Download CryptoCrat 2003 v2.18 crack by HERiTAGE

Added to site2003-12-31
Rating80/100
Votes3


cryptocrat2003v2.18crackheritage.zip (451232 bytes)

namesizecompressed
heritage.nfo 19242 19242
file_id.diz 506 506
crack.rar 336176 336085
crack.exe 224256 95051

heritage.nfo

                                ▄▄▄▄▄
                              ▓▀ ▄▄▄ ▀▓
  ▀ ▀▀▀▀▀▀▀▀▀ ▀▀▀▀▀▀▀ ▀▀▀▀ ▀▀▀  ██▓██  ▀▀▀ ▀▀▀▀▀▀▀▀▀▀▀▀ ▀▀▀ ▀▀▀▀▀▀▀▀▀ ▀▀▀▀ ▀
 ▀████   ███▀ ▀▀▀▀▀███ ▀ ▀▀▀▀██▄ ▀▀▀  ███ ▌WAR▐ ▄██▀▀▀▀ ▀ ▄██▀▀▀▀ ▀▀███▀▀▀███
  ████ ░ ███ ███ ░ ███ ███ ░ ███ ▄███ ███ ▀▀▀▀▀ ███ ░ ███ ███ ░ ███ ███ ░ ███
  █▓▓█ ▒ █▓█ █▓█▄▄▄███ █▓█ ▒ █▓█ █▓▓█ █▓█▀▀▀    █▓█ ▒ █▓█ █▓█ ▒ █▓█ █▓█ ▒ █▓█
  ██▓█ ▓ ███ █▓█   ▄▄▄ █▓█ ▓ ███ ██▓█ █▓█   ███ █▓█ ▓ ███ █▓█ ▓ ███ █▓█ ▓ ███
  ████ ▒ ███ ███ ▒ ███ ███ ▄▄▄▄▄ ████ ███ ▒ ███ ███ ▒ ███ ███ ▒ ███ ███ ▒ ███
  ████ ░ ███ ███ ░ ███ ███ ▒▓▓▓▓ ████ ███ ░ ███ ███ ░ ███ ███ ░ ███ ███▄▄
  ████▄▄▄███▄▄ █▄▄▄███ ▄ █ ░▒▒▒▒ ████ ███▄▄▄███ ███▄▄▄███ ███▄▄▄███ ███▀▀ ███
  ████ ▄ ███ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ███ ███ ▒ ███
  ████ ▓ ███ █▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▒▒▒▒▒▒▒▒▒▒▒▒░░░░░░░░░░       ███ ███ ▓ ███
  ████ ▒ ███ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ ███ ▒ ███
  ▀███ ░ ███     ■ Celebrating our History....  Heritage 2003 ■     ███ ░ ███
    ▀█    ▀█▄ ▄ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ▄ ▄███▄▄▄█▀



