▀▄▄ ▀▀▀▀███ ████                        ██▄      ▀▀▀▀ ▀▀▀▀      ▄▄▄▄▄▀▀
        ▀▀▀█ ████▄▄▄  █████████████ █████████████ █████████████████▄ █
           █ ██░█     ██░█   █▓██░█ ██░█   █▓██░█ ██░█  █▓██░█  ██░█ █
           █ ██ █ ██▄ ██ █   █▓██ █ ██ █   █▓██ █ ██ █  █▓██ █  ██ █ █
           █ ██░█ █▓█ ██░█  ▄█████▀ ██░█   █▓██░█ ██░█  █▓██░█  ██░█ █
           ▀▄ ███▄█▓█  ████▄         ████▄ █▓██▒█ ██▒█  █████ ▄████ ▄▀
            ▀▄ ▀▀████   ▀▀████████▄ ▄ ▀▀███████▓█ ██▓█  ██▀▀  ██▀▀ ▄▀
              ▀▀▄▄ ▀▀ █▀▀▄▄▄▄▄▄▄▄▄▄▄▀▀▀▄▄▄▄▄ ████ ████ ▄▄▄▄▀▀▄▄▄▄▀▀
                  ▀▀▀▀▀                    █▄▄▄▄▄▄▄▄▄▄▄█
   ┌───────────────────────────────────────────────────────────────────────┐
   │║  [■]    Secustar DriveCrypt Plus Pack v2.6 Datecode 030827     [■]  ║│
   │║ ─────────────────────────────────────────────────────────────────── ║│
   │║   cracker....: dREAM TEAM         date.........: 12/10/2003         ║│
   │║   supplier...: dREAM TEAM         type.........: Security Tool      ║│
   │║   tester.....: dREAM TEAM         developer....: Secustar           ║│
   │║   packager...: dREAM TEAM         protection...: Armadillo v3+      ║│
   │║   system.....: WinAll             size.........: 02 x 2.88 mb       ║│
   │║ ─────────────────────────────────────────────────────────────────── ║│
   │║                                                                     ║│
   │║┌─[ r e l a s e   n o t e s ]───────────────────────────────────────┐║│
   │║│                                                                   │║│
   │║│ drivecrypt plus pack provides true real-time "on the fly" 256-bit │║│
   │║│ disk encryption. providing advanced fde (full disk encryption) as │║│
   │║│ opposed     to  vde  (virtual  disk  encryption)  or  "container" │║│
   │║│ encryption,  dcpp  is an important evolutionary step in the field │║│
   │║│ of transparent data protection.                                   │║│
   │║│                                                                   │║│
   │║│ dcpp  allows  you  to  secure  your  disk(s) (including removable │║│
   │║│ media)  with a powerful and proven encryption algorithm (aes-256) │║│
   │║│ at  the  sector  level,  ensuring  that only authorized users may │║│
   │║│ access  it.  the  encryption algorithm used by dcpp is a trusted, │║│
   │║│ validated algorithm chosen by the national institute of standards │║│
   │║│ and technology (nist) and slated to be the cryptographic standard │║│
   │║│ for    years  to  come.  aes-256  is  a  fips-approved  symmetric │║│
   │║│ encryption   algorithm  that  may  be  used  by  u.s.  government │║│
   │║│ organizations (and others) to protect sensitive information.      │║│
   │║│                                                                   │║│
   │║│ dcpp  is  automatic  and  completely transparent to the user. not │║│
   │║│ only       does  this  decrease  user  involvement  and  training │║│
   │║│ requirements,  but also it creates the foundation for enforceable │║│
   │║│ security.    the  careful  integration  of  boot  protection  and │║│
   │║│ automatic  encryption  provides  a  high  degree of security with │║│
   │║│ minimal  impact  on users. boot protection prevents subversion of │║│
   │║│ the  operating  system  (via  floppy boot-up, for example) or the │║│
   │║│ introduction  of rogue programs while sector by sector encryption │║│
   │║│ makes  it  impossible  to  copy  individual files for brute force │║│
   │║│ attacks.  dcpp  safeguards the operating system and the important │║│
   │║│ system   files  (which  often  contain  clues  to  passwords  for │║│
   │║│ windows).                                                         │║│
   │║│                                                                   │║│
   │║│ dcpp  is  the  fastest and most feature-rich real-time encryption │║│
   │║│ system  available,  special  care  has  been  taken to render all │║│
   │║│ cryptographic parts as invisible & transparent as possible.       │║│
   │║│                                                                   │║│
   │║│ the  user  is  authenticated  by means of pre-boot authentication │║│
   │║│ (pba)  before  the  system  is  started  and therefore before the │║│
   │║│ operating system is booted. this kind of authentication cannot be │║│
   │║│ manipulated,  pba  therefore guarantees maximum security. neither │║│
   │║│ keys  nor  passwords are stored on the pc's hard disk. all of the │║│
   │║│ information required to boot the operating system is derived from │║│
   │║│ the password. this makes the use of hard disk tools for analysing │║│
   │║│ the hard disk completely ineffective. pba in provided by a system │║│
   │║│ call bootauth and is a fully graphical login screen.              │║│
   │║│                                                                   │║│
