▐█▄ ▄█▌
▀▓▄ ▄▄▀▀▀▀▄▀▀▀▀▄▄ ▄▓▀
▄ ▄▄██▓▌ ▄▄▄▀▄ ▄▀▄▄▄ ▐▓██▄▄
▄▓▄ ▀ ▄▄██████████▀▀▀ ▀▄ ▀█▄▀▄█▀ ▄▀ ▄███████████▄▄
▀ ▄▄█▀▀▓▓░ ▄▀▄▄█████████▀▀ ▄▄ ▓▄▀█▀▄▓ ▄▄ ▀▀██████▓██▄▄▀▄
▄▓▓▀▄▓▀▀ ▐▌███▀▀ ▄▄▄▄▄██▐ ░▀ ▐█▌ ▐█▌ ▀░ ▌██▄▄▄▄▄ ▒▀▀███▐▌
▓▓▓▌▐▓ ▄▓▄ ▀▓█▌ ▐▓▓█▀██ ▀▀ ▀▄▀▀ ▀▀▄▀ ▀▀ █▄▀██▓▌ ░ ▐██▀ ▄
▓▓█▌▐▌ ▀ ░▀▀▄ ▄▓▓█▄█▀▄▓█▄▄██▄▄█▄█▄▄██▄▄██▄▀██▓▓█▄ ▄▀▀ ▀ ▄▓▄
▒▓▓█▄▀▄ ▀▓▓██▀▄▀▓██▌▐█▌▐█▌▀▐█▌▐█▌▐███▀▄▀█▓▓█▀ ▀
░ ▀▀▀█▓▓██▄▄▄▄▄▄ ▄▓█▌▐▌░▐██ ▀ ▐ ▀ ▀ ▌ ▀ ▓█▌░▐▌▐█▓▄ A G G R E S S i O N
▀▀▀▀▀▀ ▄▓▓███▄▀▄ ▀▌ ▌ ▐ ▐▀ ▄▀▄███▓▓▄
▄ ▀▓▓███▀▄▀░ ▌▀▒▓▄▀ ▌ ░▀▄▀██▄▀ ░▓▓███▄▄▄▄
F E E L T H E ▄▓▓█▌▐▌░ ▄ ▄█▄▄ ▀▄▄▄█▓▄▀ ░▐▌▐█▓▓▄ ▄ ▀▀▀▀▀███▄
▐▓████ ▀▒ ▌▀▀ ▀▀▀██▄▀███▌ ▒▀ ████▓▌ ▀▓▀ ▄▓▀██▄
▀ ▄ ▐▌ ▀▓██▌▓▄▄ █████ ▓▓▌▐██▀▄ ▄▄▓▌██▓▀ ▄ ▄ █▓▓▌ ▀▄ ██▓
▄ ▄▓▄ ▐▌▓▄▓ ▄██▐█▓▓█ ▐▀ ██▌▐▓▓██▌▐█▌ ▓▓▓▓▌██▄ ▓█▌▀▄▐▌██▓▌ ▐▌▐█▓
▄▐▌ ▀ ▄█▓▓█▌▀▀▀▄██▓▓▓▐█▄▐ ███▄▀▀▄██▓▀ ▄█▌▓▓▓██▄▀▀▀▄██▓▄█ ███▌ ▄▀▄▓▓
▐██▀▄▄▀██▓▀▀▄▄▄████▓█▓▓ ▀▓▐░░█▐████▄▄▀░ ▀▓ ▓▓█▓████▄▄▄ ▀▓▓▌███▌█▓▀▀▀
▀ ▄▓▄ ▀█▓█▌▐█▀▄██████▀▀▐██▓▓ ▒▐░░█▌▀█████▓▓▄ ░ ▓▓██▌▀▀██████▄▀ ███▌▒ ▄▓▄
▄▀ ▀ ▒▀█▀▄████▀ ▄▄▄ ▐███▓ ░▐▒▒█▌░ ▀███▓▓▌ ▄▓▓██▌ ▄▄▄ ▀▀███▄███▌░ ▄ ▀ ▀▄
▐▌▄▀ ▄▄█▀ ▐▓▓██ ▀▓█▌▐██▀▄▀ ▐▒▒█▌░░ ▐██▓▓▌ ▐▓███▌▐█▓▀ ██████▌ ▀▄▄▐▌
██▌▄▓▓▀ ▄ ▓▓██▌ ░▀▀▐█▄█ █▄▀▐▓▓██▄▄▄▄███▓▀ ▄▀▓███▌▀▀░ ▐████▓▌ ▐▄▓█
██▐▓▓▌ ▀▓▀ ▐▓███▌ ▄███▄ ▐██▀▄▓█ ▐▓▓█▀█▓███▀▀░ █▌ ████ ▀▓▄ ███▓▓▌ ▄▓▓▓▌
▐▓▄▀▓█▄ ▄▓████ █▓▀ ▀█▄▄▄██▀ ▐▓▓▌▐▓▓█▄ ▀▄▓██▓ ▓▓▒ ██▓▓▒▌ ▄▐▓▓▓▓▀
▀▓▓▓▀████████▓▄█▀ ▄ ▄▄▄████▄▄▄▀████▄▀▓▓▓█▄▄ ▀▄███▓░ ▐▓█ ▄ ▄▄█████▓▄██▀▓▓
▀▓▓▌ ▄▄▄█▀▀█▀▀▄ ▐███░ ▄ ▀██▓▄░▀░▓███▄▄▄▀▀▀ ▄▄▓▓ ▄▀▀█▀ ▄▄▄▄ ▓
▒▀▄▀▀ ▄▄▄ █▌▄ ▄▄▄▓▄▐███▒ ▄▄▄▓█ █▒▓█ ▓▄▄▄▀▀▀█████▓▀▀░▄▄▄▄▄ ▐█ ▄▄▄ ▀▀▄ ▒ ▄
░▐▌▄▓▄ ▄█▀▀▓█▄ ▀ ▀██▓ ▀░ ▐█▓▓▌ ▄▄▄▓▓█▄▄ ▄▄▄ ▄██▀ ▀█▄ ▄▓▄▐▌░
░ ▀▄▀▄▄█▀ ░▀███▄▄ ▀█ ▄▄█▓▓▀▄███▀▀▀▀███▄▀█▌ ▄▄▄▓▒░░ ▀█▄▄▀▄▀ ░
▄ ▄ ▀▀████▄▄▄▄▄█████▀▀ ▐█▀ ▀█▓▄▄██▀▀ ▄▓▄ ▄
▄▓▄ ▐▌▀▄▄▀▓▀ ▀▀▀▀▀▀▀▀ ▀▄▄▀▐▌ ▄▓▄
▀ ▄▀ ▄▄▄█▓▄ A G G R E S S i O N ▄▓█▄▄▄ ▀▄ ▀
▄▀▄▓▓▀▄▀ ▒ ▒ ▀▄▀▓▓▄▀▄
▐▌▐▓▓▌▐▌ ░ ░ ▐▌▐▓▓▌▐▌
▀▄▀▄ ▀██▄▀▄▄▀ HiTek Software ▀▄▄▀▄██▀ ▄▀▄▀
▄▄▄███▓▀▀▓▀▀ AutoKrypt.v7.18 ▀▀▓▀▀▓███▄▄▄
▄▓▓▀▄▀▀ ▀ █ ▀ ▀ █ ▀ ▀▀▄▀▓▓▄
▐█▓▌▐▌ ▄▓▄ █ █ ▄▓▄ ▐▌▐▓█▌
▐▌▀▓█▄█▄ ▀ █ Cracker ........: ARN █ ▀ ▄█▄█▓▀▐▌
▀▄ ▀▀▀██▄▄ █ Packer .........: ARN █ ▄▄██▀▀▀ ▄▀
▌█▄▄ █ █ ▄▄█▐
▄▀▓▓▀ █ Protection .....: Other █ ▀▓▓▀▄
▐▌▐▓▌ █ Crack Type .....: Regged █ ▐▓▌▐▌
