░ ▄
LUCiD : Challenge the impossible ░ ▀ ▄ ░░ ░ ▄ ▀ ▄
░ █▄▄ ░░░ ▄▄████▄ ░ █▄▄
░ ░ ░ ░ ░░ ███▄ ░░ ▐███████▌ █▓█▄
░░ ░ ▄ ░░ ░ ░░ ░░░ ▄ ░ ▐▓███▄ ██▓██▓▓▒░ ░ ▐█▓▓█▄
▀▄ ░░░░░ ▄ ▄ ░░░░░░ ▄ ░░░░ ▄ ░░ ▄██▓▓███▄▄ ▀▀███▀ ░ ███▓▓█▄
▐██▄ ░ ▄██ ▐██▄▄ ░░░░▐██▄ ░ ▄██ ▄█████▓██▓▓██▀ ▄█▄ ▀■ ░░ ▐██████▌
█▓██▄████▌ ░ █▓████▄▄ ░ █▓██▄████ ▄███▓▓█▀ ▀█▓▓▓█ █████▄ ░ ▀ ░░ ████▓██
▐█▓███▓██ ▐█▓██████▀ ▐█▓█████▌▐██▓▓▓█▌ ░ ▐█▓█▌▐█▓▓▓██▌░░ creepah ▐██████▌
█▓▓█▓▓▓▌ ░░ █▓▓████▌░ █▓▓████ ██▓▓███ ░ ▄████ █▓▓▓███ ░░ ░ ███████
█▓▓▓▓▓█▌░ ░░ █▓▓▓▓██▌░ ▐▓▓▓▓██ █▓▓▓███ ░ ▐█▓▓███▌░░ ▄▄▄ █████▓█
░ █▓▓▓▓▓█ ░ ░░ █▓▓▓▓▓█ ░ ▐█▓▓▓█▌▐▓▓▓███▌░ █▓▓████ ░ ▄▄███████▄███████▌
██▓▓▓██ ░ ░░ ██▓▓▓▓█ ░░ █▓▓▓█▌▐▓▓▓███▌░ █▓▓████ ░ ██▓▓▓██▀ ██████▓█▌
██▓▓███ ░ ▀▀▀▀▀▀█▌ ░░ ██▓▓▓█ █▓▓▓███ ░ ▐█▓▓███▌ █▓▓▓███ ░░ ▐████▓▓█
░ ▐██▓███▌░ ▀███████▄ █ ░ ███▓▓█▌██▓▓▓██ ░ ▀████ ██▓▓███ ▐▓▓████ ░ ███▓▓▓█
░ ▐██████▌ ░ ▐██▓███▌▐█▌ ▐██▓▓▓▓▌▐██████▌░░ ▐▓██▌▐██▓▓██▌▐█▓▓███▌░ ▐██▓▓▓▓▌░
░░ ████▓██▄ ▄██▓▓▓██ ███▄▄██▓▓▓██ ███▓███▄ ▄██▓██ ████▓██▄██▓▓███▄ ▄██▓▓▓██
░░ ▀███▓█████▓▓▓▓█▌▄██▓█▓▓▓▓██▀ ▀▀███▓▓█▓▓▓▓▓█▄ ▀████▀ ▀▀███████████▀▀ ░
░░░ ▀▀▀▀██▓▓▓▓█▀ ▀▀▀▀▀▀▀ ░░ ▀▀▀▀██▓▓▓██▀▀ ▀▀ ░░░ ▀▀▀▀▀ ░░░░
░░░░░░░░░░ ▐█▓██▀ ▐█▓██▀ ░░░░░░░░░░░░░░░░░░░░░░░░
░░░░░░ ▓██▀ The deamons of █▓█▀ ░░░
░░░ █▀▀ resistance rise once █▀▀ ░░ endless torment and pain
░ ▀ again to put a curse on ▄ ▀ ░ in hell you will gain
░ ▄▄▓ ░ ▓▄▄
▄▄███▓███▄▄▄ BestCrypt v7.12.01 ▄▄▄███▓███▄▄
▀▓█▀ ▀█▀ ▀▀▀▀▄ Copyright ⌐ 1995-2005 Jetico Inc ▄▀▀▀ ▀█▀ ▀█▓▀
▀ ▄█▄ ▄▀ ▀▄ ▄█▄ ▀
▄▀ ▀▓█▌ [ Supplier.: TEAM LUCiD ]-[ Disk(s)...: 1 x 4.88 MB ] ▐█▓▀ ▀▄
▐▌░ ▐█ ░ [ Cracker..: TEAM LUCiD ]-[ Protection: Easy ] ░ █▌░ ▐▌
▀ ▄ █ ░ [ Released.: Feb 2006 ]-[ Formats...: ZiP/RAR ] ░ █ ▄ ▀
░ ▄ ░▐▌ [ Type.....: Utility ]-[ OS(s).....: WinALL ] ▐▌░ ▄ ░
▄▓█▄ ▀▄ ▄ ▄ ▄▀░ ▄█▓▄
▀▀██▄▄ ▀ ▄▄▄▄▄▄▄▄▄▀▀ ▀▀▄▄▄▄▄▄ ▀ ▄▄██▀▀
▀▀▓▀▀ ▄ ▀ ▀▀▀▓▀
▄▄▓ ▄▀ ▀▄ ▓▄▄
▄▄███▓███▄▄▄ ▄ ▄█▄█▀ ▄ RELEASE NOTES ▄ ▀█▄█▄ ▄ ▄▄▄███▓███▄▄
▀▓█▀ ▀█▀ ▀▀▀▀▄ ▀▓ ▀▓▄▄▄▄ ▄▄▄▄▓▀ ▓▀ ▄▀▀▀▀ ▀█▀ ▀█▓▀
▀ ▄█▄ ▄▀ ▀ ■▀ ▀▀▀▀▓▀▀▀▀ ▀■ ▀ ▀▄ ▄█▄ ▀
▄▀ ▀▓█▌ ▐█▓▀ ▀▄