    ╓─────────────────────[ HERiTAGE '2003 PRESENTS ]─────────────────────╖
╓────────────────────────────────────────────────────────────────────────────╖
║                   CryptoCrat 2003 v2.18 (C) Company Name                   ║
╙─────────────┐────────────────────────┐───────────────┐─────────────────────╖
║ SUPPLiER:   │   Team HERiTAGE        │ TYPE:         │ Utility             ║
║ PACKAGER:   │   Team HERiTAGE        │ # OF DiSKS:   │ 1 x 1.44 MB         ║
║ PROTECTiON: │   ASPack v1.1          │ RELEASE DATE: │ 24.11.2003          ║
║ CRACKER:    │   Team HERiTAGE        │ RATiNG:       │ [**********] [10/10]║
╙─────────────└────────┐───────────────└───────────────└─────────────────────╖
║ SYSTEM REQUiREMENTS: │  WinALL - RAM 16MB - HDD 10MB                       ║
║                      │                                                     ║
╙──────────────────────└─────────────────────────────────────────────────────╖
║ RELEASE NOTES:                                                             ║
║ ~~~~~~~~~~~~~                                                              ║
║ Here you will find your own tool for making encrypted archives + file      ║
║ shredder + program making self-unpacking encrypted executable files.       ║
║                                                                            ║
║                                                                            ║
║ Introduction                                                               ║
║ While it is well known that letters can be intercepted and phone lines can ║
║ be tapped, it is not so well known that even e-mails can be easily read.   ║
║ In fact it is commonly believed that the login password provides privacy   ║
║ and security.                                                              ║
║ This is not actually so!                                                   ║
║                                                                            ║
║                                                                            ║
║ Any employee of the Internet Service Provider (ISP) that you you use, can  ║
║ tap into your e-mail at your end or that of the recipient with the use of  ║
║ fairly basic equipment. Tapping can also be done by anyone who links up to ║
║ the dozens of Internet routers through which your message passes.          ║
║ The mail can even be accessed by someone at the phone company's office or  ║
║ a hacker who taps in through them.                                         ║
║                                                                            ║
║ There are also a number of more sophisticated methods and a wide range of  ║
║ equipment by which all electronic communication can be intercepted. These  ║
║ are used primarily by government agencies, but can also be employed by     ║
║ business rivals and competitors.                                           ║
║                                                                            ║
║                                                                            ║
║ Such agencies can also use specially designed software that can            ║
║ automatically search all e-mails and faxes passing through a particular    ║
║ phone network for keywords, or analyze phone calls digitally. So even if   ║
║ you are using unlisted numbers, or public call offices and cyber cafΘs,    ║
║ your communication can be traced and intercepted by picking up commonly    ║
║ used terms or phrases.                                                     ║
║                                                                            ║
║                                                                            ║
║                                                                            ║
║                                                                            ║
║                                                                            ║
║ Click screenshot to enlarge                                                ║
║                                                                            ║
║ Hence, encryption, using SecureAction's GUIDESX software, is the only      ║
║ guaranteed way to protect your privacy.                                    ║
║                                                                            ║
║                                                                            ║
║ What is encryption?                                                        ║
║ Encrypting data means getting it transformed into a string of characters   ║
║ undecipherable by others.                                                  ║
║                                                                            ║
║ What actually happens is that by using a secret-key i.e. the equivalent of ║
║ a code (see glossary), the cryptography system transforms your data into   ║
║ gibberish. If the scrambling of the data is done properly, the original    ║
║ file can only be unscrambled and read by someone who knows the secret key  ║
║ i.e. the code used to encrypt the file.                                    ║
║ Encrypting a file ensures that even if someone gets access to your         ║
║ computers he would not be able to read the data stored there. Encrypted    ║
║ files can safely be sent by e-mail or placed on a network with the         ║
║ assurance that the data can be read only by those who were meant to have   ║
║ it.                                                                        ║
║                                                                            ║
║ Basic encryption systems have been used to protect secrets for many        ║
║ centuries. But today's encryption methods are far more sophisticated and   ║
║ reliable than ever before because the encryption code itself is a very     ║
║ complex computational transformation that is only feasible with desktop    ║
║ machines in the early 1990s                                                ║
║                                                                            ║
║ What can I do to be safe?                                                  ║
║ Each time you work with sensitive data, or wish to communicate with        ║
║ someone else confidentially, you must use CryptoCrat 2002 to protect your  ║
