░ ▄
LUCiD : Challenge the impossible ░ ▀ ▄ ░░ ░ ▄ ▀ ▄
░ █▄▄ ░░░ ▄▄████▄ ░ █▄▄
░ ░ ░ ░ ░░ ███▄ ░░ ▐███████▌ █▓█▄
░░ ░ ▄ ░░ ░ ░░ ░░░ ▄ ░ ▐▓███▄ ██▓██▓▓▒░ ░ ▐█▓▓█▄
▀▄ ░░░░░ ▄ ▄ ░░░░░░ ▄ ░░░░ ▄ ░░ ▄██▓▓███▄▄ ▀▀███▀ ░ ███▓▓█▄
▐██▄ ░ ▄██ ▐██▄▄ ░░░░▐██▄ ░ ▄██ ▄█████▓██▓▓██▀ ▄█▄ ▀■ ░░ ▐██████▌
█▓██▄████▌ ░ █▓████▄▄ ░ █▓██▄████ ▄███▓▓█▀ ▀█▓▓▓█ █████▄ ░ ▀ ░░ ████▓██
▐█▓███▓██ ▐█▓██████▀ ▐█▓█████▌▐██▓▓▓█▌ ░ ▐█▓█▌▐█▓▓▓██▌░░ creepah ▐██████▌
█▓▓█▓▓▓▌ ░░ █▓▓████▌░ █▓▓████ ██▓▓███ ░ ▄████ █▓▓▓███ ░░ ░ ███████
█▓▓▓▓▓█▌░ ░░ █▓▓▓▓██▌░ ▐▓▓▓▓██ █▓▓▓███ ░ ▐█▓▓███▌░░ ▄▄▄ █████▓█
░ █▓▓▓▓▓█ ░ ░░ █▓▓▓▓▓█ ░ ▐█▓▓▓█▌▐▓▓▓███▌░ █▓▓████ ░ ▄▄███████▄███████▌
██▓▓▓██ ░ ░░ ██▓▓▓▓█ ░░ █▓▓▓█▌▐▓▓▓███▌░ █▓▓████ ░ ██▓▓▓██▀ ██████▓█▌
██▓▓███ ░ ▀▀▀▀▀▀█▌ ░░ ██▓▓▓█ █▓▓▓███ ░ ▐█▓▓███▌ █▓▓▓███ ░░ ▐████▓▓█
░ ▐██▓███▌░ ▀███████▄ █ ░ ███▓▓█▌██▓▓▓██ ░ ▀████ ██▓▓███ ▐▓▓████ ░ ███▓▓▓█
░ ▐██████▌ ░ ▐██▓███▌▐█▌ ▐██▓▓▓▓▌▐██████▌░░ ▐▓██▌▐██▓▓██▌▐█▓▓███▌░ ▐██▓▓▓▓▌░
░░ ████▓██▄ ▄██▓▓▓██ ███▄▄██▓▓▓██ ███▓███▄ ▄██▓██ ████▓██▄██▓▓███▄ ▄██▓▓▓██
░░ ▀███▓█████▓▓▓▓█▌▄██▓█▓▓▓▓██▀ ▀▀███▓▓█▓▓▓▓▓█▄ ▀████▀ ▀▀███████████▀▀ ░
░░░ ▀▀▀▀██▓▓▓▓█▀ ▀▀▀▀▀▀▀ ░░ ▀▀▀▀██▓▓▓██▀▀ ▀▀ ░░░ ▀▀▀▀▀ ░░░░
░░░░░░░░░░ ▐█▓██▀ ▐█▓██▀ ░░░░░░░░░░░░░░░░░░░░░░░░
░░░░░░ ▓██▀ The demons of █▓█▀ ░░░
░░░ █▀▀ resistance rise once █▀▀ ░░ endless torment and pain
░ ▀ again to put a curse on ▄ ▀ ░ in hell you will gain
░ ▄▄▓ ░ ▓▄▄
▄▄███▓███▄▄▄ BestCrypt v7.12.02 ▄▄▄███▓███▄▄
▀▓█▀ ▀█▀ ▀▀▀▀▄ Copyright ⌐ 1995-2005 Jetico Inc ▄▀▀▀ ▀█▀ ▀█▓▀
▀ ▄█▄ ▄▀ ▀▄ ▄█▄ ▀
▄▀ ▀▓█▌ [ Supplier.: TEAM LUCiD ]-[ Disk(s)...: 1 x 4.88 MB ] ▐█▓▀ ▀▄
▐▌░ ▐█ ░ [ Cracker..: TEAM LUCiD ]-[ Protection: Easy ] ░ █▌░ ▐▌
▀ ▄ █ ░ [ Released.: May 2005 ]-[ Formats...: ZiP/RAR ] ░ █ ▄ ▀
░ ▄ ░▐▌ [ Type.....: Utility ]-[ OS(s).....: WinALL ] ▐▌░ ▄ ░
▄▓█▄ ▀▄ ▄ ▄ ▄▀░ ▄█▓▄
▀▀██▄▄ ▀ ▄▄▄▄▄▄▄▄▄▀▀ ▀▀▄▄▄▄▄▄ ▀ ▄▄██▀▀
▀▀▓▀▀ ▄ ▀ ▀▀▀▓▀
▄▄▓ ▄▀ ▀▄ ▓▄▄
▄▄███▓███▄▄▄ ▄ ▄█▄█▀ ▄ RELEASE NOTES ▄ ▀█▄█▄ ▄ ▄▄▄███▓███▄▄
▀▓█▀ ▀█▀ ▀▀▀▀▄ ▀▓ ▀▓▄▄▄▄ ▄▄▄▄▓▀ ▓▀ ▄▀▀▀▀ ▀█▀ ▀█▓▀
▀ ▄█▄ ▄▀ ▀ ■▀ ▀▀▀▀▓▀▀▀▀ ▀■ ▀ ▀▄ ▄█▄ ▀
▄▀ ▀▓█▌ ▐█▓▀ ▀▄
▐▌░ ▐█ ░ BestCrypt creates and supports encrypted virtual disks. ░ █▌░░▐▌
▀ ▄ █ ░ ░ █ ▄ ▀
▐▌ ░ These disks are visible as regular disks with ░ ▐▌
░ █ ░ correspondent drive letters. The data stored on a ░ █ ░
░ █ ░ BestCrypt disk is stored in the container file. ░ █ ░
░ ▓ ░ ░ ▓ ░
▒ ░ A container is a file, so it is possible to backup a ░ ▒
░ ░ container, move or copy it to other disk (CD- ROM or ░ ░
░ network, for instance) and continue to access your ░
░ encrypted data using BestCrypt. ░
░ ░
