▀▄ ▄▀
▓█▄ ▄█▓
░ ▓██▓▄ ░░▒▓▀ ▄▄ ▀▀▀▀▀▀▀███▄ ▄▄ ▓▄ ▄▄ ▄▓ ▀ ▀▀▓▒▒░░ ▄██▓▓ ░
▓▓▓▓ ▒▒▓▓ █▓▓█ ░░░░ █▓▓▓▌█▓▓█ ▓██▄ █▓▓█▄▄██▓▀▀▀▀▀ ▐▓▒▒▒ ▓██▓
░ ▓▒▒▓ ▓▓▓▓ ▀▀ ▒▒▒▒ ▓▓▓▀ ▀▀ ▓▓▓▓ ▀▀ ▓▓▓▓ ▓▓▓▓ ▓▓▓▓ ░
▒ ▓░░▓ ░▓░░▓▀▓▒▒▓ ▓▓▓▓▀▓▓▄▄ ▓▒▒▓▀▓▒▒▓ ▀▓▒▒▓▀▓▒▒▓ ▓▒▒▓ ▀▓▒▒▓ ▓▒▒▓ ▓▒▒▓ ▒
▓ ▓▒▒▓ ▓▒▒▓ ▓░░▓░▓░░▓ ▓░░▓ ▓░░▓ ▓░░▓ ▓░░▓ ▓░░▓░▓░░▓ ▓░░▓░▓░░▓ ▓░░▓ ▓
█ ▓▓▓▓▄ ▓▓▓▓ ▓▒▒▓ ▓▒▒▓ ░▓▒▒▓ ▓▒▒▓ ▓▒▒▓ ░▓▒▒▓ ▓▒▒▓ ▓▒▒▓ ▓▒▒▓ ▓▒▒▓ ▄▓▒▒▓ █
▀▄ ▀▓████▓▀ ▓▓▓▀▐▓▓▓▓ ▓▓▓▓ ▓▓▓▀▐▓▓▓▓ ▓▓▓▓▌▓▓▓▀ ▓▓▓▓ ▓▓▓▓▌ ▀▓▓▓▓▓▓▀ ▄▀
▀▄ ▀▄ ▀▓▓▀ █▀ ▀▀▀▀▀ ▓██▓ █▀ ▀▀▀▀▀▀▀▀▀▀▀▀▓▀ ▀▀▀▀▀▀▀▀▀▀▀▀▀ ▄▓▓▓▀ ▄▀ ▄
▀▄ ▀▄▄▄▄▄▄▄▄▄ ▄▄ ▄ ▀███▄▄▄▄▄▄▄ ▄ ▄▄▄ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▓▓▓▀ ▄▀ ▄▀
▀ ▄ ▄▄▄▄▄▀ ▄▀
░ ░░▒▒▓▓ V i R i L i T Y ▓▓▒▒░░ ░ ░ Eboy ▀
p r e s e n t s
: ┌─────────────────────────────────────────────────────────────────┐ :
|░│ Ashampoo Mail Virus Blocker v1.02 (c) Ashampoo │░|
│▒├────────────────────────────────┬────────────────────────────────┤▒│
│▓│ │ │▓│
│█│ Supplier : TEAM ViRiLiTY │ Release Date : 30th Apr 2003 │█│
│█│ Cracker : TEAM ViRiLiTY │ Disks : 02 x 2.88mb │█│
│█│ Packager : TEAM ViRiLiTY │ Protection : Serial │█│
│█│ │ │█│
:│█├────────────────────────────────┴────────────────────────────────┤█│:
|│█│ │█│|
││▓│ Requirements: Windows PC │▓││
│|▒│ │▒|│
│:░└─────────────────────────────────────────────────────────────────┘░:│
└─────────── ─── ─ ─ ─ ─ ─── ─────── ── ───┘
│ Release Notes ██▓▓▒▒░░ ░ │
└───────────────────────────────────────────────────────────────────┘
Do the names Melissa, I Love You, Love Bug or AnnaKournikova ring
any bells for you? They are all viruses malicious programs that
can and do damage data and computer configurations and they have
all infected the machines of millions of users over the last couple
of years. And these are just a few of the more famous ones. There
are literally thousands more, and they are causing expensive damage
on computers all over the world, every day.
How do viruses spread by e-mail?
What all these viruses have in common is that they are spread as
"e-mail attachments" files sent together with the actual e-mail
message, usually identified by a paper clip symbol or something
similar. Just receiving an attachment isn't dangerous, but if you
execute it, which means running it like a program, it can basically
do anything it wants.
Many e-mail clients like Microsoft Outlook« Express don't provide
you with optimum protection to make sure that this doesn't happen.
They allow you to run attachments immediately just by clicking on
them, and sometimes attachments will even be run automatically as
soon as they are received.
At the moment almost all e-mail viruses spread via attachments.