   │║│ automatic & transparent full disk encryption (fde) offers several │║│
   │║│ key  advantages  relative  to  file  encryption.  fde secures the │║│
   │║│ system  and  temp files that often contain sensitive data but are │║│
   │║│ missed  by  file  encryption. even removing the drive itself does │║│
   │║│ not  give  access  to  any  file  or  directory structure. fde is │║│
   │║│ performed sector by sector without creating temp or backup files: │║│
   │║│ as  a result, large files will decrypt without delay whereas file │║│
   │║│ encryption  is  normally  much  slower. fde also avoids such time │║│
   │║│ consuming  tasks as secure deletes of temp files or work files in │║│
   │║│ clear text, and obviates the need to do a full delete on disks to │║│
   │║│ be discarded.                                                     │║│
   │║│                                                                   │║│
   │║│ as  data  is read from the hard disk, dcpp automatically decrypts │║│
   │║│ the  data  before  it is loaded into memory. when data is written │║│
   │║│ back  to  the  hard  disk, it is automatically re-encrypted. this │║│
   │║│ process  is completely transparent to the user or any application │║│
   │║│ programs,  the  data  is caught "on the fly" as it transfers back │║│
   │║│ and  forth  between the hard disk and memory. consequently, users │║│
   │║│ don't  need  to  remember to decrypt or re-encrypt their data, or │║│
   │║│ change  the  normal  operation  of  their  pc.  in addition, only │║│
   │║│ individual  sectors  are decrypted at any one time, not the whole │║│
   │║│ hard  disk.  other products that claim to be "on the fly" decrypt │║│
   │║│ an  entire  file  and  load  it into memory, creating significant │║│
   │║│ security  risks.  dcpp  is  smarter  and  more  secure because it │║│
   │║│ decrypts  only  the  specific  sectors of a file that are in use. │║│
   │║│ unprotected data never resides on a dcpp encrypted disk.          │║│
   │║│                                                                   │║│
   │║│ features                                                          │║│
   │║│ --------                                                          │║│
   │║│ . boot protection                                                 │║│
   │║│ . pre-boot authentication: login before starting the operating    │║│
   │║│   system                                                          │║│
   │║│ . multiple os boot support (microsoft)                            │║│
   │║│ . full or partial hard disk encryption                            │║│
   │║│ . sector level protection                                         │║│
   │║│ . complete "power off" protection i.e. unauthorised users are     │║│
   │║│   prohibited from starting up the pc                              │║│
   │║│ . aes 256 bit encryption                                          │║│
   │║│ . no size limitation for encrypted disks                          │║│
   │║│ . manages an unlimited amount of encrypted disks simultaneously   │║│
   │║│ . allows steganography to hide data into pictures                 │║│
   │║│ . trojan and keyboard sniffer protection preventing passwords     │║│
   │║│   from being sniffed / captured (red screen modus)                │║│
   │║│ . anti dictionary and brute-force attack mechanisms (due to the   │║│
   │║│   nature of dcpp, it is the most difficult system to attack       │║│
   │║│   compared to anything else available.)                           │║│
   │║│ . encrypts almost any kind of media (hard disks, floppy disks,    │║│
   │║│   zip, jaz, etc...)                                               │║│
   │║│ . administrator /user specific rights                             │║│
   │║│ . usb-token authentication at pre-boot level (aladdin r2 and      │║│
   │║│   rainbow usb-token)                                              │║│
   │║│ . facility to validate the integrity of the encryption method     │║│
   │║│ . recovery disk for "disaster recovery"                           │║│
   │║│ . easy to install, deploy and use                                 │║│
   │║│ . completely transparent to the user                              │║│
   │║│ . minimal administration and user training                        │║│
   │║│                                                                   │║│
   │║│                                                                   │║│
   │║│ for more visit http://www.securstar.com/products_drivecryptpp.php │║│
   │║│                                                                   │║│
   │║└───────────────────────────────────────────────────────────────────┘║│
   │║                                                                     ║│
   │║┌─[ i n s t a l l   n o t e s ]─────────────────────────────────────┐║│