║ files. (The Help Menu provides a step-by-step guide of how this is to be   ║
║ done).                                                                     ║
║                                                                            ║
║ Ensure that all you stored information is also encrypted so that it is     ║
║ safe from the eyes of snoopers, competitors or uninvited investigators.    ║
║                                                                            ║
║ And when getting rid of old files or data, don't just delete them, use the ║
║ built in Shred function in the program to be absolutely safe.              ║
║                                                                            ║
║                                                                            ║
║ Why CryptoCrat 2002?                                                       ║
║ Easy in use                                                                ║
║                                                                            ║
║ Handy interface like Windows Explorer                                      ║
║                                                                            ║
║ An ability to work with several files/directories simultaneously           ║
║                                                                            ║
║ An ability to store numerous confidential files and directories in a       ║
║ single encrypted archive file                                              ║
║                                                                            ║
║ Files encryption is executed with Blowfish, the most powerful to date      ║
║ encryption algorithm using 448 bit key                                     ║
║                                                                            ║
║ Statistically impregnable against brute force attacks (at least 1032       ║
║ billions years for the fastest computer in existence to break the key -    ║
║ the age of the universe is 1018 billions years). For encryption and        ║
║ protection your important documents, CryptoCrat 2002 uses strong crypto    ║
║ algorithms DES with 128 bit and Blowfish with 448 bit keys                 ║
║                                                                            ║
║ Built in file shredder - i.e. wiping the contents of the original          ║
║ pre-encrypted file beyond recovery to make sure that not even a trace      ║
║ remains after shredding. (matching and exceeding the specifications of the ║
║ U.S. Department of Defense) to stop hardware recovery tools.               ║
║                                                                            ║
║ Built in compression of files to reduce size in transmission. A special    ║
║ feature, which allows using data compression during the encryption         ║
║ process. We use our own compression algorithm, which exceeds WinZip by     ║
║ compression rate.                                                          ║
║                                                                            ║
║ No "back door" in the software - No access possible under any              ║
║ circumstances. If you do not remember the password you cannot access the   ║
║ encrypted contents. There is no special procedure, secret code, or hidden  ║
║ entry method to fall back on.                                              ║
║                                                                            ║
║ CryptoCrat 2002 encrypts every kind of file on every kind of medium,       ║
║ whether floppy disk, removable hard drive, zip drive, tape drive or other  ║
║                                                                            ║
║ Self-extracting encrypted archives creating feature. This allows you       ║
║ e-mail the only *.exe file containing encrypted confidential data securely ║
║ to your partners without any danger of interception by third persons. For  ║
║ all that, your file recipient does not need to use the same program in     ║
║ order to extract the encrypted files, for your archive will self-extract.  ║
║                                                                            ║
║ The only requirement for self-extracting files is that the recipients must ║
║ be running some form of Microsoft Windows. All they need is a key to       ║
║ access the contents i.e. a totally secure system is possible without any   ║
║ modification of existing mail systems using any mail system that supports  ║
║ file attachments.                                                          ║
║                                                                            ║
║ An opportunity to associate a special tip with your password. This tip     ║
║ will help you remember your password in case you forgot it.                ║
║                                                                            ║
║ An ability to sign your archives (that means to insert your author's data  ║
║ into it)                                                                   ║
║                                                                            ║
║ Powerful and handly program's interface styled like Windows Explorer       ║
║                                                                            ║
║                                                                            ║
║                                                                            ║
║ Enjoy another fine release from HERiTAGE!                                  ║
╙──────────────────────└─────────────────────────────────────────────────────╖
║ INSTALL NOTES:                                                             ║
║ ~~~~~~~~~~~~~                                                              ║
║ Unpack and install. Replace exe in crack.rar with installed one. It should ║
║ now be registered to HERiTAGE if you did it all correct.                   ║
║                                                                            ║
║ A big thank you to t0xic/TNO for the crack. All props goes to him.         ║
║                                       HERiTAGE / HERiTAGE 2003             ║
╙────────────────────────────────────────────────────────────────────────────╜
    ╙────────────────────────────────────────────────────────────────────╜


