▄▄▄▄▄ ███ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
█████ ███ ███████████████████████████████████ █▀▀▀▀▀▀▀▀▀██████████████████
█████▄███████ ██▀▀ ▀▀█▀▀ ▀▀▀ █ ██████████████████
█████████████ ░██ ▀ ▄███▀▀██▄ ▄██▀▀▀█▄▄ █▌ ▐██▒ ██████████████████
▀▀▀▀▀▀▀▀▀▀▀▀▀ ░██ ▐█▀ ▀█▄█▀ ▄███▌ ▐██▒ GeC
▀▀▀▀▀▀▀▀▀▀▀▀▀▀█ ░██ ██ ███▄ ███▀ █████████▒ █▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
█████████████ █ ░██ ▐█▄ ▄█▌ ▀▀▀▓▄▄▄▄ █▌ ▐██▒ █ █████████████████
█████████████ █ ░██▄▄▄▄████▀▀ ▀██▀ █▄▄ ▀██▌█▌ ██ ▐██▒ █ █████████████████
█████████████ █ ▀▀ ▄▄ █▀█ ▀▀▀ ▄██ █ █████████████████
█████████████ ▀▀▀▀▀▀▀▀▀▀█▄▄▄▄▄█▀▀▀▀▀ █▄▄▄▄▄▄▄▄█▀▀ ▀▀▀▀▀▀▀▀▀ ███████ ██▀██████
███████████████████████▄▄▄▄▄▄▄▄▄████▄▄▄▄▄▄▄▄▄▄▄▄███████████████████ ██ ██████
▀▀
Program: Jammer v1.95 build 0809
Location: http://jammer.comset.net
Cracked By: Shaligar
Date: 17-08-99
█▀████ ▄▄
▄▄▄█ ██ █▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ██ ▄▄▄▄▄
██ █▄██ █
▀▀▀▀▀▀
-──Release noteS─--
For the registration click on Help/Register and enter:
Name: Shaligar^Lash
Serial number: 1234567-2D503C3951
█▀████ ▄▄
▄▄▄█ ██ █▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ██ ▄▄▄▄▄
██ █▄██ █
▀▀▀▀▀▀
-──Program noteS─--
Nowadays the virtual thieves don't need a special knowledge
to steal something from your computer. All they need to
attack you are special programs usually called Trojan Horses
or just Trojans (another name is Backdoors). These programs
are new and the mo st dangerous generation of computer
viruses, which allow to get a full access to your computer.
What kind of actions could be performed on your machine?
· Format your disk and delete all your works
· Steal your credit card number
· Download databases documents or any files from your
computer and upload as well.
· Monitor your current activity
· Determine all your passwords: dialup, web site access,
mail and other
· Use you computer to hack another one using a redirection
command.
To infect you with Trojan Horse an intruder has to trick you
to run the virus on your computer.
Here are the common examples how you can be infected with
such kind of viruses:
· While executing any kind of files from suspicious sources
from Internet.
· By opening the attachment of E-mail
· By a "friend" which may run a virus program on your
computer while you are away
· By executing files received via your on-line pager (i.e.
ICQ)
Let's suppose that you have been already infected. How does
a cracker attack and get a full control of your computer?
Intruders searches (scans) the Net for an infected user
(technically, attacker sends request packets to all users of
the specific Internet provider).
Infected machine replies to intruder's request with positive
answer "I am infected".
After the attacker has found an infected user, he connects
to the user's computer like to a server and makes a "link"
between both of the user's computer and that of the
intruder's one.
After the link is established (what may take a few seconds),
the intruder gets a full access to the user's computer. He
may do with user's computer everything he wants. Now the
attacker is a master and the user is a slave.
But fortunately you do not need to panic - Jammer detects
protects you from most wide spread Trojan Horses: Back
Orifice, NetBus and BO2K.
Jammer will remove from your computer:
· 4 modifications of NetBus
· 12 modifications of BackOrifice
· 2 modifications of BO2K (also known as BackOrifice 2000)
█▀████ ▄▄
▄▄▄█ ██ █▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ██ ▄▄▄▄▄
██ █▄██ █
▀▀▀▀▀▀
LasH Is:
[email protected][email protected][email protected]
Visit us at........................http://move.to/moreorlash
...................................http://moreorlash.cjb.net
Get our Releases at:
BBS Whq....................Alienated.......+31-(0)10-2102621
The Toxic Crack Page...........http://www.acay.com.au/~toxic
Or on a SWU BBS near you..................http://www.swu.net
█▀████ M O R E O R L A S H ▄▄
▄▄▄█ ██ █▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ██ ▄▄▄▄▄
██ █▄██ █
▀▀▀▀▀▀