Download ShyFile v6.0 keygen by TSZ

Added to site2003-12-31
Rating85/100
Votes4


shyfilev6.0keygentsz.zip (31025 bytes)

namesizecompressed
tsz.nfo 17526 7104
file_id.diz 295 142
SHYF-DUC.exe 53248 23435

tsz.nfo

                    ▄
                  ▄▄▓▄▄
                   █▀▓            ▀
                  ▀   ▀             ▀▄                  ▀   ░
                              ▀    █░              ▄▓▄     ▀▄░
                     ▀            █▓░   ▀░          ▀       ▓█
                  ▀            ░   ▀▀▄                ▀    ░▄▀
           ▄ ▀  ▄█▀    ▀░ ░▀ ▄ ▓▓░░ ░ ▄ ▄▄▀   ▀ ▄  ▀      ░█▓░  ▄  ▀
          ▀▓▀ ▄█▀ ▄  ▀    ▄▄█▓░░ ░   ▀▓▀   ▄█  ▀▓▀   ▄  ▀ ▀▀ ▄▄█▓░
         ▄▄   ▓█ ▀▓▀ █▄▄█████░░    ▀    ▄▄███   ▄   ▀▓▀ █▄▄█████░░  ░
       ▄▀▀▀█▄  ▀▀ ▄▄▀█▓ █████░ ▄ ░  ▄▄▄▀█████ ▄      ▄▄▀█▓ █████░  ▄▓▄
      ▀▓▀ ▄█ ▄▀█████ █░ █████   ▀█████  █████ ▓█  █████ █░ █████  ▀▄▀
         ▄█▓   █████ █  █████░░ ░█████  ▀▓███ ░█ ▄█████ █  █████  ░██
         █▓░  ▀█████░█ ▓████▓  ░█████▀ ▓▄  ▀▄▄▀   █████ ▓ ░█████  ░▓█
         ██    █████ █ ███▀ ░  ███████ ▀  ▀   ▀ ▄▓▄▀▀██ ▀ ▓████▓  ░▓█
          █ ▀  ██▀▀▓ █ ▀       ▓ █████▀▀████▄ ▄  ▀   ░▀ ▀▄███▀  ▀ ▄▀  ▀
           ▀▄ ▄▀  ░  █▓  ▄▓▄  ▄ ▄▀███▓  █████  ▄   ░ ▄▄█▀▀▀  ▄▄▄▄░
        ░  ▀▓▀       ██   ▀   ▓  ▄ ▀ ░  ████▓ ▀▓▀ █████ ▄  ▄▓███░ ▀▄░
            ▄ ▄▀  ▄▄ ██     ▄     ▄▄  ▀ █████ ░   ▓████ █ ░█████  ░▓█░
          ▄█  ▄▄███████▄▀█ ▀▓▀ ▄▄████▄ ▄███▀▀  ▄  █████ █  █████ ▀ ░▓█
         █▓▀ ████▀█████▀▀    ▀████▀█████▀    ▀▀▓█ █████ ▓ ░████▀   ▓█░
         █▓░██▀  ▄ ▀█▀   ▄██▄ █▀ ▄▄ ▀█▀   ▄██▄ ▓█ ████▀▄░ ▄█▀░ ▄██▄▀░
         ▀█░ ▀█▄▄    ▄▄▀▀ ▄█▓ ▀█▄▄ ▀  ▄▄▀▀ ▄█▓ █▀  ▀█▄▄ ▀▀ ▄▄▀▀ ▄█▓
       ▄▓▄ ▀▄   ▀▀▀▀▀▓ ▀ █▀▀░ ▄  ▀▀▀▀▀▓  ▄ ▀ ▄▀    ▄  ▀▀▀▀▀▓   █▀▀░
        ▀     ▀                  ░                              ▄▄
        ▀ ▄▀▀█▄ ▄    ░   ▀▄   ▀             ▀   ▀  ▄     ░  ▄▓▄▀  ▀▄
         ▀▓▀ █▓               ▄     SAFETY     ▄            ░▀░ ▄█▀▓▀
            █▓░     THE      ▀▓▀              ▀▓▀              ░█▄   ▄
        ▄   ▀▓▄  ▄        ░    ▄   ▄▄▀  ▀▄▄   ▄      ZONE     ░▄▓▀
             ▀███▄▄▄▄▀        ▄▄▓▓█▀      ▀█▓▓▄▄   ▄   ░▄▄▄▄▄███▀
               ░▀▓███████▄▄███▓██▀    is  ▀ █▓████▄▄▄██████▓▀░█░
       ▄▓▄█▄    ░▄███▀▀▓█████▀█▀  presenting ░▀▀▀████▀▀▓███▄  ▓
        ▀      ▄▓███▓  ░ ▓    ▓ ▀    you:               ░▓███▄    ░
         ░   ░▓████▀░    █ ▀ ░▀                   ▀░     ░ ▀███▓▄░  ░  ░
      ▀     ░▓███░                                           ░███▓░  ▄▓▄
  ▄▓▄    ░▄▄███▀ ░                                           ░ ▀▓██▄▄ ▀  ▄
   ▀ ░▄▄████▀░                     ShyFile v6.0              ▀  ░▀████▄▄
    ▓█████▓░ ░   ░                                           ░     ░▓████▓░
   ░█████▓░   ▄                                                  ▄  ░▓█████░
   ▓█████▓░  ▀▓▀  ▀                                ▄     ▀      ▀▓▀ ░▓█████░
   ░█▓▀███▓▄▄░  ▄▄▄████▄▄░ ▄                       ░ ░▄▄████▄▄▄░  ▄▄▓███▀▀░
   ░█░  ░▀▀▀██████▀▀▀▓████░                         ░████▓▀▀▀██████▀▀▀█░▄
   ░█   ░  ░░        ░▓████▄      ▄        ▄      ░▓████▓▄▓▄   ▄ ░░   █ ░
    ▓       ▀    ▄▓▄ ░▓█████▀ ▀           ▀░▀  ▀ ▀██████▓░▀    ░  ░   ▓
        ░       ▄ ▀ ░▄███▀▀░░                      ▀▀████▄    ▄       ░
                 ▄ ▀▀▀▀                                 ▀▀▀▀ ▀