 ╓────────────────────────────[ WANNA JOIN IN? ]──────────────────────────╖
╓────────────────────────────────────────────────────────────────────────────╖
║  HERiTAGE is looking for skilled crackers, bnc suppliers, HQ sites etc...  ║
║        If you have something we need, get in touch with us, we             ║
║                    will make sure you get your rewards!                    ║
║                                                                            ║
║                       Contact us @ [email protected]                       ║
║                                                                            ║
║                HERiTAGE - CELEBRATING OUR LAMENESS SINCE 1996              ║
║                                                                            ║
╙────────────────────────────────────────────────────────────────────────────╜
    ╙────────────────────────────────────────────────────────────────────╜



    ╓────────────────────────[ HERiTAGE MEMBERS ]────────────────────────╖
╓────────────────────────────────────────────────────────────────────────────╖
║  [HTG] REMEMBERING THE PAST AND FULFILLING OUR GOALS IN THE PRESENT [HTG]  ║
╙────────────────────────────────────────────────────────────────────────────╖
║        ALL HERiTAGE MEMBERS WERE TAKEN OUT DUE TO SECURITY REASONS!        ║
║                OFFiCiAL HERiTAGE MEMBERS KNOW WHO THEY ARE ;)              ║
╙────────────────────────────────────────────────────────────────────────────╜
    ╙────────────────────────────────────────────────────────────────────╜



    ╓──────────────────────────[ HERiTAGE SiTES ]────────────────────────╖
╔══════════════════════╕═══════════════════╕═══════╕═══════╕═════════════════╗
║     SYSTEM NAME      │  SYSTEM OPERATOR  │ NODES │ SPEED │     POSiTiON    ║
╚══════════════════════╕═══════════════════╕═══════╕═══════╕═════════════════╗
║                                                                            ║
║  REMOVED FOR SECURiTY REASONS... YOU KNOW WHO YOU ARE, AND THANKS ::}      ║
║                                                                            ║
╙────────────────────────────────────────────────────────────────────────────╖
║                -+- All Sites Staff are Heritage Members -+-                ║
╙────────────────────────────────────────────────────────────────────────────╜
    ╙────────────────────────────────────────────────────────────────────╜



    ╓─────────────────────────[ HERiTAGE NEWS ]──────────────────────────╖
╓────────────────────────────────────────────────────────────────────────────╖
║                                   NEWS                                     ║
║                            ~~~~~~~~~~~~~~~~~~~                             ║
║                    No NEWS iS GOOD NEWS THEY DO SAY!!                      ║
╙────────────────────────────────────────────────────────────────────────────║

╙────────────────────────────────────────────────────────────────────────────╖
║                              GROUP GREETiNGS                               ║
║                             ~~~~~~~~~~~~~~~~~                              ║
║                                                                            ║
║            GREETS GO OUT TO ALL THOSE KEEPiNG THE SCENE ALiVE!!            ║
║                                                                            ║
╙────────────────────────────────────────────────────────────────────────────╖
║                            PERSONAL GREETiNGS                              ║
║                           ~~~~~~~~~~~~~~~~~~~~                             ║
║               Too many dudes to thank, you know who you are!               ║
║                                                                            ║
╙────────────────────────────────────────────────────────────────────────────╜
    ╙────────────────────────────────────────────────────────────────────╜

    ╓──────────────────────────[ FiNAL NOTES ]───────────────────────────╖
╓────────────────────────────────────────────────────────────────────────────╖
║ If you really like this software, consider purchasing it!  Seriously, keep ║
║ the hard working programmers paid; Motivate them to create more good stuff ║
║  for us to pirate.  If you don't care about this software, then delete it  ║
║  because it's only fair.  This program is for the purpose of evaluation.   ║
╙────────────────────────────────────────────────────────────────────────────╜
    ╙────────────────────────────────────────────────────────────────────╜

     ╓────────────────────────────[ CREDiTS ]─────────────────────────────╖
╓────────────────────────────────────────────────────────────────────────────╖
║                   Header ASCii and NFO Layout by Manowar                   ║
║                    NFO Updated by Leadership on 09/01/2003                 ║
║                        (c) Heritage Productions 2003                       ║
║       "Remembering the past while fulfilling our goals in the present"     ║
║      "Our little group has always been And always will until the end!"     ║
╙────────────────────────────────────────────────────────────────────────────╜
    ╙────────────────────────────────────────────────────────────────────╜



file_id.diz

.╖ CryptoCrat 2003 v2.18           [xx/01]╖.
:(c) Company Name                [24.11.03]:
:  .__          .____                      :
|__l  \._____.___\__/___ /^\__ /\___ .____ |
l  |   \  _  l   \__/  l__    \     \l  _ \|
l  :    |  __/.:__| \  __/  |  \ --  |  __/l
l  _.   |    \ | |   |  \/\ _  |  .  |     \
l__:    |____/__\|___|_   /_:__|--:  |\____/
||||___/:::::::········\_/···:/_____/|[war]|
|:·|-| HERiTAGE 2003 PROUDLY PRESENTS |-|·:|
|||||||::::::::··············::::::::|||||||



# 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z