▄▄▄▄▄▄▄
▄▄█▀▀ ▄▄▄ ▀▀█▄
▄▄▄▄▄▄█▀▀ ▄▄███▀█▓▓▄ █
█ ▄▄▄▄ ▄████▀ ▐██▓▌▐█▄▄▄▄
▐▌▐███▌▐███▌ ▀▀▀▀ ▄▄▄▄ █ ▄▄▄▄▄
▀ ████ ███▄ ▐▓██▌▐█▄█▀▀▀▀▀▀█ ▄▄▄▄▄▄ ▄▄█▀▀▀ ▄ ▀▀█▄
▐███▌▐█▌ ▄▄▄▄ ▓▓██ ▄▄▄▄ ▀▀▀▀ ██▀▀▀ ▄▄ ▀▀█▄ ▄█▀▀ ▄▄██▀███▄ █
▄▄▄███▓ ██▄ ▐██▓▌▐▓██▌ ▐▀░▀▌▐███▌ ▄▄███▀█▓▓▄ █ █ ▄███▀ ▐█▓▓▌▐█▄▄▄▄▄▄
▄ ▄███▀ ▐██▓▌ ▀▀████▓ ████ █▄██ ██▓▓ ██▀ ▐██▓▌▐▌ ▐▌▐███▌ ▀▀▀▀ ▀ ▄▄▄▄ ▀▀█▄
▐▌▐▓██▌ ▄██▓▓▀ █▄▄ ▀▀ ▐▓██▌───▐███▌▐██▓▌▐▌ ▀▀███▓ ▀▀▀▀ ▓███ ───── ▄▄████▀█▓▓▄ █
█ ▀▓▓█▄██▀▀ ▄▄█▀ ▀▀▀█ ▀▀███▄ ▄███▀▀ ▀▀▀▀▄█ ░▐███▌▐███▄▄▄▀█▌ ▄▄▄▄▀█▓▓▀ ▐██▓▌▐▌
▀█▄▄ ▀▀ ▄▄█▀▀ ▀▀█▄▄ ▀▀█▀▀ ▄▄█▀█▌▐██▓▌ ▀▀▀▀▄██ ▀██▓▓ █▄ ▐██▓▌▐█▌ ▀▀▀▀ █
▀▀▀▀▀▀ asC/Strick9 ▀▀█▄▄▄█▀▀ ▐█ ▀▀▀▀ █▌▐▓██▌ ▐██▓▌▐██▄██▓▀ █▄ ░ ░▓██▌
▀▀▀▀▀▀▀█ ▀▀▀▀ oO ███▓ ▀▀▀ ▄▄█▌ ▄▄▄▄ █
▀▀▀▀▀▀▀█ ▐███▌▐▀▀▀█ ▀▓▓█▄ ▐██▓▌▐▌
█ ▀▀▀▀ █ ▀█▄ ▀▀█████▓ █
▀▀▀▀▀▀▀▀ ▀▀█▄▄ ▀▀▀ ▄█
Deviance ▀▀▀▀▀▀▀
· ─ ─·-────────────────────────────────────────────────────────────────-·─ ─ ·
Ghost Recon: Desert Siege (c) Ubisoft
· ─ ─·-────────────────────────────────────────────────────────────────-·─ ─ ·
┌────────────────────────────────────┬───────────────────────────────────────┐
│ Supplier....: Team Deviance │ CD Count.......: 01 CD │
│ Protection..: SafeDisc2 │ Date...........: 03/2002 │
└────────────────────────────────────┴───────────────────────────────────────┘
ALWAYS READ THIS NFO PROPERLY
** Release Information **
Game Notes:
~~~~~~~~~~~
The Ghosts are on the move to the war-torn lands of North Africa, where
overt conflict has broken out between Ethiopia and Eritrea. With UN support
under constant threat and attack, and key aid and supply ports closed,
restoring order to the region rests in the hands of the Ghosts.
The Tom Clancy's Ghost Recon: Desert Siege features new weapons, vehicles
and enemies, plus enhanced sound and visual effects to ensure that the
trademark realism and tension of the original game is maintained in the
arid and unforgiving environments of North Africa.
Game Features:
~~~~~~~~~~~~~~
East Africa, 2009. A 60-year conflict boils over as Ethiopia invades its
smaller neighbor Eritrea, threatening the world's most vital shipping lanes
in the Red Sea. An elite team of U.S. Army Green Berets, known as the
Ghosts, moves in to safeguard the seas and free Eritrea. As the war rages
on, the Ghosts are drawn from Eritrea's shores to the heart of Ethiopia in
their deadliest battles yet.
* New Multiplayer modes: Team-based Siege and Domination modes allow teams
to attack or defend territory.
* Both new modes are fully compatible with your original Ghost Recon game
- play for hours on the original maps.
* 8 new single player missions.
* 4 new dedicated multiplayer spaces.
