▄ ▄▄▄
▄▀▀ ▀ ▀▀▄
▐▌ ▐█
_ ▀█▄▄▄▄ ___ __________ _ ▄ __________ _ ▄ ______ _ ▄▄█▀ _
▀▀▀▀█████▄▄▄▄ ░ ▄▄▄▄▄█▄ ██▄▄▄ ▄▄█▌ ▄ ▄███▓░
▄▄████▄▄▄ ▀▀█████▓▄ ▄▄▄███▀▀▀▀██████▐██████▄ ▄██████▄██████▄ ░▓████▌
▐██████ ▀████▄█████▄ ▐█████▀████████▄███████▓▐████████▄ ▐████▓░
▐██████ ▐███▌█████▓░ ▄▄▄██████▌██████ ▀█▀ ██████▌██████ ▀██▄▐████▌
▐██████ ▄████░▓██████▀▀▀▀██████▌▓█████ ██████▌▓█████ ▀██████▓░
▄▄▄▐█████▓ ▄▄ ▄▓████▌▐██████ ▄▄▄ █████▓▐█████▓ ▄▄▄ ▒█████▐██████ ▄▄▄▐██████▌▄▄▄
██████▌▓▓▐█████▓░▐██████ ▓▓▓░▓█████▐██████▌▓▓▓ ▐████▓▐█████▒ ▓▓▓ █████▓░
██████▌▒ ▓██████▌░▓████▓░▒▒▒ ▐████▌░▓█████▌▒▒▒ ▐████▌ ██████▌ ▒▒ █████▌
░▓█████▌░ ▐██████▒ ░▓████▌░░░ ▐███▒ ░▓████▌░░░ ▐███▓░ ▒█████▌ ░░ ▓████▌
▀▀▀█▀▀████▄███████▌ ░▀███▌ ░ ▄██▀▀ ░▀███▌░ ▄██▀▀░ ▀▀▀█▀▀▀▀▀░ ▐████▓░
_ ________ ▀▀▀▀▓███▓░ _ ▀▀█▄ ▀ _sRT!CRo_ ▀▀█▄ ▀ ___________ _ ▄▄██▓▀▀░ _
░ ░▀██▌ ▀ ▀ ▄█▀ ░
░ ▐█ ░ ░ ▐▌ ░
░ ▀▄ ░ ░ ▀ ░
░ ░
░ ░ ░
░ PRESENTS
░ ░ ░
░
░ SecurityExpressions v1.2 *Incl.Keymaker*
▄▄▄▄▄▄▄▄ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ▄▄▄▄▄▄▄▄▄
╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┐
┌─┤▌ RELEASE INFO ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ [ Program ................................ SecurityExpressions v1.2 ] █
█ [ Type ................................. Security policy management ] █
█ [ OS ...................................................... WinNT2k ] █
█ [ By ....................................... Pedestal Software, LLC ] █
█ [ Homepage ..................... http://www.securityexpressions.com ] █
█ █
█ [ Cracked by ................................ Ivanopulo ] █
█ [ Release type .......................... Incl.Keymaker ] █
█ [ Release date ........................... Sep 07, 2000 ] █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
│╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤
┌┴┤▌ DESCRIPTION ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ SecurityExpressions enables administrators to quickly and effectively █
█ lock down Windows NT and Windows 2000 machines using custom-built or █
█ industry-standard security policy guidelines such as those developed █
█ by Microsoft, NSA, SANS and others. SecurityExpressions provides a █
█ powerful query language for locating users, groups and files with █
█ specific security profiles. █
█ █
█ "Actively scan, report and fix security settings on Windows NT █
█ machines across your network without installing agents." █
█ █
█ SecurityExpressions provides compliance testing and reporting out of █
█ the box. For example, by loading the included Microsoft Security █
█ White Paper policy file, you can scan any machine on your network to █
█ see how it complies. Using the tree-based interface, you can browse █
█ results on the screen and manually or automatically correct █
█ deviations. Printed and HTML reports document non-compliance items. █
█ █
█ You can easily incorporate your own rules or modify existing rules to █
█ meet your organization's own policies. Rules may contain expressions █
█ that are evaluated using the active security settings as input. So █
█ that if a stricter policy is in effect, it won't get overwritten with █
█ a weaker one programmed into the policy file (unless, of course, you █
█ specify that it should). █
█ █
█ SecurityExpressions can import your existing Windows 2000 Group █
█ Policy Security Template INF files. █
█ █
█ SecurityExpressions comes with the following industry-standard policy █
█ files: █
█ - Microsoft Security White Paper █
█ - SANS Security Step-by-Step █
█ - Department of the Navy (DoN) Secure Windows NT 4.0 Installation and █
█ Configuration Guide █
█ █
█ In addition, you can import any existing WIndows 2000 Group Policy █
█ Security Template or a Windows 4.0 SCE .inf file. SecurityExpressions █
