.- .,-
.:+X@###$ .:/XM###% -=;;;;, .
,/XM######%= ./X##M###M%= -;X##M@#M##M$.
=%##M$%H@%; -X##@$%@@+;. =X##H:.. ,$##MM-
,+M##H. =. ,%###X..=. .%##X- ;###@-
+####/ %####; =M#M; ,@#@;
/M####;, %M###M;. /###; ,.
;M####M: /MM###M: /###+
.;@####$= .;@####+= =M##X
-$####H, -X####X, H#M#+ :/-
,%M##M, ,%###M. ,M###/ .%####,
/###H- /###H ;##M#/ .$M####H
. -:+=$##H/- .-;/=X##X;, .X###X, ,:$M$$####:
=+H##MHMMX:. .:%@##M@@MX; -H#M##@H@MMX: +###%
,$####MH/=. ,X##M##X/= -+%XX%/=, .H##@,
,=-.. ,==, ,@##=
=#M%.
:: Saints and Sinners Group :: ,;.
- p r e s e n t s -
Securstar.DriveCrypt.Plus.Pack.v2.0.WinNT2kXP.Incl.Keygen
http://www.securstar.de
__________ .__ .___ _____
\______ \ ____ | | ____ _____ ______ ____ | | _____/ ____\____
| _// __ \| | _/ __ \\__ \ / ___// __ \ | |/ \ __\/ _ \
| | \ ___/| |_\ ___/ / __ \_\___ \\ ___/ | | | \ | ( <_> )
|____|_ /\___ >____/\___ >____ /____ >\___ > |___|___| /__| \____/
\/ \/ \/ \/ \/ \/ \/
cracked by... SSG Team rls type.... Keygen
tested by.... SSG Team date........ 12/22/2002
packed by.... SSG Team os.......... WinNT2kXP
supplied by.. SSG Team language.... English
protection... Serial disks....... 1 x 5Mb
_______ __
\ \ _____/ |_ ____ ______
/ | \ / _ \ __\/ __ \ / ___/
/ | ( <_> ) | \ ___/ \___ \
\____|__ /\____/|__| \___ >____ >
\/ \/ \/
DriveCrypt Plus Pack provides true real-time "on the fly"
256-bit disk encryption. Providing advanced FDE (Full disk
encryption) as apposed to VDE (Virtual disk encryption) or
"container" encryption, DCPP is an important evolutionary
step in the field of transparent data protection.
DCPP allows you to secure your disk(s) (including removable
media) with a powerful and proven encryption algorithm
(AES-256) at the sector level, ensuring that only authorized
users may access it. The encryption algorithm used by DCPP
is a trusted, validated algorithm chosen by the National
Institute of Standards and Technology (NIST) and slated to
be the cryptographic standard for years to come. AES-256 is
a FIPS-approved symmetric encryption algorithm that may be
used by U.S. Government organizations (and others) to
protect sensitive information.
DCPP is automatic and completely transparent to the user.
Not only does this decrease user involvement and training
requirements, but it creates the foundation for enforceable
security. The careful integration of boot protection and
automatic encryption provides a high degree of security with
minimal impact on users. Boot protection prevents subversion
of the operating system (via floppy bootup, for example) or
the introduction of rogue programs while sector by sector
encryption makes it impossible to copy individual files for
brute force attacks. DCPP safeguards the operating system
and the important system files (which often contain clues to
passwords for Windows).
DCPP is the fastest and most feature-rich real-time
encryption system available, Special care has been taken to
render all cryptographic parts as invisible & transparent as
possible.
Pre-Boot Authentication
The user is authenticated by means of pre-boot
authentication (PBA) before the system is started and
therefore before the operating system is booted. This kind
of authentication cannot be manipulated, PBA therefore
guarantees maximum security. Neither keys nor passwords are
stored on the
PC's hard disk. All of the information
required to boot the operating system is derived from the
password. This makes the use of hard disk tools for
analyzing the hard disk completely ineffective. PBA in
provided by a system call BootAuth and is a fully graphical
login screen.
Full Disk Encryption
Automatic & transparent FDE offers several key advantages
relative to file encryption. FDE secures the system and temp
files that often contain sensitive data but are missed by
file encryption. Even removing the drive itself does not
give access to any file or directory structure. FDE is
performed sector by sector without creating temp or backup
files: As a result, large files will decrypt without delay
whereas file encryption is normally much slower. FDE also
avoids such time consuming tasks as secure deletes of temp
files or work files in clear text, and obviates the need to
do a full delete on disks to be discarded.
How does it work ?
As data is read from the hard disk, DCPP automatically
decrypts the data before it is loaded into memory. When data
is written back to the hard disk, it is automatically
re-encrypted. This process is completely transparent to the
user or any application programs, the data is caught "on the
fly" as it transfers back and forth between the hard disk
and memory. Consequently, users don't
need to remember to
decrypt or re-encrypt their data, or change the normal
operation of their PC. In addition, only individual sectors
are decrypted at any one time, not the whole hard disk.
Other products that claim to be "on the fly" decrypt an
entire file and load it into memory, creating significant
security risks. DCPP is smarter and more secure because it
decrypts only the specific sectors of a file that are in
use. Unprotected data never resides on a DCPP encrypted
disk.
Features and Benefits
Some of the main features & benefits:
- The ability to handle up to 2 terabytes of encrypted data.
- 256-bit military strength encryption using proven
cryptographic algorithms.
- Easy to install, deploy and use.
- Powerful Pre-Boot Authentication
- Completely transparent to the user
- Sector level protection
- Anti dictionary and brute-force attack mechanisms, due to
the nature of DCPP it is the most difficult system to attack
compared to anything else available.
- Special functionality the prevents passwords from being
sniffed/captured.
- Minimal administration and user training.
- Network support.
- Supports external hardware such as USB tokens.
- Supports any kind of media (hard disks, floppy disks, ZIP,
JAZ, CD-ROM etc...)
- Ability to validate the integrity of the encryption
methods used by DCPP.
_______ __
\ \ _____/ |_ ____ ______
/ | \ / _ \ __\/ __ \ / ___/
/ | ( <_> ) | \ ___/ \___ \
\____|__ /\____/|__| \___ >____ >
\/ \/ \/
Unzip, unrar, install.
Use our keygen to generate a valid serial number.
ENJOY!
________ __ __
/ _____/______ ____ _____/ |_ ______ _/ |_ ____
/ \ __\_ __ \_/ __ \_/ __ \ __\/ ___/ \ __\/ _ \
\ \_\ \ | \/\ ___/\ ___/| | \___ \ | | ( <_> )
\______ /__| \___ >\___ >__| /____ > |__| \____/
\/ \/ \/ \/
SSG's respects & hello's fly out:
SCOTCH - MaGE - RPG2000 - SOD - DAMN - TMG
_________ __ __
\_ ___ \ ____ _____/ |______ _____/ |_ __ __ ______
/ \ \/ / _ \ / \ __\__ \ _/ ___\ __\ | | \/ ___/
\ \___( <_> ) | \ | / __ \\ \___| | | | /\___ \
\______ /\____/|___| /__| (____ /\___ >__| |____//____ >
\/ \/ \/ \/ \/
[www] ...........[http://www.forget.about.it.org]
[e-mail]...........[removed for security reasons]
[irc] .............[removed for security reasons]
[nfo layout by bac/Offliner filled by SSG Team]
[logo by Offliner last update on 12/12/2002]