            SUPPLIER   : Foduck                 DATE     : 2003-01-25
            PACKAGER   : Foduck                 OS       : WinALL
            CRACKER    : Foduck                 DISCS    : 08
            PROTECTION : Serial                 LANGUAGE : English

                        URL: http://www.shyfile.net


                                                                        ▄
          ▄▄                                                       ░   ▓░ ▄
      ░  ▀▄▄▄   ░           ▄                           ▄          ░▄▄▄██▀
  ▄▓▄ ▓   ░▀████▓▄   ▄▀▀▄  ▄                         ▄ ▄▓▄ ▄ ░░ ▄██████▄▄ ▄
   ▀  █▄▄▄███▓▀▀▀▀█▄▀     ▀▓▀ .o.     info     .o. ▄    ▀      ▄▀▀██▄░█   ▄
     ▄██▀▀░     ▄   ▀                                       ▄  ░   ▀▀▀█▄ ░▓▀
    ▀ ▄                                                     ░         ▓ ▀
      ░            


     How to create self-decrypting files 
     that contain your encrypted text: 
     It takes just a few easy steps to encrypt some text and to put it 
     into a self-decrypting, yet harmless HTML-application file. Enter 
     your key, enter your text, select a folder to save your ShyFile in 
     and click the Encode button. That's it. Any recipient of an email 
     having a ShyFile attached to it simply uses an Internet browser 
     [preferably MSIE 5.0 and above] to decode. The HTML-application file 
     is wrapped around the actual JavaScript self-decrypting algorithm 
     that will decode its contents. 
     
     encrypting HTML webpages: 
     The latest version also allows the user to encrypt HTML webpages of 
     up to 80k (ShyFile encrypts the source code only) and turns them 
     into self-decrypting files to be uploaded to a website. Use your 
     browser to decode, no installation of ShyFile and no extra applet 
     necessary.  
     
     encrypting binary files: 
     ShyFile will also encode all kinds of binary files [e.g. those 
     having a -jpg, -gif, -bmp, -doc, -xls, -cls, -mp3 or even an -exe 
     extension]. It has never been easier to encrypt, e.g. your MS 
     Word-document in a way no Secret Service on this planet could ever 
     get access to. But those files containing encoded binary information 
     cannot be opened using an Internet browser alone, i.e. they require 
     the actual ShyFile software to decode. Any ShyFile installation can 
     be used to decode, regardless whether it's the full version or an 
     expired evaluation copy. 
     