░ Any free drive letter in the system may be used to mount ░
░ and to open an encrypted file-container for access. When ░
░ the virtual disk is opened, you can read and write data as ░
░ if it were a conventional removable disk. ░
░ ░
░ How does BestCrypt work? BestCrypt creates a pre-encrypted ░
░ file called ░
░ a container. This container is created by an encryption ░
░ algorithm (Twofish, ░
░ Blowfish, Rijndael, or GOST28147-89). ░
░ ░
░ In addition, BestCrypt creates a logical disk. The ░
░ container is linked to a logical disk, and the disk is ░
░ opened for access using the unique container password. All ░
░ data stored in the logical disk are stored in the ░
░ container in an encrypted form and transparently ░
░ accessible for an authorized person. ░
░ ░
░ Containers of BestCrypt version 7 software are compatible ░
░ with previous ░
░ versions of BestCrypt containers. ░
░ ░
░ But there are few limitations here: Windows 95 and DOS ░
░ operating systems do not support NTFS filesystem. So, if ░
░ you format a BestCrypt container in Windows XP/2000/NT ░
░ using the NTFS filesystem, it will be impossible to mount ░
░ the container on Windows ME/98/95/DOS computers. ░
░ ░
░ Features: ░
░ * 1. The BestCrypt software is designed for Windows ░
░ 95/98/ME/NT/2000/XP operating systems and satisfies all ░
░ requirements for 32-bit software. 32-bit BestCrypt Virtual ░
░ Device Drivers are designed for Windows 95/98/ME and ░
░ Windows NT/2000/XP file systems and they use all available ░
░ advantages of the operating systems. ░
░ ░
░ * 2. There are no limitations to the number of local ░
░ physical drives on which a user stores BestCrypt ░
░ containers. Any type of physical media may be used to ░
░ store and access the data on the BestCrypt containers: ░
░ hard drives, removable media, magneto-optical devices, ░
░ etc. ░
░ ░
░ * 3. Any network accessible disk may be used by BestCrypt ░
░ software for creating and accessing file-containers. This ░
░ network disk may be shared by a server with any operating ░
░ system, for example UNIX-like operating systems (OSF/1, ░
░ LINUX, BSD, SunOS, HP/UX, AIX and others), Novell, Windows ░
░ NT/2000/XP, Windows 95/98, Windows 3.xx, etc. ░
░ ░
░ * 4. User may copy (backup) BestCrypt containers from one ░
░ computer to another in network and continue to access ░
░ encrypted data without any limitation on the operating ░
░ system type. For example, a user may copy or move a ░
░ file-container from a computer with a Windows operating ░