* 9 new multiplayer weapons, including the Bizon submachine gun, the M98
sniper rifle, and the fearsome M-60 machine gun.
Note:
~~~~
You need the full version of Tom Clancy's Ghost Recon, to play this addon.
Install Notes:
~~~~~~~~~~~~~~
1) Unrar.
2) Burn the .cue and .bin with CDRWin or Fireburner.
3) Install the game.
4) No need to copy a cracked .exe over. It will been done automatically.
5) And then play :)
Read this NFO properly!
· ─ ─·-────────────────────────────────────────────────────────────────-·─ ─ ·
DEViANCE Application Information
────────────────────────────────
You think you can contribute to the scene too? You have one or more
talents in:
- supplying NEW unreleased games (maybe you work at a game/util
magazine, courier delivery firm, newspaper, game press/marketing
company, distributor, publisher, duplicator, tv/radio show, shop,
warehouse, store etc.) You do not need a fast internet connection
for the above!
- supplying unreleased NEW store/shop games & have a fast UPLOAD
300k+ internet connection and time to spare on weekday mornings.
Of course we shall reimburse you for the costs of the games you
buy.
- you are a coder with lots of experience in Debugging/ASM & C/C++.
You also can code your OWN tools to automatically remove
commercial iso protections like the latest versions of any of the
following: SafeDisc or Securom or TAGES or VOB or Laserlok or
Copylok. Using tools created by others does NOT count and we
check! You will also need advanced knowledge of PE File Formats.
- you are a Unix guru with good ansi-c software developing knowledge
and understanding how to prevent network security vulnerabilities.
That means you must be able to code to ansi-c guru level. And you
must also have a good coder perspective of hostbase and network
based intrusion detection systems. You should be able to code tools
to generically prevent stack and heap buffer overflows on unix in
Ansi-c. And Be able to code tools to look after a group of systems
and code sniffing avoidance tools. And you can configure a system
in ways to prevent packet sniffers and "man in the middle" attacks.
No window's lamers ;p
- supplying linux/BSD eggdrop/bnc shells to the group (for free).
They should have 2mbit MINIMUM link. We shall require flexible
control over the shell. Root access on the box with dynamic
ident such as midentd for bncs, but just normal shell accounts
are fine for eggdrop shells. All boxes must have legitimate
IP's, they should not be running NAT or a firewalling system
that will constantly interfere with the link. Ideal shells will
have multiple vhosts, reasonably good uptime (20+ days), and a
low system load. Public shells such as JEAH.NET or similar with
25+ load averages and 3 day uptimes are not acceptable. The more
reverse ips you have the better. We are only interested in LEGIT,
NON-HACKED/CARDED shells. These shells will be used only for the
purposes listed above and will NOT be used for any kind of
'dump site' or for spreading any kind of releases. We are NOT
interested in modem, cable, or DSL shells. The shells should be
up 24/7 with minimum downtime for upgrades, etc and should not be
overloaded with processes.
- If you know the difference between reindexing and unpacking
large files. Or if you can identify ANY major file formats by
looking at the hex byte code of the header. Or if you can tell
and show the difference between MPQ & HAPI.
And can code your own tools to rip apart the above technologies
(to show you fully understand them) then apply at once.
- making trainers for newly released games (menu driven, must work
in Win9x and Win2K/WinXP).
If you can meet one or more of those requirements and want to join
the finest active group in the scene today, e-mail us.
Use the contact information given below.
And always remember: we do this just for FUN. We are against any
profit or commercialisation of piracy. In fact, we BUY all our
own games with our own money, as we love game originals.
And if you like this game, BUY it. We did!
· ─ ─·-────────────────────────────────────────────────────────────────-·─ ─ ·
How to Contact DEViANCE
─────────────────────────
READ BELOW FIRST OR YOU WILL BE IGNORED:
DEViANCE DOES NOT PASSWORD FILES, OTHERS DO THAT!
DEViANCE DOES NOT MAIL OR FTP OR SEND MISSING DISKS OF OUR RELEASES!
DEViANCE DOES NOT PUBLISH FILES ON WEB SITES, NEVER!
DEViANCE DOES NOT USE IRC TO PUBLISH FILES, NEVER!
DEViANCE DOES NOT DO TECHNICAL SUPPORT, NEVER EVER!
DEViANCE DOES NOT HAVE, WANT OR NEED ANY WEB SITES!
DEViANCE DOES NOT GIVE OUT ANY LINKS OR NAMES FOR FILES!
SO DO NOT ASK!!
Via the WWW : WE DO NOT USE OR WANT ONE, THANKS
Via E-Mail : [email protected] (READ NOTES ABOVE FIRST)
DEViANCE: ALWAYS FASTER THAN LiGHT!
· ─ ─·[NFO UPDATED 14/DEC/2001]───────────────────────────────────────-·─ ─ ·
Support the software companies. If you play this game, BUY it!