      Unique 1on1 (symmetric) key entries prevent anyone -even us- from 
     accessing your messages (as long as you don't give your passphrase 
     out, of course). No cryptographic experts, nor any military crypto 
     experts in particular, who do not know the passphrase, were ever 
     able to crack and decode a document previously encoded by ShyFile.  
     
     No key recovery. There is no master key. If a ShyFile user loses his 
     key entry, nobody will be able to retrieve the original text (or 
     original plain binary data) anymore, neither the user nor the 
     software developer.  
     
     ShyFile does not provide any information of key entries to a 
     so-called Trusted 3rd Party nor does it employ any Public keys. You 
     don't have to worry about having to trust any Trusted 3rd Parties. 
     ShyFile secures your regular 1on1 communication, from one ordinary 
     email account to the other, no 3rd party in between, no extra 
     registration at any additional service providers, nor any 
     key-validation hosted by a 3rd party necessary. 
     
     ShyFile's decoding algorithm is published on the open source 
     code-page at our website.. 
     
     One of the most interesting aspects of this application is that in 
     the process of encoding, the userÆs plain text (or plain binary 
     data) is mixed up with randomly created junk data. The junk data is 
     created by an exclusively developed random generator and not by the 
     random generator that comes within the Windows operating system. 
     This is done to avoid any discussions whether the Windows random 
     generator is as random as it should be. Therefore, upon every 
     installation of the software, the user will need to enter a few 
     arbitrary characters to initialize that random generator. 
     
     How does ShyFile's algorithm work? 
     The ASCII value of one character is added to next characterÆs ASCII 
     value, regardless whether itÆs a plain text character or a 
     junk-data-character. An interim sum is rendered of those two values 
     that represents a new ASCII character itself. The interim sum of the 
     first two characters is the basis for the next rendition of interim 
     sums to generate next ciphertext-characters to follow, and so on . . 
     . All values representing the ciphertext characters are influenced 
     by the junk-data-characters added in the outset. This way, a single 
     encoded character cannot be related to a character of the original 
     plain text, no so-called æcodebookÆ could be found anymore.  
     From that point on, all characters are separated into nibbles (4bit 
     half-bytes) and the sequence thereof is twisted pseudo randomly by 
     the information the user has entered as the actual key 
     (pass-phrase).  
     
     
     
     ShyFile's enhanced TL6144D algorithm 
     
       
     
     
     There are algorithms out there that distort the plain text 
     information in the fanciest ways but keep the actual order of all 
     encoded characters (ciphertext) as they were in the outset. ShyFile 
     twists the order of those bytes and nibbles of the whole ciphertext 
     like a whirlwind.  
     
     When decoding a ShyFile, the key entry entered by the user, is not 
     used to simply determine whether subsequently a certain algorithm is 
     initialized to decode your data, or not, but it rather becomes a 
     major part of the whole algorithm itself. Within a ShyFile the 
     symmetric key entry per se is not transmitted. Your key entry 
     directly determines the way your text is encrypted. Your key entry 
     becomes the algorithm itself. 
     
     ShyFile employs a variable key length of minimum 32 characters 
     (rendering 192bit encryption) or even 64, 128, 256, 512 and up to 
     1024 characters (rendering 6144bit in a military fashion). You may 
     enter any character as your key, whether it's a letter or something 
     like "#{}[]-_( *)&^%$#!" just make sure you enter at least 32 
     characters.  
     
