.- .,-
.:+X@###$ .:/XM###% -=;;;;, .
,/XM######%= ./X##M###M%= -;X##M@#M##M$.
=%##M$%H@%; -X##@$%@@+;. =X##H:.. ,$##MM-
,+M##H. =. ,%###X..=. .%##X- ;###@-
+####/ %####; =M#M; ,@#@;
/M####;, %M###M;. /###; ,.
;M####M: /MM###M: /###+
.;@####$= .;@####+= =M##X
-$####H, -X####X, H#M#+ :/-
,%M##M, ,%###M. ,M###/ .%####,
/###H- /###H ;##M#/ .$M####H
. -:+=$##H/- .-;/=X##X;, .X###X, ,:$M$$####:
=+H##MHMMX:. .:%@##M@@MX; -H#M##@H@MMX: +###%
,$####MH/=. ,X##M##X/= -+%XX%/=, .H##@,
,=-.. ,==, ,@##=
=#M%.
:: Saints and Sinners Group :: ,;.
- p r e s e n t s -
SecurStar.DriveCrypt.v3.03a.WinALL.REGGED
http://www.securstar.de
__________ .__ .___ _____
\______ \ ____ | | ____ _____ ______ ____ | | _____/ ____\____
| _// __ \| | _/ __ \\__ \ / ___// __ \ | |/ \ __\/ _ \
| | \ ___/| |_\ ___/ / __ \_\___ \\ ___/ | | | \ | ( <_> )
|____|_ /\___ >____/\___ >____ /____ >\___ > |___|___| /__| \____/
\/ \/ \/ \/ \/ \/ \/
cracked by... SSG Team rls type.... Regged
tested by.... SSG Team date........ 07/15/2002
packed by.... SSG Team os.......... WinALL
supplied by.. SSG Team language.... English
protection... Serial disks....... 3 x 1.44Mb
_______ __
\ \ _____/ |_ ____ ______
/ | \ / _ \ __\/ __ \ / ___/
/ | ( <_> ) | \ ___/ \___ \
\____|__ /\____/|__| \___ >____ >
\/ \/ \/
DRIVECRYPT securely and easily protects all proprietary data on
notebooks and desktop computers 100% of the time without users having
to think about security. Any organization, from a small company to a
large international firm with thousands of users in the field, can
effectively protect business plans, client lists, product
specifications, confidential corporate memos, stock information, and
much more with this product.
How DriveCrypt`s On-the-fly Encryption Works
As data is read from the hard disk, DRIVECRYPT automatically decrypts
the data before it is loaded into memory. When data is written back to
the hard disk, it is automatically re-encrypted. The encryption/
decryption process is completely transparent to the user or any
application program -the data is caught "on the fly" as it transfers
back and forth between the hard disk and memory. Consequently, users
don't need to remember to decrypt or re-encrypt their data, or change the
normal operation of the PC. In addition, only individual files are
decrypted at any one time, not the whole hard disk.
DriveCrypt Key Features :
1. Strong Cryptography
1344 Bit Military Strength disk encryption using the best and most proven
cryptographic algorithms such as AES, Blowfish, Tea 16, Tea 32, Des and
Triple Des.
2. Easily Install, Deploy & Use
DRIVECRYPT requires minimal administration and user training.
It is completely transparent, requiring no change in the way users work
with the computer.
3. Maximize Your Security, Minimize Your Risk
DRIVECRYPT protects your data with very fast and a true "on the fly"
encryption process. Other products that claim to be "on the fly" decrypt an
entire file and load it into memory, creating significant security risks.
DriveCrypt is smarter and more secure because it decrypts only the specific
portion of a file that is in use.
Unprotected data never resides on a DriveCrypt encrypted hard drive.
4. Invisible Encryption (Steganography)
Using special so called "Steganographic" functionalities, DRIVECRYPT allows
you to hide all your sensitive information into music files. Just
authorized users will be able to access secret information, anyone else
will only find harmless music on the computerà
5. Disk Partition and file volume encryption
DRIVECRYPT allows both, the encryption of an entire Hard Disk partition, as
well as the creation of a virtual container file that will store all the
encrypted information.
6. Improve Password Security
DRIVECRYPT allows administrators to configure several password settings:
- Master Password Settings
- Restricted second user Passwords
- Second user Password Expiration
- Console Lock-Out Password
7. Password Sniffing Protection
DRIVECRYPT integrates special functionalities that prevent passwords from
being sniffed by Hackers or Trojan horses such as Back Orifice, SubSeven à.
8. No-Evidence Encryption
DRIVECRYPT container files do not have any file header that indicates it is
a DriveCrypt encrypted file. Therefore, without knowing the right
passphrase, it is impossible to prove that a large container file on the
computer is a DriveCrypt virtual disk container.
9. Administrator Password Control (keyfiles)
DRIVECRYPT allows system Administrators to assign different passwords to
different users.
