Download BestCrypt v7.12.02 WinALL crack by LUCiD

Added to site2005-05-04
Rating91/100
Votes7


BestCrypt.v7.12.02.WinALL.crack.zip (170710 bytes)

namesizecompressed
BestCrypt.v7.12.02.WinALL.crack.exe 191488 165753
FILE_ID.DIZ 43 43
LUCiD.nfo 17330 4452

FILE_ID.DIZ

LUCiD's crack for BestCrypt v7.12.02 WinALL


LUCiD.nfo

░           ▄                       
   LUCiD : Challenge the impossible   ░ ▀ ▄   ░░   ░    ▄      ▀  ▄             
                                        ░  █▄▄  ░░░  ▄▄████▄    ░  █▄▄          
            ░   ░        ░          ░    ░░ ███▄ ░░ ▐███████▌       █▓█▄        
  ░░     ░    ▄  ░░    ░    ░░  ░░░   ▄   ░ ▐▓███▄   ██▓██▓▓▒░  ░   ▐█▓▓█▄      
▀▄  ░░░░░   ▄ ▄   ░░░░░░ ▄   ░░░░   ▄   ░░ ▄██▓▓███▄▄ ▀▀███▀       ░ ███▓▓█▄    
 ▐██▄ ░  ▄██  ▐██▄▄  ░░░░▐██▄ ░  ▄██  ▄█████▓██▓▓██▀ ▄█▄  ▀■      ░░ ▐██████▌   
  █▓██▄████▌ ░ █▓████▄▄ ░ █▓██▄████ ▄███▓▓█▀ ▀█▓▓▓█ █████▄ ░  ▀    ░░ ████▓██   
  ▐█▓███▓██    ▐█▓██████▀ ▐█▓█████▌▐██▓▓▓█▌ ░ ▐█▓█▌▐█▓▓▓██▌░░ creepah ▐██████▌  
   █▓▓█▓▓▓▌ ░░  █▓▓████▌░  █▓▓████ ██▓▓███ ░ ▄████ █▓▓▓███ ░░   ░ ███████  
   █▓▓▓▓▓█▌░ ░░ █▓▓▓▓██▌░  ▐▓▓▓▓██ █▓▓▓███ ░      ▐█▓▓███▌░░     ▄▄▄   █████▓█  
░  █▓▓▓▓▓█ ░ ░░ █▓▓▓▓▓█ ░  ▐█▓▓▓█▌▐▓▓▓███▌░       █▓▓████ ░  ▄▄███████▄███████▌ 
   ██▓▓▓██ ░ ░░ ██▓▓▓▓█ ░░  █▓▓▓█▌▐▓▓▓███▌░       █▓▓████ ░ ██▓▓▓██▀  ██████▓█▌ 
   ██▓▓███ ░    ▀▀▀▀▀▀█▌ ░░ ██▓▓▓█ █▓▓▓███ ░      ▐█▓▓███▌ █▓▓▓███ ░░ ▐████▓▓█  
░  ▐██▓███▌░ ▀███████▄ █  ░ ███▓▓█▌██▓▓▓██ ░ ▀████ ██▓▓███ ▐▓▓████ ░   ███▓▓▓█  
 ░ ▐██████▌ ░ ▐██▓███▌▐█▌  ▐██▓▓▓▓▌▐██████▌░░ ▐▓██▌▐██▓▓██▌▐█▓▓███▌░  ▐██▓▓▓▓▌░ 
 ░░ ████▓██▄ ▄██▓▓▓██ ███▄▄██▓▓▓██  ███▓███▄ ▄██▓██ ████▓██▄██▓▓███▄ ▄██▓▓▓██   
 ░░  ▀███▓█████▓▓▓▓█▌▄██▓█▓▓▓▓██▀    ▀▀███▓▓█▓▓▓▓▓█▄ ▀████▀  ▀▀███████████▀▀  ░ 
  ░░░   ▀▀▀▀██▓▓▓▓█▀   ▀▀▀▀▀▀▀   ░░     ▀▀▀▀██▓▓▓██▀▀  ▀▀  ░░░    ▀▀▀▀▀    ░░░░ 
 ░░░░░░░░░░ ▐█▓██▀                          ▐█▓██▀  ░░░░░░░░░░░░░░░░░░░░░░░░    
    ░░░░░░  ▓██▀     The demons of           █▓█▀  ░░░                          
      ░░░  █▀▀   resistance rise once      █▀▀   ░░   endless torment and pain  
      ░   ▀    again to put a curse on  ▄ ▀     ░      in hell you will gain    
    ░ ▄▄▓                                     ░                       ▓▄▄       
 ▄▄███▓███▄▄▄                 BestCrypt v7.12.02                  ▄▄▄███▓███▄▄  
▀▓█▀ ▀█▀   ▀▀▀▀▄       Copyright ⌐ 1995-2005 Jetico Inc        ▄▀▀▀    ▀█▀ ▀█▓▀ 
 ▀ ▄█▄ ▄▀                                                             ▀▄ ▄█▄ ▀  
 ▄▀ ▀▓█▌  [ Supplier.: TEAM LUCiD    ]-[  Disk(s)...: 1 x 4.88 MB   ]  ▐█▓▀ ▀▄  
 ▐▌░ ▐█ ░ [ Cracker..: TEAM LUCiD    ]-[  Protection: Easy          ] ░ █▌░ ▐▌  
  ▀ ▄ █ ░ [ Released.: May 2005      ]-[  Formats...: ZiP/RAR       ] ░ █ ▄ ▀   
 ░ ▄ ░▐▌  [ Type.....: Utility       ]-[  OS(s).....: WinALL        ]  ▐▌░ ▄ ░  
 ▄▓█▄  ▀▄               ▄                                  ▄          ▄▀░ ▄█▓▄  
  ▀▀██▄▄ ▀ ▄▄▄▄▄▄▄▄▄▀▀                                      ▀▀▄▄▄▄▄▄ ▀ ▄▄██▀▀   
       ▀▀▓▀▀                  ▄                   ▀                ▀▀▀▓▀        
      ▄▄▓                 ▄▀                        ▀▄                 ▓▄▄      
 ▄▄███▓███▄▄▄       ▄ ▄█▄█▀  ▄   RELEASE NOTES   ▄   ▀█▄█▄ ▄      ▄▄▄███▓███▄▄  
▀▓█▀ ▀█▀   ▀▀▀▀▄       ▀▓     ▀▓▄▄▄▄       ▄▄▄▄▓▀      ▓▀      ▄▀▀▀▀   ▀█▀ ▀█▓▀ 
 ▀ ▄█▄ ▄▀        ▀    ■▀           ▀▀▀▀▓▀▀▀▀            ▀■   ▀        ▀▄ ▄█▄ ▀  
 ▄▀ ▀▓█▌                                                               ▐█▓▀ ▀▄  
 ▐▌░ ▐█ ░ BestCrypt creates and supports encrypted virtual disks.     ░ █▌░░▐▌  