     ShyFile encodes your sensitive data with an algorithm rendering a 
     depth of encryption of up to 6144bit, which means it will take a 
     potential hacker not knowing your password 2 to the power of 6144 
     possibilities (that equals a figure with 1,850 digits) to crack it. 
     Ten thousand years won't be enough time to go through all these 
     possibilities using the best technology available (127 Giga 
     keys/sec.).  
     
     Imagine you encode the same text a thousand times, at every time 
     using the same key entry, ShyFile will render some encoded data 
     (ciphertext) that at every time is different in its contents from 
     the one before. If the user enters a 192bit key (made of 32 
     characters min.) there are max. 2 to the power of 192 possibilities 
     a potential hacker needs to go through in order to crack the plain 
     text. And, this is the interesting part, there will be also 2 to the 
     power of 192 variations how the encoded data stream can look like. 
     If the user chooses to enter a 6144bit key (made of 1,024 characters 
     min.) there will be up to 2 to the power 6144 variations the encoded 
     data stream can look like.  
     
      Use the integrated random key generator to get a 6144bit key entry 
     consisting of 1,024 characters easily generated by a single click on 
     a button. Those characters are also generated by ShyFile's own 
     internal random generator. 
     
     No product is secure if used improperly. You can be the weakest link 
     in the chain if you use any encryption product carelessly. Make sure 
     not to let other people gain access to your key entries.  
     
     Don't be fooled! It is a known fact that asymmetrical encryption of 
     512bit can be cracked by applying factorization to it. Even if you 
     decide not to use ShyFile don't go for any asymmetrical encryption 
     that does not even at least reach that minimum depth of encryption. 
     Remember that ShyFile is a symmetric encryption tool. To compare 
     asymmetry and symmetry encryption, a 1024bit asymmetric is 
     approximately equivalent to an 80bit symmetric key. Therefore even a 
     depth of symmetric encryption of something less than 512bit will be 
     sufficient to provide very good security. However, that's about the 
     only comparison in key size that can be made, in that symmetric / 
     asymmetric systems have different design properties as well as 
     attack methods. 
     
     Unlike some other applications on a Windows system ShyFile is a very 
     stable running software. 
     
     According to German Law we do not have to leave a backdoor open for 
     any public agencies, so we didn't. 
     
     If strong encryption software is made in the USA, can it be 
     exported? Strong cryptography is considered dangerous munitions by 
     the United States and requires approval from the US Bureau of Export 
     Administration, under the US Department of Commerce, before it can 
     leave the country. Chances are, if the software has been approved 
     for export, the algorithm is weak or crackable. However, ShyFile is 
     a German product and there are no restrictions on limiting the depth 
     of encryption of products exported out of Germany.  
     
     File Shredder: 
      ShyFile also features an integrated File Shredder to provide secure 
     file deletion. Click the File Shredder button and browse for a file 
     which sensitive contents you want to have completely erased. Normal 
     file deletion only removes a file's directory entry, but leaves the 
     data contained in the file on your disk drive. File Shredder 
     completely overwrites the contents of a file 7 times, changes its 
     date and then deletes it. Files selected for shredding can not be 
     recovered using an undelete program. The purpose of the File 
     Shredder is to completely wipe confidential files and their contents 
     from you disk drive. Once a file has been shredded it can not be 
     recovered using sophisticated file restoration utilities. 
     
     


                                                                        ▄
          ▄▄                                                       ░   ▓░ ▄
      ░  ▀▄▄▄   ░           ▄                           ▄          ░▄▄▄██▀
  ▄▓▄ ▓   ░▀████▓▄   ▄▀▀▄  ▄ .o.     install     .o. ▄ ▄▓▄ ▄ ░░ ▄██████▄▄ ▄
   ▀  █▄▄▄███▓▀▀▀▀█▄▀     ▀▓▀         crack        ▄    ▀      ▄▀▀██▄░█   ▄
     ▄██▀▀░     ▄   ▀                 notes                 ▄  ░   ▀▀▀█▄ ░▓▀
    ▀ ▄                                                     ░         ▓ ▀
      ░                                                               ░


     Unzip, unrar, install, and use the supplied TSZ keygenerator to 
     register your product. 
     


