▄ ▀ ▀ ▄
▄ ▄▄█▀ ▀█▄▄ ▄
▄▀▀█▄ ▄█▀ ▄▄▀██▀ ▀██▀▄▄ ▀█▄ ▄█▀▀▄
▄ ▐█▄▀ ▄ ▀▀ ▄██▀ t h e c r a c k e r s o f ▀██▄ ▀▀ ▄ ▀▄█▌ ▄
▀▄ ███▄ ▀ ▄▄▄▀ ███ ███ ▀▄▄▄ ▀ ▄███ ▄▀
▀ ▄▄ ▀▀▀▄▀███▀ ███ ▄▄▄ ▄▄▄ ▄▄▄ ▄▄▄▄ ▄▄▄ ███ ▀███▀▄▀▀▀ ▄▄ ▀
███ ▀█▀ ███ ▄██▓▓██▄ ▄███▓██▄ ████▓██▄ ▐█▓▓███▓█▌ ███ ▀█▀ ███
███ ▀ ███ ██▓█▀▀███▌█▓██▀▀██▓█▐█▓█▀███▌ ▓▓██▀██▀▀ ███ ▀ ███
███ ███ ▐███▌ █▓█▐███▌ ▐██ ███▌ █▓█ ▐██▌ ███ ███
█████ ▐█▓█ ▐██▀▐███ ███▌███ ▄███▌██▓█▄▄▄ █████
███ ███▌ █▓█▌ ▐█▓ ▐▓███▓█▀ ▐██████▌ ███
▄█▄▄▄█▄ ▐███ ██▄▐███ ███▌███▀▀███ ▓██▓▀▀▀ ▄█▄▄▄█▄
[rAD!s] ███▀▀ ▀▀▄ █▓█▌ ▐██▌███▌ ▐▓█ █▓█ █▓█▌▐███▌▄▄ ▄▀▀ ▀▀███
██▀ ▐█▓██▄█▓█▌▐█▓██▄███▌ ███ ▐███ █▓███▓█▄ ▀██
▓██▄ ▀███▓██▀ ▀███▓▓█▀ ▐█▓█▌ ▐█▓▌▐▓██▓████▌ ▄▓█▓
▀▓▓█ ▀▀▀ ▀▀▀ ▀▀▀▀▀ ▀▀▀ ▀▀▀▀▀ █▓█▀
▓▌ ▄ ▀█▌ ▐█▀ ▄ ▐▓
▐▌ █ █▌ p r e s e n t ▐█ █ ▐▌
▓ ▓ ■▀▀ ▀▀■ ▓ ▓
▐▌ █▌ Digital Sentry v1.0.2 *INCL.KEYMAKER* ▐█ ▐
■ ▐█ █▌ ■
█▌ ▐█
▐█ Cracked by....: symmetry Release-Name..: CR-XVJ01.ZIP █▌
██ Supplied......: CORE Release-Date..: 2009/02/16 ██
██▌ Packaged......: Bergelmir Release-Type..: Util ██
█▓▌ Protection....: Serial OS............: MacOSX ▐▓█
▐██ Crack/SN......: Keymaker Language......: English ██▌
▐██▌ Rating........: [You decide!] Disks.........: 03 ██▌
▐██ ██▌
█▓█ █▓█
███ ▀█▄ ▄▀▀▀▄ ▄█▀ ███
███▄ ▀▄ ▄█▓▀▄▄▀ ▀▄▄▀▓█▄ ▄▀ ▄███
■ ▀█▓█▄▄ ▀▀▄▄ ▄▀▀ ▀▄ ▄▀ ▀▀▄ ▄▄▀▀ ▄▄█▓█▀ ■
▀▄▄ ▀▀█████▄ ▀▄ ▐ ▀▄▄ ▄▀ ▀▄ ▄▄▀ ▄▀ ▄█████▀▀ ▄▄▀
▀▀█▄▄▄ ▀█▓██ █ ▀ ▀▀█▄ ▄█▀▀ ▀ █ ██▓█▀ ▄▄▄█▀▀
▄ ▀▀██▀ ▀█ ■▀ ▄▀▀ ▐░▓ ▓░▌ ▀▀▄ ▀■ █▀ ▀██▀▀ ▄
▄■ ▄ ▄ ▐▌ ▒▒▌ ▐▒▒ ▐▌ ▄ ▄ ■▄
█▌ ▀ ▓▄▄▀ ▀▄▄ ▀▄▄ ▓▓█ █▓▓ ▄▄▀ ▄▀▀ ▀▄▄▓ ▀ ▐█
▐▓█▄▄▒ ▄▄▄██▀ ▀ ▄▄▓▓▀ ▀▓▓▄▄ ▀ ▀██▄▄▄ ▒▄▄█▓▌
▀▓█▓████▓▓█ ▄█▓▀ ▀▓█▄ █▓▓█████▓█▓▀
▀▀▀▀▀ ░█▀ ▀█░ ▀▀▀▀▀▀▀
░█ ▄▀▀▄ ▄▀▀▄ █
▐▌░▓▀ ▐▌ ▐▌ ▀▓░▐
▀▄ ▄▀ ▀▄ ▄▀
▀▀ ▀▀
▄■ ■▄ ▄▄▀ ▄▀▓▄
▄▓▀▄ ▀▄▄ █▌ ▀ ▓▄▄▀ ▀▄▄▓ ▀ ▐█ ▄▀▀ ▄▄▄ █
█ ▄▄▄ ▀▀▄ ▐▓█▄▄▒ ▄▄▄██▀ ▀██▄▄▄ ▒▄▄█▓▌ ▐▌ ▄▓░ ▀▀▄▄
▄▄▀▀ ░▓▄ ▐▌ ▀▓█▓████▓▓█ █▓▓█████▓█▓▀ ▀▄ ▀ ▀ ▄ ▀▄
▄▀ ▄ ▀ ▀ ▄▀ ▀▀▀▀▀ ▀▀▀▀▀▀▀ ▀▀▓░ █▀ ▐█
█▌ ▀█ ░▓▀▀ ■▀ ▓▌
▐▓ ▀■ ..: DESCRiPTiON :.. ▓▌
█▓ ▓█
█▓ ▓█
█▓ Digital Sentry monitors your system for specific events, and then ▓█