   │║│                                                                   │║│
   │║│ 1. run setup.exe to install the main program                      │║│
   │║│                                                                   │║│
   │║│ 2. start main program and chose registration                      │║│
   │║│                                                                   │║│
   │║│ 3. run keygen.exe and enter your hwid into                        │║│
   │║│                                                                   │║│
   │║│ 4. generate a serial number and finish the registration process   │║│
   │║│                                                                   │║│
   │║└───────────────────────────────────────────────────────────────────┘║│
   │║                                                                     ║│
   │║┌─[ a b o u t   u s ]───────────────────────────────────────────────┐║│
   │║│                                                                   │║│
   │║│ we  arent  absolutely  not  a  new group. we have been around way │║│
   │║│ before  your  mother  had sexual intercourse with your father (or │║│
   │║│ was it the dog next door?).                                       │║│
   │║│                                                                   │║│
   │║│ we  know  everything  about  you being a little jerk sitting in a │║│
   │║│ front  of  your  computer  (your  mom  spent  the money on) doing │║│
   │║│ nothing  but  idling  on  irc  (nice logs we have from you by the │║│
   │║│ way),  and  boasting how cool trader you are naming yourself dark │║│
   │║│ dork or something as stupid as you really are.                    │║│
   │║│                                                                   │║│
   │║│ we are watching you and everybody you talk to via the school link │║│
   │║│ you  think  is  so-so safe. we have logs of everything   you have │║│
   │║│ said  or  done  on the net. we have roots on all the machines you │║│
   │║│ think you rule according that cws mag we actually release too.    │║│
   │║│                                                                   │║│
   │║│ we  know  which porn site you attend while jerking. we have given │║│
   │║│ you  that old bitch you plan to spend your dad's money on to lose │║│
   │║│ your  virginity  with.  we  know  everything. you apparently know │║│
   │║│ nothing.                                                          │║│
   │║│                                                                   │║│
   │║│ we  releases  stuff.  it  is  going  to  be  spread worldwide. it │║│
   │║│ contains  viruses  and  trojans  we coded to trace it all the way │║│
   │║│ down  to your very site or shell. you know, we want more roots as │║│
   │║│ well  as  we  want  to bust your tiny ass. if you see this nfo on │║│
   │║│ your site, you know we gotcha. smile! you're being photographed.  │║│
   │║│                                                                   │║│
   │║│ ───────────────────────────────────────────────────────────────── │║│
   │║│                                                                   │║│
   │║│                 *** MESSAGE FROM OUR SPONSOR ***                  │║│
   │║│                                                                   │║│
   │║│ "dREAM TEAM seems to be one angry guy with delusions of adequacy, │║│
   │║│ trying to make himself look big by calling himself a group."      │║│
   │║│                                                                   │║│
   │║│ Chad Nelson (Armadillo Lead Developer)                            │║│
   │║│                                                                   │║│
   │║│ ───────────────────────────────────────────────────────────────── │║│
   │║│                                                                   │║│
   │║│                          - SHOUT OUT -                            │║│
   │║│                                                                   │║│
   │║│       i love my sweet girlfriend and i hate all stupid ppl!       │║│
   │║│                                                                   │║│
   │║│───────────────────────────────────────────────────────────────────│║│
   │║│                                                                   │║│
   │║│ . we dont send any cracks/keyfiles/serials and other stuff        │║│
   │║│ . we dont support any unsecured web sites and other public crap   │║│
   │║│ . we aren't technical support, so fuck off with stupid questions  │║│
   │║│                                                                   │║│
   │ └───────────────────────────────────────────────────────────────────┘ │
   └───────────────────────[dREAM TEAM 2000-2003]──────────────────────────┘
   dT-CRC:2003-12AA!



# 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z