  ▀ ▄ █ ░                                                             ░ █ ▄ ▀   
     ▐▌ ░ These disks are visible as regular disks with               ░ ▐▌      
   ░ █  ░ correspondent drive letters. The data stored on a           ░  █ ░    
   ░ █  ░ BestCrypt disk is stored in the container file.             ░  █ ░    
   ░ ▓  ░                                                             ░  ▓ ░    
     ▒  ░ A container is a file, so it is possible to backup a        ░  ▒      
      ░ ░ container, move or copy it to other disk (CD- ROM or        ░ ░       
        ░ network, for instance) and continue to access your          ░         
        ░ encrypted data using BestCrypt.                             ░         
        ░                                                             ░         
        ░ Any free drive letter in the system may be used to mount    ░         
        ░ and to open an encrypted file-container for access. When    ░         
        ░ the virtual disk is opened, you can read and write data as  ░         
        ░ if it were a conventional removable disk.                   ░         
        ░                                                             ░         
        ░ How does BestCrypt work? BestCrypt creates a pre-encrypted  ░         
        ░ file called                                                 ░         
        ░ a container. This container is created by an encryption     ░         
        ░ algorithm (Twofish,                                         ░         
        ░ Blowfish, Rijndael, or GOST28147-89).                       ░         
        ░                                                             ░         
        ░ In addition, BestCrypt creates a logical disk. The          ░         
        ░ container is linked to a logical disk, and the disk is      ░         
        ░ opened for access using the unique container password. All  ░         
        ░ data stored in the logical disk are stored in the           ░         
        ░ container in an encrypted form and transparently            ░         
        ░ accessible for an authorized person.                        ░         
        ░                                                             ░         
        ░ Containers of BestCrypt version 7 software are compatible   ░         
        ░ with previous                                               ░         
        ░ versions of BestCrypt containers.                           ░         
        ░                                                             ░         
        ░ But there are few limitations here: Windows 95 and DOS      ░         
        ░ operating systems do not support NTFS filesystem. So, if    ░         
        ░ you format a BestCrypt container in Windows XP/2000/NT      ░         
        ░ using the NTFS filesystem, it will be impossible to mount   ░         
        ░ the container on Windows ME/98/95/DOS computers.            ░         
        ░                                                             ░         
        ░ Features:                                                   ░         
        ░ * 1. The BestCrypt software is designed for Windows         ░         
        ░ 95/98/ME/NT/2000/XP operating systems and satisfies all     ░         
        ░ requirements for 32-bit software. 32-bit BestCrypt Virtual  ░         
        ░ Device Drivers are designed for Windows 95/98/ME and        ░         