10. Anti Dictionary or Brute Force Attack mechanism
DRIVECRYPT makes Dictionary or Brute Force attacks against encrypted
volumes much harder than any of the actual competitor products by
dramatically slowing down these processes.
11. Easy and fast hotkey control
DRIVECRYPT allows the most used commands like mount or dismount encrypted
volumesà to be rapidly accessed trough Hotkeys and/or the toolbar.
12. Second User Access
DRIVECRYPT allows the creation of a master password, as well as different
lower rights second user passwords (keyfiles).
13. Forgotten user password recovery
DRIVECRYPT allows administrators using the master password, to access an
encrypted disk even if the user has forgotten his user password. This
ensures that a company can restore a user password if forgotten. DriveCrypt
prevents loss of valuable data from user's workstations and notebooks by
allowing three methods of encrypted data access: the Master Password, the
user password (keyfile) and/or hardware device access such as
optional fingerprint-/Smartcard Readers or USB Token devices.
14. Eliminate the Danger Of Unattended Computers
DRIVECRYPT provides an automatic and/or manual lock-out feature that locks
out the user's console and displays a password-protected screen saver. This
lock-out functionality can be activated manually or automatically after a
specified period of computer inactivity. The computer remains secure even
when left unattended. To restore the screen and unlock the keyboard, the
password for the current user or Master Password must be entered.
15. Secure Disk Deletion (Disk Wiping)
DRIVECRYPT allows you to wipe the free space on a disk.
This ensures that deleted files will never be recovered by special disk
tools.
16. Encrypted Volume Resizing
An Encrypted Volume may, with time, become too small or too big, for the
amount of data it has to contain. Therefore, DriveCrypt offers you a
Volume-Resize functionality. This will allow you to easily adapt a volume
to your needs at any time, and optimise the Hard Disk space.
17. External Hardware Support
DRIVECRYPT supports optional external hardware devices such as: Fingerprint
and Smartcard reader, as well as USB token.
18. Works on any Storage Medium
DRIVECRYPT works on any kind of Hard Disk, and removable medium such as
Floppy-, Zip-, Jazz-, Sygate-, CD-Rom, DVD- Drives etcà and manages up to
16 TERABITE of encrypted data.
19. Installation is Easy and Safe
The installation is easy and fast. During installation, the administrator
simply selects the drives to be encrypted, the encryption method he would
like to use and the master password. DRIVECRYPT will then make the rest and
crypt the selected disks.
20. Encrypted Data is Easily Recovered
If a user leaves the organization, the encrypted data on the PC is easily
recovered and restored to a decrypted state by the administrator using the
Master Password or the Local Administrator Password.
_______ __
\ \ _____/ |_ ____ ______
/ | \ / _ \ __\/ __ \ / ___/
/ | ( <_> ) | \ ___/ \___ \
\____|__ /\____/|__| \___ >____ >
\/ \/ \/
Unzip, unrar
Under install use one of following serial numbers:
5108-0000-91AA-881D
0000-0000-0019-C887
0000-0000-01F6-703C
0000-0000-0226-4ADD
0000-0000-064A-22F4
2222-2222-2335-C777
ENJOY.
________ .___ _____
/ _____/______ ____ __ ________ | | _____/ ____\____
/ \ __\_ __ \/ _ \| | \____ \ | |/ \ __\/ _ \
\ \_\ \ | \( <_> ) | / |_> > | | | \ | ( <_> )
\______ /__| \____/|____/| __/ |___|___| /__| \____/
\/ |__| \/
We know who's in and who's not.
____. .__
| | ____ |__| ____ __ __ ______
| |/ _ \| |/ \ | | \/ ___/
/\__| ( <_> ) | | \ | | /\___ \
\________|\____/|__|___| / |____//____ >
\/ \/
Currently we are looking for:
+ shellbox owners/admins
+ talented crackers
________ __ __
/ _____/______ ____ _____/ |_ ______ _/ |_ ____
/ \ __\_ __ \_/ __ \_/ __ \ __\/ ___/ \ __\/ _ \
\ \_\ \ | \/\ ___/\ ___/| | \___ \ | | ( <_> )
\______ /__| \___ >\___ >__| /____ > |__| \____/
\/ \/ \/ \/
SSG's respects & hello's fly out:
SCOTCH - RPG2000 - SOD - DAMN - TMG - EMBRACE
_________ __ __
\_ ___ \ ____ _____/ |______ _____/ |_ __ __ ______
/ \ \/ / _ \ / \ __\__ \ _/ ___\ __\ | | \/ ___/
\ \___( <_> ) | \ | / __ \\ \___| | | | /\___ \
\______ /\____/|___| /__| (____ /\___ >__| |____//____ >
\/ \/ \/ \/ \/
[www] ...........[http://www.forget.about.it.org]
[e-mail]...........[removed for security reasons]
[irc] .............[removed for security reasons]
[nfo layout by bac/Offliner filled by SSG Team]
[logo by Offliner last update on 01/06/2002]