▐▌░ ▐█ ░ BestCrypt creates and supports encrypted virtual disks. ░ █▌░░▐▌
▀ ▄ █ ░ ░ █ ▄ ▀
▐▌ ░ These disks are visible as regular disks with ░ ▐▌
░ █ ░ correspondent drive letters. The data stored on a ░ █ ░
░ █ ░ BestCrypt disk is stored in the container file. ░ █ ░
░ ▓ ░ ░ ▓ ░
▒ ░ A container is a file, so it is possible to backup a ░ ▒
░ ░ container, move or copy it to other disk (CD- ROM or ░ ░
░ network, for instance) and continue to access your ░
░ encrypted data using BestCrypt. ░
░ ░
░ Any free drive letter in the system may be used to mount ░
░ and to open an encrypted file-container for access. When ░
░ the virtual disk is opened, you can read and write data as ░
░ if it were a conventional removable disk. ░
░ ░
░ How does BestCrypt work? BestCrypt creates a pre-encrypted ░
░ file called ░
░ a container. This container is created by an encryption ░
░ algorithm (Twofish, ░
░ Blowfish, Rijndael, or GOST28147-89). ░
░ ░
░ In addition, BestCrypt creates a logical disk. The ░
░ container is linked to a logical disk, and the disk is ░
░ opened for access using the unique container password. All ░
░ data stored in the logical disk are stored in the ░
░ container in an encrypted form and transparently ░
░ accessible for an authorized person. ░
░ ░
░ Containers of BestCrypt version 7 software are compatible ░
░ ░ with previous ░ ░
▒ ░ versions of BestCrypt containers. ░ ▒
░ ▓ ░ ░ ▓ ░
░ █ ░ But there are few limitations here: Windows 95 and DOS ░ █ ░
░ ░ █ ░ operating systems do not support NTFS filesystem. So, if ░ █ ░ ░
▒ █ ░ you format a BestCrypt container in Windows XP/2000/NT ░ █ ▒
▒ █ ░ using the NTFS filesystem, it will be impossible to mount ░ █ ▒
▀█▀ ▀█ ░ the container on Windows ME/98/95/DOS computers. ░ █▀ ▀█▀
░ ▄ ░▐▌ ▐▌░ ▄ ░
▄▓█▄ ▀▄ ▄ ▄ ▄▀░ ▄█▓▄
▀▀██▄▄ ▀ ▄▄▄▄▄▄▄▄▄▀▀ ▀▀▄▄▄▄▄▄ ▀ ▄▄██▀▀
▀▀▓▀▀ ▄ ▀ ▀▀▀▓▀
▄▄▓ ▄▀ ▀▄ ▓▄▄
▄▄███▓███▄▄▄ ▄ ▄█▄█▀ ▄ iNSTALL NOTES ▄ ▀█▄█▄ ▄ ▄▄▄███▓███▄▄
▀▓█▀ ▀█▀ ▀▀▀▀▄ ▀▓ ▀▓▄▄▄▄ ▄▄▄▄▓▀ ▓▀ ▄▀▀▀▀ ▀█▀ ▀█▓▀
▀ ▄█▄ ▄▀ ▀ ■▀ ▀▀▀▀▓▀▀▀▀ ▀■ ▀ ▀▄ ▄█▄ ▀
▄▀ ▀▓█▌ ▐█▓▀ ▀▄