        ░ Windows NT/2000/XP file systems and they use all available  ░         
        ░ advantages of the operating systems.                        ░         
        ░                                                             ░         
        ░ * 2. There are no limitations to the number of local        ░         
        ░ physical drives on which a user stores BestCrypt            ░         
        ░ containers. Any type of physical media may be used to       ░         
        ░ store and access the data on the BestCrypt containers:      ░         
        ░ hard drives, removable media, magneto-optical devices,      ░         
        ░ etc.                                                        ░         
        ░                                                             ░         
        ░ * 3. Any network accessible disk may be used by BestCrypt   ░         
        ░ software for creating and accessing file-containers. This   ░         
        ░ network disk may be shared by a server with any operating   ░         
        ░ system, for example UNIX-like operating systems (OSF/1,     ░         
        ░ LINUX, BSD, SunOS, HP/UX, AIX and others), Novell, Windows  ░         
        ░ NT/2000/XP, Windows 95/98, Windows 3.xx, etc.               ░         
        ░                                                             ░         
        ░ * 4. User may copy (backup) BestCrypt containers from one   ░         
        ░ computer to another in network and continue to access       ░         
        ░ encrypted data without any limitation on the operating      ░         
        ░ system type. For example, a user may copy or move a         ░         
        ░ file-container from a computer with a Windows operating     ░         
        ░ system to a UNIX computer, yet continue access the data     ░         
        ░ (now stored inside the container on the UNIX computer)      ░         
        ░ from the Windows computer. Note that there is a separate    ░         
        ░ version of BestCrypt for the Linux operating system. For    ░         
        ░ more details on the software, you may visit our website:    ░         
        ░ http://www.jetico.com/linux.htm .                           ░         
        ░                                                             ░         
        ░ * 5. Automatic closing options.                             ░         
        ░ Timeout - if the timeout option is used: all virtual        ░         
        ░ drives automatically close if the user has left computer    ░         
        ░ or simply does not touch keyboard and mouse for the         ░         
        ░ specified time (i.e. a "Screen saver" style time-out).      ░         
        ░ Hot Key - if Hot Key option is used: all virtual drives     ░         
        ░ are automatically closed if the user presses the Hot Key    ░         
        ░ combination on the keyboard.                                ░         
        ░                                                             ░         
        ░ * 6. Container Guard utility. This utility prevents the     ░         
        ░ user from deleting an encrypted file-container, as well as  ░         
        ░ preventing an unauthorized person who has network access    ░         
        ░ to your computer from deleting your file-container. In      ░         
        ░ Windows NT, 2000, and XP, Container Guard may be disabled   ░         
