* __/\__
|| \ .. / .
______ -=)(=- /_/\_\ _________
| |___ __||||__ _____ ____ _/ /
| | |____| _ _ |__| |____|_ |____|__ |____/
| | | . \ (.)(.) | _____|_ ___| | _ |____ |
. |______ | _/\ /| | _ | _|_ | \ \ | |
| |__| | | () | | |___| _| | |\ | | | | .
| | \ / \ |______| | |______| | |
p43 | | |||||| | | | | | |
. |___| |______| |____| |______/
.*.
| * .
P R O U D L Y P R E S E N T S . * .
|
┌──│───────────────────────────────────────────────────────────│──┐
┌──┤ REPLY TO How YPOGEiOS uses fake informations to bypass the 0day ├──┐
┌──┤ mu rule ├──┐
.│ └┬─│───────────────────────────────────────────────────────────│─┬┘ │.
│└───┘───────────────────────────────┬───────────────────────────────└───┘│
│. │ .│
│: CRACKER .............: YPOGEiOS │ RELEASE DATE ......: 15/10/2010 :│
││ SUPPLiER ............: YPOGEiOS │ FiLE TYPE ............: ZiP/RAR ││
││ PACKER ..............: YPOGEiOS │ FiLE SiZE ..........: 01x5.00MB ││
││ RELEASE TYPE .....: APPLiCATiON │ OS ....................: WinALL ││
││ CRACK TYPE ...............: N/A . PROTECTOR ...............: NONE ││
.: :.
..───────────────────────────────────────────────────────────────────────..
┌[]██████████████████[ ..:: RELEASE DESCRiPTiON ::.. ]██████████████████[]┐
..└─────────────────────────────────────────────────────────────────────┘..
└─────────────────────────────────────────────────────────────────────────┘
:. .:
││ This is a reply to: ││
││ ││
││ How.YPOGEiOS.uses.fake.informations.to.bypass.the.0day.mu.rule.REA ││
││ D.NFO.SCENE.NOTICE-WaLMaRT ││
││ ││
││ First, that lame scene note was NOT even released by WaLMaRT ││
││ so please stop doing that, it makes you look like a fool. The ││
││ guy behind the fake WaLMaRT scene note doesn't have knowlegde ││
││ at all, so instead of doing some research about the important ││
││ bug fixes of the apps we released, he just wrote some lame nfo ││
││ saying we use fake information to bybass the MU rule. ││
││ ││
││ All the update notes stated in the nfo's of the releases can ││
││ be found on the website of Electrasoft. It's clear you did not ││
││ search good, but what else could I expect from some lamer? ││
││ ││
││ Okay first: 32bit.Fax.v10.10.14.WinALL.Regged.READ.NFO-YPOGEiOS ││
││ ││
││ The upgrade history list can be found on the authors website ││
││ [PROOF1.JPG]: http://www.electrasoft.com/readme32.txt ││
││ ││
││ Multi.Clipboard.v10.10.14.WinALL.Regged.READ.NFO-YPOGEiOS ││
││ [PROOF2.JPG]: http://www.electrasoft.com/readmemc.txt ││
││ ││
││ First.Alert.Service.Monitor.v10.10.14.WinALL.Regged.READ.NFO-YPOGE ││
││ iOS ││
││ [PROOF3.JPG]: http://www.electrasoft.com/readmefa.txt ││
││ ││
││ FaxAmatic.v10.10.14.WinALL.Regged.READ.NFO-YPOGEiOS ││
││ [PROOF4.JPG]: http://www.electrasoft.com/readmea.txt ││
││ ││
││ 32bit.Internet.Fax.v10.10.14.WinALL.Regged.READ.NFO-YPOGEiOS ││
││ [PROOF5.JPG]: http://www.electrasoft.com/readmei.txt ││
││ ││
││ So do we need to say more? The list changes everytime when a ││
││ new version of the application got released. Sometimes new ││
││ features are new functions, keep that in mind. The rest of the ││
││ readme's can be found at: http://www.electrasoft.com/ ││
││ ││
││ Select a software, and look for the help page or Readme, Upgrades ││
││ page. Thats all folks! ││
..│ │..
.:└─────────────────────────────────────────────────────────────────────┘:.
┌[]█████████████████████[ ..:: iNSTALL NOTES ::.. ]█████████████████████[]┐
..└─────────────────────────────────────────────────────────────────────┘..
└─────────────────────────────────────────────────────────────────────────┘
:. .:
││ Just read it! ││
..│ │..
.:└─────────────────────────────────────────────────────────────────────┘:.
┌[]██████████████████████[ ..:: GROUP NOTES ::.. ]██████████████████████[]┐
..└─────────────────────────────────────────────────────────────────────┘..
└─────────────────────────────────────────────────────────────────────────┘
:. .:
││ Currently we're looking for: ││
││ ││
││ [] talented crackers who are able to crack applications for any ││
││ Windows OS. ││
││ ││
││ [] talented crackers who are able to tackle the most used ││
││ protectors such as Armadillo, Asprotect, ActiveMark etc. ││
││ ││
││ [] talented keygenners who are able to keygen the most used reg ││
││ schemes such as MD5, RSA, BLOWFiSH or any custom sheme. ││
││ ││
││ [] talented gamehackers who are able to train the newest games ││
││ for the Windows OS. ││
││ ││
││ [] 100MBiT EU affil sites. ││
││ ││
││ If you think we could use you contact us: [email protected] ││
.│ │.
.:└─────────────────────────────────────────────────────────────────────┘:.
..───────────────────────────────────────────────────────────────────────..
┌[]███████████████████████[ ..:: GREETZ TO ::.. ]███████████████████████[]┐
..└─────────────────────────────────────────────────────────────────────┘..
││ ││
:│ UTE * NeoX * CAMERA * HHS * USZ * PDFwriters │:
└. .┘
└─────────────────────────────────────────────────────────────────────────┘
.└─────────────────────────────────────────────────────────────────────┘.
ANSCii BY: p43 nFO BY ***^YGS