▄ ▄▄▄
▄▀▀ ▀ ▀▀▄
▐▌ ▐█
_ ▀█▄▄▄▄ ___ __________ _ ▄ __________ _ ▄ ______ _ ▄▄█▀ _
▀▀▀▀█████▄▄▄▄ ░ ▄▄▄▄▄█▄ ██▄▄▄ ▄▄█▌ ▄ ▄███▓░
▄▄████▄▄▄ ▀▀█████▓▄ ▄▄▄███▀▀▀▀██████▐██████▄ ▄██████▄██████▄ ░▓████▌
▐██████ ▀████▄█████▄ ▐█████▀████████▄███████▓▐████████▄ ▐████▓░
▐██████ ▐███▌█████▓░ ▄▄▄██████▌██████ ▀█▀ ██████▌██████ ▀██▄▐████▌
▐██████ ▄████░▓██████▀▀▀▀██████▌▓█████ ██████▌▓█████ ▀██████▓░
▄▄▄▐█████▓ ▄▄ ▄▓████▌▐██████ ▄▄▄ █████▓▐█████▓ ▄▄▄ ▒█████▐██████ ▄▄▄▐██████▌▄▄▄
██████▌▓▓▐█████▓░▐██████ ▓▓▓░▓█████▐██████▌▓▓▓ ▐████▓▐█████▒ ▓▓▓ █████▓░
██████▌▒ ▓██████▌░▓████▓░▒▒▒ ▐████▌░▓█████▌▒▒▒ ▐████▌ ██████▌ ▒▒ █████▌
░▓█████▌░ ▐██████▒ ░▓████▌░░░ ▐███▒ ░▓████▌░░░ ▐███▓░ ▒█████▌ ░░ ▓████▌
▀▀▀█▀▀████▄███████▌ ░▀███▌ ░ ▄██▀▀ ░▀███▌░ ▄██▀▀░ ▀▀▀█▀▀▀▀▀░ ▐████▓░
_ ________ ▀▀▀▀▓███▓░ _ ▀▀█▄ ▀ _sRT!CRo_ ▀▀█▄ ▀ ___________ _ ▄▄██▓▀▀░ _
░ ░▀██▌ ▀ ▀ ▄█▀ ░
░ ▐█ ░ ░ ▐▌ ░
░ ▀▄ ░ ░ ▀ ░
░ ░
░ ░ ░
░ PRESENTS
░ ░ ░
░
░ Intact Enterprise v3.1 *Incl.Keymaker*
▄▄▄▄▄▄▄▄ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ▄▄▄▄▄▄▄▄▄
╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┐
┌─┤▌ RELEASE INFO ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ [ Program .................................. Intact Enterprise v3.1 ] █
█ [ Type ..... Enterprise Change Detection and Integrity Verification ] █
█ [ OS .................................................... Win9xNT2k ] █
█ [ Protection ............................. Tough scheme using SHA-1 ] █
█ [ By ....................................... Pedestal Software, LLC ] █
█ [ Homepage ........................ http://www.pedestalsoftware.com ] █
█ █
█ [ Cracked by ................................ Ivanopulo ] █
█ [ Release type .......................... Incl.Keymaker ] █
█ [ Release date ........................... Jan 11, 2001 ] █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
│╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤
┌┴┤▌ DESCRIPTION ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ Intact Enterprise is designed for large scale deployment of Intact. █
█ It requires the support of a relational database (such as Oracle, █
█ DB2, Sybase, or MS SQL Server) as a back-end for storing change █
█ detection records and client configuration information. A central █
█ management console allows a single administrator to configure and █
█ monitor many machines securely. █
█ █
█ Enterprise Change Detection █
█ █
█ Intact Enterprise includes all the capabilites of Intact Intelligence █
█ and Intact Directory Services, including Pedestal Software's █
█ behavioral technology, while adding centralized management and █
█ control. Intact Enterprise uses the industry-standard ODBC protocol █
█ to access existing database technology from database vendors such as █
█ Microsoft, Oracle and IBM. Intact utilizes the database to: █
█ - Store change detection records (records may also be stored locally █
█ if desired, while keeping the configuration and output on the █
█ database). █
█ - Store client scheduling and configuration parameters. █
█ - Centralize logging of detected changes, events, errors, warnings █
█ and other output. █
█ █
█ Centralized Console █
█ █
█ Intact Enterprise was designed with large deployments in mind. The █
█ Intact Enterprise Administrator (click to see a picture of Intact's █
█ Administrator GUI) provides the interface to manage many Intact █
█ Enterprise clients from a single location. With the Administrator you █
█ can easily perform change detection operations on managed computers, █
█ schedule runs, configure and view output and events from a single █
█ console. By employing Intact's behavioral monitoring and █
█ auto-configuration, you can easily use the Administrator to deploy █
█ Intact on hundreds of machines. █
█ █
█ Features and Benefits █
█ - Use existing database technology. █
█ - Leverage existing authentication and encryption support provided by █
█ database vendor. No proprietary protocols are needed. █
█ - Central management of many Intact Enterprise clients. █
█ - Database security prevents unauthorized access to data even if the █
█ machine is compromised. █
█ - Several machines can share the same database. █
█ - A variety of notification mechanisms ensure you are always alerted: █
█ eventlog, syslog, email, log files, the Windows Messenger service, █
█ and an ODBC table. █
█ - Real Time change detection. █
█ - Includes the Intact Integrity Protection Driver to help protect █
█ from rootkit installation and trojan hiding. █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
│╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤
┌┴┤▌ INSTRUCTIONS ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ Run the keymaker and register the program. Serial number must be █
█ entered during program installation. █
█ █
█ Enjoy =) █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
│╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤
┌┴┤▌ VERIFICATION ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ Due to the every day increasing amount of lamers who fake DAMN █
█ releases ALL DAMN releases starting from July 1, 2000 are digitally █
█ signed. █
█ █
█ Download DAMN Release Signature Verificator from http://www.damn.to █
█ (about 100K only) if you want to be sure that release you got was █
█ really made by DAMN. █
█ █
█ Don't use any stuff claiming to be made by DAMN if it's released █
█ after July 1, 2000 and doesn't pass verification. Using it can be █
█ dangerous. █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
│╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤
┌┴┤▌ GREETINGS ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ Our greetings fly to all groups and crackers who work hard to keep █
█ the Scene alive. █
█ █
█ Personal greetings to: Dimedrol, Duelist, egis, Quantico, Recca, █
█ russ97, tE!. █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
│╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤
┌┴┤▌ CONTACT ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ Visit our www site at [ http://www.damn.to ] █
█ Backup page [ http://damn.da.ru ] █
█ █
█ Email address for contacts [ [email protected] ] █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
└─ ────── ─ ──══── ─ ────── ┬ ────── ─ ────── ┬ ────── ─ ──══── ─ ────── ─┘
│▌ (c) 2000 DAMN ▐│
└ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┘
Release ID: 3A5D03C979694016
----------------------- DAMN RELEASE SIGNATURE START ------------------------
damn_intactent31.exe 1 PXko8GJjR/XrM3gKE3wFQNE5y/8 9GS4dLsWxLRDCx+snUTwuW+ICwQ
damn.nfo 0 Qg9P+9jZezCH5UwjTqX1oeMGZXg SaQpydrApe2jYBIb2IkRgEXNyIE
------------------------ DAMN RELEASE SIGNATURE END -------------------------