▀▄▀█▄ ▄ █ Release Date ...: 29.11.2006 █ ▄ ▄█▀▄▀
▀█ █ Release Size ...: 5x 4.89 mb █ █▀
▄▓▄ ▐▌ █ █ ▐▌ ▄▓▄
▀ ▄▀ █ Release Type ...: Application █ ▀▄ ▀
▀ █ Operating Sys ..: WinAll █ ▀
█ █
█ █
▄███▀ ▓ ▄■ ■▄ ▓ ▀███▄
▐▓▓█▌ ▄ ▄ █▌ ▐█ ▄ ▄ ▐█▓▓▌
▀▓▓█▄ ▄▓▄ ▀▓▓██▄ ▄ ▄ ▄██▓▓▀ ▄▓▄ ▄█▓▓▀
░ ▄▄██▓██▄▄▄ ▀ ▐▓▓██▌▐▌ ▐▌▐██▓▓▌ ▀ ▄▄▄██▓██▄▄ ░
▄▓██▀█▀ ▀▄ ▀▀█▓▄▄▄█▓██▀ ▀▄ ▄▀ ▀█▓██▄▄▄▓█▀▀ ▄▀ ▀▄▀██▓▄
▐▓██▌▐▌ ▒▀███▀ ▀▀███▀▒ ▐▌▐██▓▌
▀▓▓█▄▀ ▀ ░▐▓▓▌ R E L E A S E N O T E S ▐▓▓▌░ ▀ ▀▄█▓▓▀
▌███ ▓ ▀▓▓▄▄▀ ▀▄▄▓▓▀ ▓ ███▐
▄▀▓▓▀▀▄ █ █ ▄▀▀▓▓▀▄
▐▌▐▓▌ █ █ ▐▓▌▐▌
▀▄▀█▄░ █ █ ░▄█▀▄▀
▄▀▓ █ █ ▓▀
▐▌ █ █ ▐▌ ▄▓▄
▄▀ █ █ ▀▄ ▀
▀ █ █ ▀
█ Encryption Profiles allow you to quickly █
█ add encryption and decryption profiles. █
█ These files can be used in encryption or █
█ decryption tasks. █
█ █
█ Encryption task allows you to encrypt █
█ files or an entire folder and its █
█ subfolders. █
█ █
█ Decryption task allows you to decrypt █
█ files or an entire folder and its █
█ subfolders. █
█ █
█ Key Generator can generate secret, █
█ public, private, OpenPGP public keys and █
█ OpenPGP private keys. █
█ █
█ Key Store manager allows you to import or █
█ export keys for external use. █
█ █
█ Email Notification for all tasks based on █
█ task exit code. █
█ █
█ Dynamic variables are supported for most █
█ tasks. Most tasks also generate variables █
█ which can be used in other tasks. Create █
█ advanced automation solutions using our █
█ Automize tasks in conjunction with █
█ variables, directory/file monitors and █
█ our task chains. █
█ █
█ Zip files and directories using wildcards █
█ on a schedule. Can append date/time to █
█ filename for archive purposes. █
█ █
█ Copy files and directories using █
█ wildcards on a schedule. Can append █
█ date/time to filename for archive █
█ purposes. █
█ █
█ Chain Task Integrator runs all supported █
█ AutoKrypt tasks in sequence, (with █
█ options depending on Exit codes). █
█ █
█ ----------------------------------------- █
█ -------------------------------------- █
█ █
█ AutoKrypt 7.x new features █
█ █
█ The encryption module is now a wrapper █
█ around GnuPG 1.4.x. █
█ One Step Encrypt&Sign and Decrypt&Verify █
█ is now supported. █