        ░ only by an administrator.                                   ░         
        ░                                                             ░         
        ░ * 7. BCWipe utility. To avoid an unauthorized restoring of  ░         
        ░ deleted files from your disks, you can run BCWipe utility   ░         
        ░ to wipe deleted files from the disk. The utility may also   ░         
        ░ wipe all free space and file slacks on the specified disk.  ░         
        ░                                                             ░         
        ░ * 8. The main commands to control access to encrypted data  ░         
        ░ may be run from Windows Explorer ("My Computer" window)     ░         
        ░ without starting BestCrypt Control Panel. To run these      ░         
        ░ commands from Explorer, you should use the same method as   ░         
        ░ for creating and opening any other document from Explorer,  ░         
        ░ for example, a Microsoft Word document.                     ░         
        ░                                                             ░         
        ░ * 9. BestCrypt has been designed with an extendible         ░         
        ░ architecture: any third-party encryption software or        ░         
        ░ hardware developers can insert security extensions into     ░         
        ░ the BestCrypt software - for example, additional            ░         
        ░ encryption algorithms, proprietary procedures of entering   ░         
        ░ the passwords, or additional hashing algorithms. To get     ░         
        ░ additional information about the architecture, visit the    ░         
        ░ Jetico webpage.                                             ░         
        ░                                                             ░         
        ░ * 10. The BestCrypt Development Kit (available for          ░         
        ░ downloading from the Jetico, Inc. Web site:                 ░         
      ░ ░ http://www.jetico.com/bdk.htm) contains the source code of  ░ ░       
     ▒  ░ all BestCrypt modules responsible for the security of the   ░  ▒      
   ░ ▓  ░ software.                                                   ░  ▓ ░    
   ░ █  ░                                                             ░  █ ░    
 ░ ░ █  ░ * 11. BestCrypt automatically saves information concerning  ░  █ ░ ░  
 ▒   █  ░ whether to share BestCrypt logical drives on a network.     ░  █   ▒  
 ▒   █  ░ Now user does not need to share the BestCrypt drives every  ░  █   ▒  
 ▀█▀ ▀█ ░ time he/she reboots operating system.                       ░ █▀ ▀█▀  
 ░ ▄ ░▐▌                                                               ▐▌░ ▄ ░  
 ▄▓█▄  ▀▄               ▄                                  ▄          ▄▀░ ▄█▓▄  
  ▀▀██▄▄ ▀ ▄▄▄▄▄▄▄▄▄▀▀                                      ▀▀▄▄▄▄▄▄ ▀ ▄▄██▀▀   
       ▀▀▓▀▀                  ▄                   ▀                ▀▀▀▓▀        
      ▄▄▓                 ▄▀                        ▀▄                 ▓▄▄      
 ▄▄███▓███▄▄▄       ▄ ▄█▄█▀  ▄   iNSTALL NOTES   ▄   ▀█▄█▄ ▄      ▄▄▄███▓███▄▄  
▀▓█▀ ▀█▀   ▀▀▀▀▄       ▀▓     ▀▓▄▄▄▄       ▄▄▄▄▓▀      ▓▀      ▄▀▀▀▀   ▀█▀ ▀█▓▀ 
 ▀ ▄█▄ ▄▀        ▀    ■▀           ▀▀▀▀▓▀▀▀▀            ▀■   ▀        ▀▄ ▄█▄ ▀  
 ▄▀ ▀▓█▌                                                               ▐█▓▀ ▀▄  
 ▐▌░ ▐█ ░ Run the setup file and follow the install instructions.     ░ █▌░░▐▌  