░ system to a UNIX computer, yet continue access the data ░
░ (now stored inside the container on the UNIX computer) ░
░ from the Windows computer. Note that there is a separate ░
░ version of BestCrypt for the Linux operating system. For ░
░ more details on the software, you may visit our website: ░
░ http://www.jetico.com/linux.htm . ░
░ ░
░ * 5. Automatic closing options. ░
░ Timeout - if the timeout option is used: all virtual ░
░ drives automatically close if the user has left computer ░
░ or simply does not touch keyboard and mouse for the ░
░ specified time (i.e. a "Screen saver" style time-out). ░
░ Hot Key - if Hot Key option is used: all virtual drives ░
░ are automatically closed if the user presses the Hot Key ░
░ combination on the keyboard. ░
░ ░
░ * 6. Container Guard utility. This utility prevents the ░
░ user from deleting an encrypted file-container, as well as ░
░ preventing an unauthorized person who has network access ░
░ to your computer from deleting your file-container. In ░
░ Windows NT, 2000, and XP, Container Guard may be disabled ░
░ only by an administrator. ░
░ ░
░ * 7. BCWipe utility. To avoid an unauthorized restoring of ░
░ deleted files from your disks, you can run BCWipe utility ░
░ to wipe deleted files from the disk. The utility may also ░
░ wipe all free space and file slacks on the specified disk. ░
░ ░
░ * 8. The main commands to control access to encrypted data ░
░ may be run from Windows Explorer ("My Computer" window) ░
░ without starting BestCrypt Control Panel. To run these ░
░ commands from Explorer, you should use the same method as ░
░ for creating and opening any other document from Explorer, ░
░ for example, a Microsoft Word document. ░
░ ░
░ * 9. BestCrypt has been designed with an extendible ░
░ architecture: any third-party encryption software or ░
░ hardware developers can insert security extensions into ░
░ the BestCrypt software - for example, additional ░
░ encryption algorithms, proprietary procedures of entering ░
░ the passwords, or additional hashing algorithms. To get ░
░ additional information about the architecture, visit the ░
░ Jetico webpage. ░
░ ░
░ * 10. The BestCrypt Development Kit (available for ░
░ downloading from the Jetico, Inc. Web site: ░
░ ░ http://www.jetico.com/bdk.htm) contains the source code of ░ ░
▒ ░ all BestCrypt modules responsible for the security of the ░ ▒
░ ▓ ░ software. ░ ▓ ░
░ █ ░ ░ █ ░