█ The encrypt and decrypt tasks now support █
█ more options like backup and deletion of █
█ source files. █
█ The tasks and schedules are now displayed █
█ in Windows explorer format instead of █
█ simple tables. █
█ Each task / schedule is now in its own █
█ small setting file. Tasks and schedules █
█ can be grouped into folders on the users █
█ file system. This system results in █
█ unlimited number of tasks and schedules █
█ that can be used, with higher █
█ scalability, reliability and low memory █
█ usage. █
█ Task exit code, runtimes etc.. are █
█ displayed on the front panel. █
█ NT service module: Engine stays on during █
█ user logoff. In version 6, engine would █
█ restart during logoff. █
█ Multilingual user interface and help file █
█ for our international users. █
█ Separate Encrypt logs for each █
█ Encrypt/decrypt task. █
█ All communication with engine is now █
█ secured through user interface password █
█ (if set) █
█ New secure command-line module █
█ Directory Loop task █
█ Filename filter now supports support █
█ REGEX █
█ ----------------------------------------- █
█ ----------------------------------------- █
█ ------------------------ █
█ Encryption Tutorial █
█ █
█ █
█ This very brief tutorial is for beginners █
█ who have not used encryption tools █
█ before. █
█ █
█ Introduction █
█ There are two types of encryption █
█ methods: symmetric and asymmetric. █
█ █
█ 1) Symmetric Password Based Encryption - █
█ This is the simplest form of encryption. █
█ It is a symmetrical encryption method. █
█ The same password is used to encrypt and █
█ decrypt the data (or the file). This █
█ method is useful to encrypt sensitive █
█ information for yourself, or for family, █
█ or for a few trusted friends or █
█ coworkers. █
█ █
█ 2) Symmetric Secret Key Based Encryption █
█ This is the simplest form of key based █
█ encryption. It is a symmetrical █
█ encryption method. The same secret key █
█ file is used to encrypt and decrypt the █
█ data (or the file). This is not a very █
█ commonly used technique. █
█ █
█ 3) Assymetric public/private Key Based █
█ Encryption █
█ A public key file is used to encrypt the █