█▓ can perform a vast array of unique actions in response. Use it to ▓█
█▓ automate certain redundant computer tasks, perform covert ▓█
█▓ surveillance, or even protect your sensitive data during ▓█
█▓ unauthorized access or theft! ▓█
█▓ ▓█
█▓ Watch for such system events as waking from sleep, program ▓█
█▓ launches, closes, or switches, file modifications, incorrect ▓█
█▓ password attempts, mouse and keyboard input, and many more. Then, ▓█
█▓ perform any number of tasks like sending an e-mail, shutting down ▓█
█▓ the computer, starting a simulated self-destruct, pinging a web ▓█
█▓ URL, taking a web cam shot, taking a screenshot, playing a ▓█
█▓ multimedia file, speaking some text, executing a shell script... ▓█
█▓ the list goes on! ▓█
█▓ ▓█
█▓ Curious who's been using your computer while you make a quick trip ▓█
█▓ out of the room? Turn on the 'incorrect password' attempt monitor, ▓█
█▓ and have Digital Sentry take a picture of them with a web cam, ▓█
█▓ e-mail it to you, and then sending you a notification by text ▓█
█▓ message to your cell phone! Ideal for catching a thief in the ▓█
█▓ event your laptop has been stolen. ▓█
█▓ ▓█
█▓ Alternatively, use Digital Sentry to organize your life by ▓█
█▓ performing a task such as speaking a line of text on an interval ▓█
█▓ to remind you to get up from the computer and stretch, or to ▓█
█▓ perform a system backup. In the case of a backup, then even get ▓█
█▓ Digital Sentry to do it for you by executing a shell script. ▓█
█▓ ▓█
▐▓▌▄ ▄▐▓▌
▀░▀ ▀░▀
■▀ ▀■
▀▄ ▄▄ ▄ ▄ ▄▄ ▄▀
▀ ▄ ■ ▄▀▀ ▀ ▀▒▀ ▀▒▀ ▀ ▀▀▄ ■ ▄ ▀
▐▌ ▀ ▄ ▄ ▄ ▄ ▀ ▐▌
▄▓▀▄ ▀▄▄ ▀■ ▄ ■▀ ▀■ ▄ ■▀ ▄▄▀ ▄▀▓▄
█ ▄▄▄ ▀▀▄ ▄▀▀ ▄▄▄ █
▄▄▀▀ ░▓▄ ▐▌ ▐▌ ▄▓░ ▀▀▄▄
▄▀ ▄ ▀ ▀ ▄▀ ▀▄ ▀ ▀ ▄ ▀▄
█▌ ▀█ ░▓▀▀ ..: iNSTALL/REGiSTER NOTES :.. ▀▀▓░ █▀ ▐█
▐▓ ▀■ ■▀ ▓▌
█▓ ▓█
█▓ ▓█
█▓ 1. Make sure you're offline or use a firewall to block the ▓█
█▓ application from connecting to the internet. This is the only way ▓█
█▓ to get to offline activation. ▓█
█▓ ▓█
█▓ 2. Select "Activate Product" from the menu or you're given the ▓█
