┌¬───────── ──¬── ── ── ─¬─── ─────────────── ──┴─────¬┐
╔══════════════════╦═══════════════╦════════════════════╗
║ | ║ ┬ ╚═╗
║ | =╝ ║ ┬ ╚=╗
║ ├═════╦═╩═╗ ║ ║ ║
║ ║ ║ ║ ║ ║
║ | ║ ║ ┴ ║
╔═╩═══┤ | | ╔= ║ ╔=╝
║ ║ | | ║ ╔═╝
╚══════════════════╝ ╚══════╩════════════╩══════════════╝
└¬────¬──── ─¬─── ── ──¬ ─── ───┴────────┬────── ──¬┘
┌─────────────────────────┐
├═-SEEK N' DESTROY╕ 2003-═┤
┌────────────────┴─────────────────────────┴────────────────┐
▓ ─ ── : RELEASE-INF0 : ── ─ ▓
└───────────────────────────────────────────────────────────┘
┌───────────────────────────────────────────────────────────────────
│║:
│║ Target: [ Ashampoo Mail Virus Blocker 1.01:[ http://www.ashampoo.com/products/0022/
│▓ Cracker: [ PuNk!DuDe
│▓ Crack Type: [ Keygen
│▓
│║ Release Date: [ 23/01/03
│║
│║:
└───────────────────────────────────────────────────────────────────
│──────────────────────────────────────────────────────────────────────┐
├───═══════════════════════════════════════════════════════════════────┤
┌ ┴ ── ────────────────────────────────────────────────────────────── ── ┴ ┐
││ [Target.Description] ││
││ ─ ── ─── ────── ·:
└─--··
Do the names Melissa, I Love You, Love Bug or AnnaKournikova ring any
bells for you? They are all viruses malicious programs that can and
do damage data and computer configurations and they have all infected
the machines of millions of users over the last couple of years. And
these are just a few of the more famous ones. There are literally
thousands more, and they are causing expensive damage on computers
all over the world, every day.
What all these viruses have in common is that they are spread as
"e-mail attachments" files sent together with the actual e-mail
message, usually identified by a paper clip symbol or something
similar. Just receiving an attachment
isn't dangerous, but if you execute it, which means running it like a program,
it can basically do anything it wants.
Many e-mail clients like Microsoft Outlook« Express don't
provide you with optimum protection to make sure that this doesn't happen.
They allow you to run attachments immediately just by clicking on them,
and sometimes attachments will even be run automatically as soon as they are received.
This program gives you effective protection by identifying and blocking potentially
dangerous attachments before they are received by your e-mail program.
Depending on the settings you choose, Ashampoo Mail Virus Blocker will either
delete the mail containing the attachment or it will rename the attachments.
Renaming attachments makes them harmless, because it is then no longer possible
to execute them by clicking on them.
Operating System: Windows« 95, 98, Me, NT 4.0, 2000, XP
For users of Windows« NT we recommend Service Pack 3 or later.
For users of Windows« 2000 we recommend Service Pack 1 or later.
Computer:
Ashampoo Mail Virus Blocker has no special hardware requirements.
If your e-mail program runs on your computer, then Ashampoo Mail Virus Blocker will run too.
RAM and disk space:
Less than 5 MB are required for the program files on your hard disk.
Software:
Ashampoo Mail Virus Blocker is designed primarily for use with Microsoft
Outlook« Express. It can also be used with any other e-mail
client that allows you to configure the necessary settings,
but these programs must be configured manually. You also need a POP3 e-mail
account like gmx or Yahoo!«-Mail. Important hint: this software works not
with Microsoft« Hotmail and AOL because these ones are no POP3 e-mail accounts.
│──────────────────────────────────────────────────────────────────────┐
├───═══════════════════════════════════════════════════════════════────┤
┌ ┴ ── ────────────────────────────────────────────────────────────── ── ┴ ┐
││ [Final Notez] ││
││ ─ ── ─── ────── ·:
└─--··
Generate and register with the supplied keygen.
┌──────────────────────────────────────────────────────────────────────────┐
││ -CONTACTS- ││
└ ─ ── ────────────────────────────────────────────────────────────── ── ─ ┘
└─│──────────────────────────────────────────────────────────────────────│─┘
| · [ WEB Site ............. http://zor.org/seekndestroy │
│ [ E-mail ............. [email protected] |
└─ ·· ·· ─┘