█ supports a superset of Security Template and SCE functionality and █
█ includes all documented Security Template features. █
█ SecurityExpressions fixes effective Group Policy settings on Windows █
█ 2000 computers. █
█ █
█ Locate Users Across the Network Using an Advanced Object Query █
█ Language █
█ █
█ Query the security settings on local and remote computers across your █
█ enterprise using a "security aware" expression language that helps █
█ you locate users, groups, files and directories. This lets you answer █
█ questions such as, "for all the machines in domain DOMAIN, which █
█ accounts are a member of the local administrators group?". A "query █
█ builder" interface makes building expressions easy. █
█ █
█ Policy Compliance Features █
█ █
█ - Batch mode scans up to 200 machines simultaneously and then fixes █
█ them interactively or automatically. █
█ - A sophisticated searching language allows you to catch errors and █
█ inconsistencies across your entire network. █
█ - HTML export, printing and reporting capabilities allow you to save █
█ output for historical review. █
█ █
█ Querying Features █
█ █
█ - Advanced file and user find helps locate system security █
█ weaknesses. █
█ - Specify search criteria using expressions to locate objects that █
█ may need security modification. For example, you may want to █
█ "locate all files and directories which user Alice has effective █
█ rights of read and write" or to "find all users which have a bad █
█ password count greater than zero." █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
│╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤
┌┴┤▌ INSTRUCTIONS ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ Run the keymaker and register the program. If you don't like number █
█ of machines licensed (or expiration date) - just generate a new one. █
█ █
█ Enjoy =) █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
│╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤
┌┴┤▌ VERIFICATION ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ Due to the every day increasing amount of lamers who fake DAMN █
█ releases ALL DAMN releases starting from July 1, 2000 are digitally █
█ signed. █
█ █
█ Download DAMN Release Signature Verificator from http://www.damn.to █
█ (about 100K only) if you want to be sure that release you got was █
█ really made by DAMN. █
█ █
█ Don't use any stuff claiming to be made by DAMN if it's released █
█ after July 1, 2000 and doesn't pass verification. Using it can be █
█ dangerous. █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
│╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤
┌┴┤▌ GREETINGS ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ Our greetings fly to all groups and crackers who work hard to keep █
█ the Scene alive. █
█ █
█ Personal greetings to: Dimedrol, Duelist, Recca, russ97, tHE EGOiSTE. █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
│╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤
┌┴┤▌ CONTACT ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ Visit our www site at [ http://www.damn.to ] █
█ Backup page [ http://damn.da.ru ] █
█ █
█ Email address for contacts [ [email protected] ] █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
└─ ────── ─ ──══── ─ ────── ┬ ────── ─ ────── ┬ ────── ─ ──══── ─ ────── ─┘
│▌ (c) 2000 DAMN ▐│
└ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┘
----------------------- DAMN RELEASE SIGNATURE START ------------------------
damn_secexpr12.exe 1 8XrNcAoR9kVrsWH/lLpbF91ln7k nbLnYNJEBgwOunPZNlCTFjFvOnA
damn.nfo 0 U9ZR9c+qtlYIf8MLDwrWG/TEKfI tTF0DpZ/+rW0x5bBeC8xy0JTosA
------------------------ DAMN RELEASE SIGNATURE END -------------------------