█▓ option on running the program for the first time. ▓█
█▓ ▓█
█▓ 3. Select "Activate this product now" and enter anything into the ▓█
█▓ buyer's email edit box (this email is never used in display or ▓█
█▓ algo, so it can be anything). ▓█
█▓ ▓█
█▓ 4. Hit the activate button, then it will give you a dialog to ▓█
█▓ activate offline (press "Yes" button). ▓█
█▓ ▓█
█▓ 5. Copy the "challenge code" into our keygen to generate valid a ▓█
█▓ "answer". ▓█
█▓ ▓█
█▓ 6. After this, the application can connect to internet and will ▓█
█▓ stay registered as far as I can tell (maybe they will change the ▓█
█▓ protection in the future, who knows...). ▓█
█▓ ▓█
█▓ ▓█
█▓ ▓█
█▓ ..: iMPORTANT NOTE :.. ▓█
█▓ ▓█
█▓ Run CORE10k.EXE to verify this release, if CRC-check fails or ▓█
█▓ even CORE10k.EXE is missing - you are probably using webshit! ▓█
█▓ ▓█
█▓ else ▓█
█▓ ▓█
█▓ Thanks for choosing ▓█
█▓ (C)hallenge (O)f (R)everse (E)ngineering! ▓█
█▓ ▓█
▐█▓ ▓█▌
▐█▓ ▄■ ■▄ ▄▄▀ ▄▀▓▄▓█▌
▀▄ ▀▄▄ █▌ ▀ ▓▄▄▀ ▀▄▄▓ ▀ ▐█ ▄▀▀ ▄▄▄
▄▄▄ ▀▀▄ ▐▓█▄▄▒ ▄▄▄██▀ ▀██▄▄▄ ▒▄▄█▓▌ ▐▌ ▄▓░ ▀▀▄▄
▄▄▀▀ ░▓▄ ▐▌ ▀▓█▓████▓▓█ █▓▓█████▓█▓▀ ▀▄ ▀ ▀ ▄ ▀▄
▄▀ ▄ ▀ ▀ ▄▀ ▀▀▀▀▀ ▀▀▀▀▀▀▀ ▀▀▓░ █▀ ▐█
█▌ ▀█ ░▓▀▀ ■▀ ▓▌
▄▄ ▄ ..: CORE NEWS AND iNFOS :.. ▄ ▄▄
▄████ ▀▄ ▄▀ ████▄
▐██▓██▌ ▐▌ ▐▌ ▐██▓██▌
██▓███ █ - not available - █ ███▓██
▐▓█▓█▌ ▄▀ ▀▄ ▐█▓█▓▌
█▓██ ▐▌ ▐▌ ██▓█
▐█▓▌ ▀▄▄ ▄▄▀ ▐▓█▌
██▌ ▀▄ ▄▀ ▐██
▀█ ▐▌ ▐▌ █▀
▓ ▄▀ ▀▄ ▓
▄█▀ ▀█▄
▄▀▀ ▀▀▄
▄▀ ▀▄
▄█▌ ▐█▄
▓█▌ ██▓
▐██ ▐█▌
██ ██
██ ██
██ ██
▓██ ██
▐██▌ ■▀▄ ▄▀■ ▐█▌
█▓█▄ ▐▌ ▐▌ ▄█▓
▀████▄▄ ▄▄▄▄█▀ ▀█▄▄▄▄ ▄▄████
████▓█████▀▀ ▀▀█████▓████
▐▓█ ▀▀▀ ▀▀▀ █▓▌
▐█▌ ▐█▌
▐█▌ ▐█▌
█▓ ▓█
▐█▌ ▐█▌
█▓ ▓█
▐█▌ ▐█▌
█▓ ▓█
█▌ ██
██ ▐█▌
▐█▌ ▐█▌
▐▓▌ ▐▓▌
██ ▄ ▀■ ■▀ ▄ ██
▐▓▌ ■ ▀ ▀ ■ ▐▓▌
██ ▄█▀▀▄▄ ▄ ▀ ▀ ▀ ▀ ▄ ▄▄▀▀█▄ ██
▐▓▌▄▀▀ ▀█▄ ▀▓▀ ▀▓▀ ▄█▀ ▀▀▄▐▓▌
██ ▀ ▀ ██
███ ███
▓██ ██▓
▐██▌ ▐██▌
▓██ ██▓
██▓ ▓██
▓██ █▓█
███ ███
███ ███
██ ██
▐▌ ▐▌
█ ▄▄▄ ▄▄▄ █
█ ▄▀▀ ▀▀▄ lAYOUt & hEADER bY. [rAD!s] ▄▀▀ ▀▀▄ █
▀▄ ▀▄ █ nfO UPdATED ON [2008/01/08] █ ▄▀ ▄▀
▀▀▄▄▄ ▄▄▄▀ ▄ (c) C.O.R.E. 2 0 0 9 ▄ ▀▄▄▄ ▄▄▄▀▀
▀▀▀▀▀ ▀▀▀▀▀
· CRC DE23:9322