  ▀ ▄ █ ░ Copy the included crack to your application dir and patch   ░ █ ▄ ▀   
     ▐▌ ░ the program file.                                           ░ ▐▌      
 ▒   █  ░                                                             ░  █   ▒  
 ▒   █  ░                                                             ░  █   ▒  
░   ░█  ░                                                             ░  █    ▒ 
░ ▄ ░▐▌                                                                 ▐▌░ ▄ ░ 
 ▄▓█▄ ▀▄▄               ▄                                  ▄          ▄▄▀ ▄█▓▄  
  ▀▀██▄▄ ▀ ▄▄▄▄▄▄▄▄▄▀▀                                      ▀▀▄▄▄▄▄▄ ▀ ▄▄██▀▀   
       ▀▀▓▀▀                  ▄                   ▀                ▀▀▀▓▀        
      ▄▄▓                 ▄▀                        ▀▄                  ▓▄▄     
 ▄▄███▓███▄▄▄       ▄ ▄█▄█▀  ▄    RELEASE iNFO   ▄   ▀█▄█▄ ▄       ▄▄▄███▓███▄▄ 
▀▓█▀ ▀█▀   ▀▀▀▀▄       ▀▓     ▀▓▄▄▄▄       ▄▄▄▄▓▀      ▓▀      ▄▀▀▀▀   ▀█▀ ▀█▓▀ 
 ▀ ▄█▄ ▄▀        ▀    ■▀           ▀▀▀▀▓▀▀▀▀            ▀■   ▀        ▀▄ ▄█▄ ▀  
 ▄▀ ▀▓█▌                                                               ▐█▓▀ ▀▄  
 ▐▌░ ▐█ ░ Hello everybody and welcome to another product brought to   ░ █▌░░▐▌  
  ▀ ▄ █ ░ you by the _LUCiD_ posse !!                                 ░ █ ▄ ▀   
     ▐▌ ░                                                             ░ ▐▌      
   ░ █  ░ At the very beginning LUCiD has been launched as a small    ░  █ ░    
   ░ █  ░ private society for studying network security. Until today  ░  █ ░    
   ░ ▓  ░ we are a closed group of few very good friends that have    ░  ▓ ░    
     ▒  ░ been working together for more than five years.             ░  ▒      
      ░ ░ We continuously serve you with the hottest updates and      ░ ░       
        ░ timeless art of reverse engineering.                        ░         
        ░                                                             ░         
        ░ We are a non profit group doing this for nothing but fun    ░         
        ░ and knowledge! All releases are for test purpose only.      ░         
        ░ We give you the opportunity to test the product on a        ░         
        ░ trial basis at full functionality. If you use the software  ░         
        ░ please support the developers and purchase after testing.   ░         
        ░ All LUCiD releases are dedicated to the scene only.         ░         
        ░ You must _not_ transfer this to the www, any peer to peer   ░         
      ░ ░ network, public boards or ftps!                             ░ ░       
     ▒  ░                                                             ░  ▒      
   ░ ▓  ░ Thanks to all active members of LUCiD for wasting time in   ░  ▓ ░    
   ░ █  ░ front of the screen. Greetings and respect go to CRO        ░  █ ░    
 ░ ░ █  ░ DFS - HOODLUM+DEMO, competitors from ACME - AGAiN - F4CG    ░  █ ░ ░  
 ▒   █  ░ FTY - iNFECTED - MYTH - RoME - SSG, all people supporting   ░  █   ▒  
 ▒   █  ░ us throughout the years, individuals that do not want to    ░  █   ▒  
 ▀█▀ ▀█ ░ be mentioned and groupies all over the globe.               ░ █▀ ▀█▀  
 ░ ▄ ░▐▌                                                               ▐▌░ ▄ ░  
 ▄▓█▄  ▀▄               ▄          TEAM LUCiD             ▄           ▄▀░ ▄█▓▄  
  ▀▀██▄▄ ▀ ▄▄▄▄▄▄▄▄▄▀▀            January 2005              ▀▀▄▄▄▄▄▄ ▀ ▄▄██▀▀   
       ▀▀▓▀▀                                                       ▀▀▀▓▀


# 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z