▄
· ██▄
: █▄ ▄▄█▀▀▀████▄ ▄▄▄▄▄▄▄▄▄ ▄ ▄▄▄▄▄
···──│·┐ ███▄ ▄████ ░ █▓▓▓█ █████ ██ ▄██ ░ █████
··--───-·█████·──════--·█▓▓▓█·░·█▒▒▒█··█▓███·░·▐██▄·-─-·▄████·░░·█████·-─··
··─┘ █▓███ ░ █▒▒▒█ ░ █▓▓▓█ █▓▓██ ░ ████ █▓███ ░░ █▓███
│ ▄ █▓▓▓█ ▄ █░░░█ ░ ▀███ █▓▓▓█ ░░ █▓▓█ ░ █▓▓▓█ ░░ █▓▓▓█
│ ██▄█▒▓▓█▄██ █▒▒▒█ ░ ▀█ █▒▓▓█ ░░ █▒▒█ ░ █▒▓▓█ ░░ █▒▓▓█
│ ██▀█▒▒▒█▀██ █▓▓▓█▄▄▄▄▄ █▒▒▒█ ░░ █▓▓█ ░ █▒▒▒█ ░ █▒▒▒█
| ▀ █░░░█ ▀ ████████████▄ █░░░█ ░░ ████ ░ █░░░█ ▄ █░░░█
: █ █ Nitrogen ▀▀██████▓▓▓█ █ █ ░░ ██▀ ░░ █ █ ██ █ █
: █░░░█ [TSRh] ▄ █▒▒▒█ █░░░█ ▄▄▄█▀ ░░ █░░░█ ▀ █░░░█
. █▒▒▒█ ░ ▄█ ██▄ ░ █░░░█ █▒▒▒█ ██▄ ░░ █▒▒▒█ ░ █▒▒▒█
. █▓▓▒█ ░ ▄███ ████▄ ░ █▒▒▒█ █▓▓▓█ ░░ ████ ░ █▓▓▓█ ░░ █▓▓▓█
· █▓▓▓█ ░ █▓▓▓█ █▓▓▓█ ░ █▓▓▓█ █▓▓▓█ ░░ █▓▓▓█ ░ █▓▓▓█ ░░ █▓▓▓█
··─────·███▓█·░·█▒▒▒█··█▒▒▒█·░·█████··█▓███·░░·█▒▒▒█·░·█▓███·░░·█▓███·──··
· ████ ░ █▓▓▓█ █▓▓▓█ ░ ████▀ ███▀ ░ █▓▓▓█ ░ █████ ░ ███▀
· ▀▀█▄▄▄████▀ ▀████▄▄▄█▀▀ █▀ █████ █████ █▀
▀██ ▀███
▀ ▀█
▄┌█───────────────────────────────────────────────────────────┐▄
─ ── : ..:: | :::.. ..:::RELEASE.iNF0:::.. ..::: | ::.. : ── ─
│░░░░└───────────────────────────────────────────────────────────█┘░░░░│
┌─│───────────┘ └───────────│─┐
│█: :█│
│█ Target: [ East-Tec Eraser 2002 3.5.1.402 ] █│
│█ URL: [ http://www.east-tec.com/ ] █│
│█ █│
│█ Cracker: [ B-$hep ] █│
│█ Crack Type: [ Crack ] █│
│█ █│
│█ Release Date: [ 19-04-2002 ] █│
│█ Release Name: [ tsrh-ete2k2351402.zip ] █│
│█ █│
│█: :█│
└─│──────────────────────────────────────────────────────────────────────│─┘
│ █████████▓▓▓▓▓▓▓▓▓▒▒▒▒▒▒▒▒▒▒▒░░░░░░░░▒▒▒▒▒▒▒▒▒▒▒▓▓▓▓▓▓▓▓▓█████████ │
┌ ─ ── ────────────────────────────────────────────────────────────── ── ─ ┐
││ [Target.Description] ││
││ ─ ── ─── ────── ·:
└─--··
Today more and more people have sensitive information that would like
to protect from falling into the wrong hands. If you are one of them
and your hard disk contains valuable corporate trade secrets,
business plans, personal files or confidential letters, you must know
that the delete function does not erase the information beyond
recovery.
When you delete a file, the operating system does not destroy the
file contents from the disk - it only deletes some 'references' on
the file from some system tables. The file contents remains on disk
until another file 'happens' to overwrite it. Any software recovery
tool can restore the data if it hasn't been overwritten yet. Hardware
recovery tools may even restore overwritten files by analyzing latent
magnetic traces.
As a result, your confidential information may be lying unprotected
on your disk and it is almost impossible to prevent it from falling
into the wrong hands.
└┐ ┌┘
││ [Register.Notes] ││
└┐ ─ ── ─── ────── ┌┘
Copy tsrh-ete2k2351402.exe in programm dir and run it.
┌┘ └┐
││ ││
└ ─ ── ────────────────────────────────────────────────────────────── ── ─ ┘
│ █████████▓▓▓▓▓▓▓▓▓▒▒▒▒▒▒▒▒▒▒▒░░░░░░░░░░▒▒▒▒▒▒▒▒▒▒▒▓▓▓▓▓▓▓▓▓█████████ │
└────────────│───────────────────────────────────────────────│─────────────┘
│ [TSRh.Members] │
│ ──────┐┌────── │
┌─│──────────┘ ││ └───────────│─┐
│█: └┐ :█│
│█: [ OxEn ] ............. └┐ [ cracker, coder, founder ] :█│
│█: [ B-$hep ] ............. └┐ [ cracker, founder ] :█│
│█: [ Nitrogen ] ............. └┐ [ cracker, coder ] :█│
│█: [ EGOiST ] ............. └┐ [ cracker ] :█│
│█: [ aZZaZZeLLo ] ............. └┐ [ cracker, design ] :█│
│█: [ Fox ] ............. └┐ [ cracker, design ] :█│
│█: [ ByTESCRK ] ............. └┐ [ cracker ] :█│
│█: [ FAN ] ............. └┐ [ cracker, trial ] :█│
│█: [ Auric ] ............. └┐ [ cracker, trial ] :█│
│█: ││ :█│
└─│──────────────────────────────────────────────────────────────────────│─┘
| · .o0o. CONTACTS .o0o. · |
└─┼·· ··┼─┘
│ [ WEB Site ] ............. ││ [http://www.kickme.to/tsrh ] │
| [ E-mail ] ............. └┐ [[email protected] ] |
: [ IRC ] ............. ││ [DAL.net, #tsrh ] :
· ──────────────────────────────┘└────────────────────────────── ·
· ·