█ data. The corresponding private key file █
█ is used to decrypt the data. Only you █
█ should have access to your private key. █
█ You can distribute your public key to █
█ anyone who needs to send you data. This █
█ is the technique that is most commonly █
█ used in corporations. █
█ █
█ OpenPGP encryption █
█ This is the most popular encryption █
█ method. Many corporations employ OpenPGP █
█ encryption to exchange or store sensitive █
█ data. █
█ █
█ OpenPGP keys █
█ To get started you would need to create █
█ an OpenPGP Key pair. The private key █
█ should be stored carefully. The public █
█ key should be distributed to your █
█ friends, collegues, customers or clients █
█ etc.. █
█ █
█ Encrypting and Decrypting files █
█ Your customers or clients can use your █
█ public key to encrypt a file.. Then email █
█ the encrypted file to you. The encrypted █
█ file can only be decrypted by your █
█ private key. If the email is intercepted, █
█ no one will be able to decrypt the file █
█ since they do not have your private key. █
█ Similarly if you need to send a file to a █
█ client, you should use the clients public █
█ key to encrypt the file. Only your client █
█ has his private key to decrypt the file. █
█ █
█ Signing and Verifying files █
█ To confirm that you have sent the file, █
█ you should use your private key to sign █
█ the file. Your clients can then use your █
█ public key to verify that the file was █
█ sent by you. █
█ █
█ Encrypt & Sign █
█ OpenPGP software normally support one █
█ step encrypt and sign. This allows you to █
█ encrypt a file using the recipients █
█ public key. At the same time, this also █
█ signs the file with your private key. █
█ When the recipient receives this file, he █
█ can use his private key to decrypt the █
█ file, and use your public key to verify █
█ that it was indeed sent by you. █
█ █
█ █
█ █
█ █
█ http://www.hiteksoftware.com/ █
█ █
█ █
█ █
█ █
█ █
▄███▀ ▓ ▄■ ■▄ ▓ ▀███▄
▐▓▓█▌ ▄ ▄ █▌ ▐█ ▄ ▄ ▐█▓▓▌
▀▓▓█▄ ▄▓▄ ▀▓▓██▄ ▄ ▄ ▄██▓▓▀ ▄▓▄ ▄█▓▓▀
░ ▄▄██▓██▄▄▄ ▀ ▐▓▓██▌▐▌ ▐▌▐██▓▓▌ ▀ ▄▄▄██▓██▄▄ ░
▄▓██▀█▀ ▀▄ ▀▀█▓▄▄▄█▓██▀ ▀▄ ▄▀ ▀█▓██▄▄▄▓█▀▀ ▄▀ ▀▄▀██▓▄
▐▓██▌▐▌ ▒▀███▀ ▀▀███▀▒ ▐▌▐██▓▌