░ ░ █ ░ * 11. BestCrypt automatically saves information concerning ░ █ ░ ░
▒ █ ░ whether to share BestCrypt logical drives on a network. ░ █ ▒
▒ █ ░ Now user does not need to share the BestCrypt drives every ░ █ ▒
▀█▀ ▀█ ░ time he/she reboots operating system. ░ █▀ ▀█▀
░ ▄ ░▐▌ ▐▌░ ▄ ░
▄▓█▄ ▀▄ ▄ ▄ ▄▀░ ▄█▓▄
▀▀██▄▄ ▀ ▄▄▄▄▄▄▄▄▄▀▀ ▀▀▄▄▄▄▄▄ ▀ ▄▄██▀▀
▀▀▓▀▀ ▄ ▀ ▀▀▀▓▀
▄▄▓ ▄▀ ▀▄ ▓▄▄
▄▄███▓███▄▄▄ ▄ ▄█▄█▀ ▄ iNSTALL NOTES ▄ ▀█▄█▄ ▄ ▄▄▄███▓███▄▄
▀▓█▀ ▀█▀ ▀▀▀▀▄ ▀▓ ▀▓▄▄▄▄ ▄▄▄▄▓▀ ▓▀ ▄▀▀▀▀ ▀█▀ ▀█▓▀
▀ ▄█▄ ▄▀ ▀ ■▀ ▀▀▀▀▓▀▀▀▀ ▀■ ▀ ▀▄ ▄█▄ ▀
▄▀ ▀▓█▌ ▐█▓▀ ▀▄
▐▌░ ▐█ ░ Run the setup file and follow the install instructions. ░ █▌░░▐▌
▀ ▄ █ ░ Copy the included crack to your application dir and patch ░ █ ▄ ▀
▐▌ ░ the program file. ░ ▐▌
▒ █ ░ ░ █ ▒
▒ █ ░ ░ █ ▒
░ ░█ ░ ░ █ ▒
░ ▄ ░▐▌ ▐▌░ ▄ ░
▄▓█▄ ▀▄▄ ▄ ▄ ▄▄▀ ▄█▓▄
▀▀██▄▄ ▀ ▄▄▄▄▄▄▄▄▄▀▀ ▀▀▄▄▄▄▄▄ ▀ ▄▄██▀▀
▀▀▓▀▀ ▄ ▀ ▀▀▀▓▀
▄▄▓ ▄▀ ▀▄ ▓▄▄
▄▄███▓███▄▄▄ ▄ ▄█▄█▀ ▄ RELEASE iNFO ▄ ▀█▄█▄ ▄ ▄▄▄███▓███▄▄
▀▓█▀ ▀█▀ ▀▀▀▀▄ ▀▓ ▀▓▄▄▄▄ ▄▄▄▄▓▀ ▓▀ ▄▀▀▀▀ ▀█▀ ▀█▓▀
▀ ▄█▄ ▄▀ ▀ ■▀ ▀▀▀▀▓▀▀▀▀ ▀■ ▀ ▀▄ ▄█▄ ▀
▄▀ ▀▓█▌ ▐█▓▀ ▀▄
▐▌░ ▐█ ░ Hello everybody and welcome to another product brought to ░ █▌░░▐▌
▀ ▄ █ ░ you by the _LUCiD_ posse !! ░ █ ▄ ▀
▐▌ ░ ░ ▐▌
░ █ ░ At the very beginning LUCiD has been launched as a small ░ █ ░
░ █ ░ private society for studying network security. Until today ░ █ ░
░ ▓ ░ we are a closed group of few very good friends that have ░ ▓ ░
▒ ░ been working together for more than five years. ░ ▒
░ ░ We continuously serve you with the hottest updates and ░ ░
░ timeless art of reverse engineering. ░
░ ░
░ We are a non profit group doing this for nothing but fun ░
░ and knowledge! All releases are for test purpose only. ░
░ We give you the opportunity to test the product on a ░
░ trial basis at full functionality. If you use the software ░
░ please support the developers and purchase after testing. ░
░ All LUCiD releases are dedicated to the scene only. ░
░ You must _not_ transfer this to the www, any peer to peer ░
░ ░ network, public boards or ftps! ░ ░
▒ ░ ░ ▒
░ ▓ ░ Thanks to all active members of LUCiD for wasting time in ░ ▓ ░
░ █ ░ front of the screen. Greetings and respect go to CRO ░ █ ░
░ ░ █ ░ DFS - HOODLUM+DEMO, competitors from ACME - AGAiN - F4CG ░ █ ░ ░
▒ █ ░ FTY - iNFECTED - MYTH - RoME - SSG, all people supporting ░ █ ▒
▒ █ ░ us throughout the years, individuals that do not want to ░ █ ▒
▀█▀ ▀█ ░ be mentioned and groupies all over the globe. ░ █▀ ▀█▀
░ ▄ ░▐▌ ▐▌░ ▄ ░
▄▓█▄ ▀▄ ▄ TEAM LUCiD ▄ ▄▀░ ▄█▓▄
▀▀██▄▄ ▀ ▄▄▄▄▄▄▄▄▄▀▀ January 2005 ▀▀▄▄▄▄▄▄ ▀ ▄▄██▀▀
▀▀▓▀▀ ▀▀▀▓▀