▐▌░ ▐█ ░ Run the setup file and follow the install instructions. ░ █▌░░▐▌
▀ ▄ █ ░ Copy the included crack to your application dir and patch ░ █ ▄ ▀
▐▌ ░ the program file. ░ ▐▌
▒ █ ░ ░ █ ▒
▒ █ ░ ░ █ ▒
░ ░█ ░ ░ █ ▒
░ ▄ ░▐▌ ▐▌░ ▄ ░
▄▓█▄ ▀▄▄ ▄ ▄ ▄▄▀ ▄█▓▄
▀▀██▄▄ ▀ ▄▄▄▄▄▄▄▄▄▀▀ ▀▀▄▄▄▄▄▄ ▀ ▄▄██▀▀
▀▀▓▀▀ ▄ ▀ ▀▀▀▓▀
▄▄▓ ▄▀ ▀▄ ▓▄▄
▄▄███▓███▄▄▄ ▄ ▄█▄█▀ ▄ RELEASE iNFO ▄ ▀█▄█▄ ▄ ▄▄▄███▓███▄▄
▀▓█▀ ▀█▀ ▀▀▀▀▄ ▀▓ ▀▓▄▄▄▄ ▄▄▄▄▓▀ ▓▀ ▄▀▀▀▀ ▀█▀ ▀█▓▀
▀ ▄█▄ ▄▀ ■▀ ▀▀▀▀▓▀▀▀▀ ▀■ ▀▄ ▄█▄ ▀
▄▀ ▀▓█▌ ▐█▓▀ ▀▄
▐▌░ ▐█ ░ Hello everybody and welcome to another product brought to ░ █▌░░▐▌
▀ ▄ █ ░ you by the _LUCiD_ posse !! ░ █ ▄ ▀
▐▌ ░ ░ ▐▌
░ █ ░ At the very beginning LUCiD has been launched as a small ░ █ ░
░ █ ░ private society for studying network security. Until today ░ █ ░
░ ▓ ░ we are a closed group of few very good friends that have ░ ▓ ░
▒ ░ been working together for more than five years. ░ ▒
░ ░ We continuously serve you with the hottest updates and ░ ░
░ timeless art of reverse engineering. ░
░ ░
░ We are a non profit group doing this for nothing but fun ░
░ and knowledge! All releases are for test purpose only. ░
░ We give you the opportunity to test the product on a ░
░ trial basis at full functionality. If you use the software ░
░ please support the developers and purchase after testing. ░
░ All LUCiD releases are dedicated to the scene only. ░
░ You must _not_ transfer this to the www, any peer to peer ░
░ ░ network, public boards or ftps! ░ ░
▒ ░ ░ ▒
░ ▓ ░ Thanks to all active members of LUCiD for wasting time in ░ ▓ ░
░ █ ░ front of the screen. Greetings and respect go to CRO ░ █ ░
░ ░ █ ░ DFS - HOODLUM+DEMO, competitors from ACME - AGAiN - F4CG ░ █ ░ ░
▒ █ ░ FTY - iNFECTED - MYTH - RoME - SSG, all people supporting ░ █ ▒
▒ █ ░ us throughout the years, individuals that do not want to ░ █ ▒
▀█▀ ▀█ ░ be mentioned and groupies all over the globe. ░ █▀ ▀█▀
░ ▄ ░▐▌ ▐▌░ ▄ ░
▄▓█▄ ▀▄ ▄ TEAM LUCiD 2005 ▄ ▄▀░ ▄█▓▄
▀▀██▄▄ ▀ ▄▄▄▄▄▄▄▄▄▀▀ Reverse engineering per ▀▀▄▄▄▄▄▄ ▀ ▄▄██▀▀
▀▀▓▀▀ excellence. ▀▀▀▓▀