However, there are also a few viruses that use another method click
here for more information on this.
Ashampoo Mail Virus Blocker protects you
This program gives you effective protection by identifying and
blocking potentially dangerous attachments before they are received
by your e-mail program. Depending on the settings you choose,
Ashampoo Mail Virus Blocker will either delete the mail containing
the attachment or it will rename the attachments. Renaming
attachments makes them harmless, because it is then no longer
possible to execute them by clicking on them.
What kinds of attachments are dangerous?
"Ordinary" data files containing pictures and text are generally
quite safe, although here too you also have to be careful with some
file types for example Microsoft« Word .doc files and other
Microsoft« Office files, which can contain "macro viruses" written
with Office's integrated programming language. (You can also block
these files with Ashampoo Mail Virus Blocker, see Attachments to
Block in the Program Options section.)
The main problem are "executable" files, which are files that are
either programs or behave like programs. These include "real"
programs, like the programs you start to run Microsoft« Word or any
other application, and "scripts", which are a special kind of text
file containing a list of commands to be performed on your
computer. For reasons that are a little too involved to explain
here, most of the e-mail viruses circulated over the last couple of
years have used script files to do their dirty work.
No matter whether they are programs or scripts, all executable
files have access to your entire computer. They can do anything
that you can do at your keyboard. They can delete and rename files,
copy and corrupt data, send e-mails using your address book or even
format your hard disk.
Ashampoo Mail Virus Blocker includes protection against the most
dangerous types of attachments in its standard options. In addition
to this you can also configure the program to block any other
attachment types if you want. See the Reference section for a
comprehensive list of all the major executable file types that can
be sent as attachments.
─────────────────────────────────────────────────────────────────────
| Install Notes ██▓▓▒▒░░ ░ |
└───────────────────────────────────────────────────────────────────┘
Install and use our included keymaker...enjoy ;)
┌───────────────────────────────────────────────────────────────────────┐
│ ┌─────────────────────────────────────────────────────────────────┐ │
||░│ Applying ██▓▓▒▒░░ ░ │░||
:│▒├─────────────────────────────────────────────────────────────────┤▒│:
│▓│ │▓│
│█│ YOU SEARCH FOR A WELL ESTABLISHED GROUP? │█│
│█│ GET IN CONTACT WITH US NOW IF YOU FIT TO ONE OF THE OPEN │█│
│█│ POSITIONS │█│
│█│ │█│
│█│ We are looking for: │█│
│█│ │█│
│█│ - talented crackers pc ( fast conn would be good ) │█│
│█│ you should be able to handle daily shareware protections │█│
│█│ and keygen them if possible. you may have experience with │█│
│█│ commercial protections like hasp... │█│
│█│ │█│
│█│ - someone who can supply fast, stable shells for legit things │█│
│█│ - software supplyer ( no webware ) │█│
:│█│ - siteops of well established +100mbit sites │█│:
|│█│ - somethin else that may help us │█│|
││▓│ │▓││
│|▒│ AND KEEP IN MIND THAT JOINING A GROUP TAKES A LOT OF TIME! │▒|│
│:░└─────────────────────────────────────────────────────────────────┘░:│
┌───────────────────────────────────────────────────────────────────────┐
│ ┌─────────────────────────────────────────────────────────────────┐ │
||░│ Contacting ██▓▓▒▒░░ ░ │░||
:│▒├─────────────────────────────────────────────────────────────────┤▒│:
│▓│ │▓│
│█│ email: NOT FOR PUBLIC │█│
│█│ irc: NOT FOR PUBLIC │█│
:│█│ www: NOT FOR PUBLIC │█│:
|│█│ │█│|
││▓│ │▓││
│|▒│ │▒|│
│:░└─────────────────────────────────────────────────────────────────┘░:│
┌───────────────────────────────────────────────────────────────────────┐
│ ┌─────────────────────────────────────────────────────────────────┐ │
||░│ Greetings ██▓▓▒▒░░ ░ │░||
:│▒├─────────────────────────────────────────────────────────────────┤▒│:
│▓│ │▓│
│█│ ACME - ARCTiC - BLiZZARD - CORE - CRO - ECLiPSE - LUCiD │█│
│█│ │█│
│█│ SAC(ESPECiALLY EBOY)- RENEGADE - TMG - UCF │█│
│█│ │█│
:│█│ and all other ppl who helped us │█│:
|│█│ (not listed due privacy) │█│|
││▓│ │▓││
│|▒│ │▒|│
│:░└─────────────────────────────────────────────────────────────────┘░:│
└─────────── ─── ─ ─ ─ ─ ─── ─────── ── ───┘
│ NFO by: Eboy^SAC Updated on 2003-04-22 by TEAM ViRiLiTY │
└───────────────────────────────────────────────────────────────────┘
IF YOU USE THIS SOFTWARE, BUY IT!
WE ARE DOIN THIS FOR FUN!