          ▄▄                                                       ░   ▓░ ▄
      ░  ▀▄▄▄   ░           ▄                           ▄          ░▄▄▄██▀
  ▄▓▄ ▓   ░▀████▓▄   ▄▀▀▄  ▄                         ▄ ▄▓▄ ▄ ░░ ▄██████▄▄ ▄
   ▀  █▄▄▄███▓▀▀▀▀█▄▀     ▀▓▀ .o.     news     .o. ▄    ▀      ▄▀▀██▄░█   ▄
     ▄██▀▀░     ▄   ▀                                       ▄  ░   ▀▀▀█▄ ░▓▀
    ▀ ▄                                                     ░         ▓ ▀
      ░                                                               ░


     open positions:

     crackers, experienced only
     shell supplier (eu/us)


               ░                                                   ▄
            ▄▄ ▓                                               ░   ▓░ ▄
        ░  ▀▄▄▄▀  ░           ▄                     ▄          ░▄▄▄██▀
    ▄▓▄ ▓   ░▀████▓▄   ▄▀▀▄  ▄ .o.  contact  .o. ▄ ▄▓▄ ▄ ░░ ▄██████▄▄ ▄
     ▀  █▄▄▄███▓▀▀▀▀█▄▀     ▀▓▀                 ▄   ▀      ▄▀▀██▄░█   ▄
       ▄██▀▀░  █  ▄   ▀                                 ▄  ░   ▀▀▀█▄ ░▓▀
      ▀▀▓      █            EMAIL: [email protected]     ░         ▓ ▀
     ▀  █ ░   ░▄                                                  █░
        ▀█▓▄    ▄▓▄                                       ░    ▀ ▀▓▄▄   ░
       ▀██▄ ▀▄▄  ▀           ░                                   ░█▀████▄▄
       ▀▓█▓▄         ░    ▄▄▄▀                      ░▀▄▄▄▄ ▄         ▀▀▓██▓
         ███▓▄▄   ▄▄▄██████▀                           ▀▓███▓▄▄▄▄░░▄▄▄▓██▓░
       ▄ ░██▀██████▓█▀▀▓▀                                 ▀█▀▀████████▀▀▀
          ▀█▓ ▄ ▓██▀▀   ░▄                           ░    ▀ ▄   ▄▓███▀  ░
        ░  ▀▀ ▄████▄▄  ▀▓▀       some greets to:             ░▄██████▓
          ▄▄███████░                                    ▀ ▀ ▀▀████▓███░ ▄▓▄
         ▓█████▓▀▀   ░                                        ▀███████░ ▀
        ██████▓▓░       TMG . ECL . UCF . TNO . dF . CORE   ░   ░▓████▓██░  ░
       ██▀█████▀▀▀▀                                             ░▓███████
     ▄▀▀░ ████▓▓    ▀                                          ░▓█████▀███▄
 ░  ░ ▀▓▀█░█▓██▓░        ░                                   ░█████▓░ ░▀▓█
         █▓░▄██▓█  ▀     ░                     ░      ▓      ░▀ ▀████▄  ▄▀
         █▓░▓█▓▓░     ░  ▓   ░▄▄▄▀              ▀▄▄▄░ █        ░ ▓████  █░
        █▓░  ███▓▄▄░  ▄▄▄██████▀                  ▀▓███▓▓▄▄   ▄▄▄███▀░  ▓
         ▀▄▄ ░▀▀███████▓██▀▓▀     .ascii^jered.    ░ ▀█▀▀████████▀▀     ░
                   ▓▀▀▀▀ █ ░                          ▓    ▓▀▀█░ 
                   ░     ▓   LAST UPDATED: JUNE 2002  ░       █
                   ░                                          ▓
                                                              ░





file_id.diz

ShyFile v6.0
    .                       [xx/08]
   /|       ______________________.
  / |_____ /   __   /            /
 /   ____/<_  /____/_________   /
/   |       >______   \   _____/_
\___       /__        /__        \
    \_____/   \______/  /_________\
                       .




# 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z