▀▓▓█▄▀ ▀ ░▐▓▓▌ i N S T A L L N O T E S ▐▓▓▌░ ▀ ▀▄█▓▓▀
▌███ ▓ ▀▓▓▄▄▀ ▀▄▄▓▓▀ ▓ ███▐
▄▀▓▓▀▀▄ █ █ ▄▀▀▓▓▀▄
▐▌▐▓▌ █ █ ▐▓▌▐▌
▀▄▀█▄░ █ █ ░▄█▀▄▀
▀▓ █ █ ▓▀
▄▓▄ ▐▌ █ █ ▐▌ ▄▓▄
▀ ▄▀ █ █ ▀▄ ▀
▀ █ █ ▀
█ 1) Unpack █
█ 2) Install █
█ 3) Register with: █
█ QSD9P-FGY8K-RTH4U-HVV96-ARN-R0X █
█ 4) Enjoy! █
█ █
█ █
█ █
█ █
█ █
█ █
▄███▀ ▓ ▄■ ■▄ ▓ ▀███▄
▐▓▓█▌ ▄ ▄ █▌ ▐█ ▄ ▄ ▐█▓▓▌
▀▓▓█▄ ▄▓▄ ▀▓▓██▄ ▄ ▄ ▄██▓▓▀ ▄▓▄ ▄█▓▓▀
░ ▄▄██▓██▄▄▄ ▀ ▐▓▓██▌▐▌ ▐▌▐██▓▓▌ ▀ ▄▄▄██▓██▄▄ ░
▄▓██▀█▀ ▀▄ ▀▀█▓▄▄▄█▓██▀ ▀▄ ▄▀ ▀█▓██▄▄▄▓█▀▀ ▄▀ ▀▄▀██▓▄
▐▓██▌▐▌ ▒▀███▀ ▀▀███▀▒ ▐▌▐██▓▌
▀▓▓█▄▀ ▀ ░▐▓▓▌ N E W S & C O N T A C T ▐▓▓▌░ ▀ ▀▄█▓▓▀
▌███ ▓ ▀▓▓▄▄▀ ▀▄▄▓▓▀ ▓ ███▐
▄▀▓▓▀▀▄ █ █ ▄▀▀▓▓▀▄
▐▌▐▓▌ █ █ ▐▓▌▐▌
▀▄▀█▄░ █ █ ░▄█▀▄▀
▀▓ █ █ ▓▀
▄▓▄ ▐▌ █ █ ▐▌ ▄▓▄
▀ ▄▀ █ █ ▀▄ ▀
▀ █ █ ▀
█ After so many years in the scene, both as █
█ individuals and as a group we've █
█ definately become more refined, with █
█ keygens and retail supplies and not to █
█ mention the latest addition, ebooks. We █
█ hope to bring you more of the quality █
█ stuff we've brought so far and we're █
█ sure, unless a meteorite hits earth or █
█ something that we'll be here for a long █
█ time, on top, as you know us :) █
█ Even though we've grown quite big, █
█ there's always room for more people, and █
█ we're looking for talented █
█ crackers/keygeners who can crack/keygen █
█ most protections like arma/aspr/hasp etc █
█ and suppliers. If you are interested, █
█ drop us an email at aggression[at]hush.ai █
█ █
▄ █ █ ▀
▀▄ █ █ ▄▀
▐▌ █ █ ▐▌
▀▄▓ █ █ ▓▄▀
▄▀▄█▀░ █ █ ░▀█▄▀▄
▐▌▐▓▌ █ Contact: aggression[at]hush.ai █ ▐▓▌▐▌
▀▄▓▓▄▄▀ █ █ ▀▄▄▓▓▄▀
▌███ ▄▓ █ █ ▓▄ ███▐
▄▓▓█▀▄▀▀▀▀▓▄▄ ▄ ▄▄▓▀▀▀▀▄▀█▓▓▄
▐▓██▌▐▌ ▀ ▀ ▀▐▓▌▀ ▀ ▀ ▐▌▐██▓▌
▐▌▀▓██▄█ ▀ ASCii DiRECT ▄▓▄▐█▌▄▓▄ FROM STARS ▀ █▄██▓▀▐▌
▀▄░ ▀▀▀▀▓█▄▄▄▄ ▄ ▀ █▀█ ▀ ▄ ▄▄▄▄█▓▀▀▀▀ ░▄▀
▀ ▀▄ ▄▓▓█▀▄▀ ▐▌██▄▀▄░▄▀▄██▐▌ ▀▄▀█▓▓▄ ▄▀ ▀
▄▓▄▐▌▐▓▓█▌▐▌ ▄▓▄ ▀▓▓██▄▀▄ ▀ ▐▌▀▐▌ ▀ ▄▀▄██▓▓▀ ▄▓▄ ▐▌▐█▓▓▌▐▌▄▓▄
▀ ▄▀ ▀███▄█▄ ▀ ▐▓▓██▌▐▌▄▓▄ ▄▀ ▌ ▀▄ ▄▓▄▐▌▐██▓▓▌ ▀ ▄█▄███▀ ▀▄ ▀
▀▀▀█▓▄▄▄█▓██▀ ▀▄ ▀ ▄▓ ▐▌ ▐ ▐▌ ▓▄ ▀ ▄▀ ▀██▓█▄▄▄▓█▀▀
▒▀▀▀▀███▄▄▄ ▄ ▒▀▄█ ▐ █▄▀▒ ▄ ▄▄▄███▀▀▀▀▒
░ ▄ ▀ ▀██▓▓▄ ▀▄░ ▐█ ▐ █▌ ░▄▀ ▄▓▓██▀ ▀ ▄ ░
▐▌ ▄▓▄ ▐██▓█▌ ▐▌ █ ▐ █ ▐▌ ▐█▓██▌ ▄▓▄ ▐▌
▀▄▄ ▀ ▄██▓█▀ ▄▀▓▄ █ ▐ █ ▄▓▀▄ ▀█▓██▄ ▀ ▄▄▀
▀▀▀▀▀▀ ▀▄ █ ▐ █ ▄▀ ▀▀▀▀▀▀
▄▓▄ █ ▐ █ ▄▓▄
▀ ▀ █ ▐ █ ▀ ▀
▐▌ ▐▌
▀▄▀
x