▄ ▄▄▄
▄▀▀ ▀ ▀▀▄
▐▌ ▐█
_ ▀█▄▄▄▄ ___ __________ _ ▄ __________ _ ▄ ______ _ ▄▄█▀ _
▀▀▀▀█████▄▄▄▄ ░ ▄▄▄▄▄█▄ ██▄▄▄ ▄▄█▌ ▄ ▄███▓░
▄▄████▄▄▄ ▀▀█████▓▄ ▄▄▄███▀▀▀▀██████▐██████▄ ▄██████▄██████▄ ░▓████▌
▐██████ ▀████▄█████▄ ▐█████▀████████▄███████▓▐████████▄ ▐████▓░
▐██████ ▐███▌█████▓░ ▄▄▄██████▌██████ ▀█▀ ██████▌██████ ▀██▄▐████▌
▐██████ ▄████░▓██████▀▀▀▀██████▌▓█████ ██████▌▓█████ ▀██████▓░
▄▄▄▐█████▓ ▄▄ ▄▓████▌▐██████ ▄▄▄ █████▓▐█████▓ ▄▄▄ ▒█████▐██████ ▄▄▄▐██████▌▄▄▄
██████▌▓▓▐█████▓░▐██████ ▓▓▓░▓█████▐██████▌▓▓▓ ▐████▓▐█████▒ ▓▓▓ █████▓░
██████▌▒ ▓██████▌░▓████▓░▒▒▒ ▐████▌░▓█████▌▒▒▒ ▐████▌ ██████▌ ▒▒ █████▌
░▓█████▌░ ▐██████▒ ░▓████▌░░░ ▐███▒ ░▓████▌░░░ ▐███▓░ ▒█████▌ ░░ ▓████▌
▀▀▀█▀▀████▄███████▌ ░▀███▌ ░ ▄██▀▀ ░▀███▌░ ▄██▀▀░ ▀▀▀█▀▀▀▀▀░ ▐████▓░
_ ________ ▀▀▀▀▓███▓░ _ ▀▀█▄ ▀ _sRT!CRo_ ▀▀█▄ ▀ ___________ _ ▄▄██▓▀▀░ _
░ ░▀██▌ ▀ ▀ ▄█▀ ░
░ ▐█ ░ ░ ▐▌ ░
░ ▀▄ ░ ░ ▀ ░
░ ░
░ ░ ░
░ PRESENTS
░ ░ ░
░
Iris The Network Traffic Analyzer v3.70.1 RETAIL *Incl.Keymaker*
▄▄▄▄▄▄▄▄ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ▄▄▄▄▄▄▄▄▄
╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┐
┌─┤▌ RELEASE INFO ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ [ Program .......... Iris The Network Traffic Analyzer v3.70.1 RETAIL ] █
█ [ Type ..................................... Network Traffic Analyzer ] █
█ [ Operating System ......................... Windows 95/98/NT/2000/XP ] █
█ [ Protection ................................................ Sheriff ] █
█ [ By .......................................... eEye Digital Security ] █
█ [ Homepage ...................................... http://www.eeye.com ] █
█ █
█ [ Cracked by ........................................ Ivanopulo ] █
█ [ Release type .................................. Incl.Keymaker ] █
█ [ Release date ................................... Dec 07, 2001 ] █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
│╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤
┌┴┤▌ DESCRIPTION ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ Iris is an advanced data and network traffic analyzer, a "sniffer", █
█ that collects, stores, organizes and reports all data traffic on your █
█ network. Iris is revolutionary because it delivers █
█ never-before-available functionalities that make network administration █
█ easier than ever. Iris is the first network traffic analyzer on the █
█ market, ingeniously designed to help IT personnel proactively monitor █
█ their organization's network. Unlike other network sniffers, Iris has █
█ advanced, integrated technology that allows it to reconstruct network █
█ traffic, all with a push of a button. █
█ █
█ Using Iris, the network administrator can set up automated screens to █
█ monitor the Web-browsing patterns of their organization's personnel to █
█ determine if company security or intellectual property is being █
█ compromised. The confidence Iris instills in an organization's network █
█ security will ultimately lead to decreased network down-time and █
█ increased IT focus. █
█ █
█ * Key Features * █
█ █
█ Packet Reconstruction █
█ - Iris will reconstruct Web-browsing sessions on an organization's █
█ local network, even simulating cookies for entry into password █
█ protected Web sites, thus capturing a clear and concise image of the █
█ integrity of an organization's network. █
█ █
█ Packet Manipulation/Forging █
█ - Iris allows users to create custom packets or spoof packets and send █
█ them across the Internet or their networks. This functionality can be █
█ used to test firewalls and ensure they are blocking and filtering █
█ packets correctly. You can also use Iris to test the load bearing █
█ capabilities of a system or server. █
█ █
█ Screen Traffic by Key Criteria █
█ - With Iris you can monitor network traffic by setting numerous █
█ screening criteria. You can monitor and record network traffic based █
█ on a specific MAC address, IP address, keyword, port, protocol layer █
█ or hardware layer. █
█ █
█ Log Foreign Connection Attempts █
█ - Iris will capture the evidence of network intrusions, reconstructing █
█ every keystroke and movement an attacker has made, creating a █
█ complete log of any attempt to bring harm to your network. █
█ █
█ Decode Common Protocols █
█ - Unlike other network sniffers, Iris has advanced, integrated █
█ technology that allows it to reconstruct network traffic in a format █
█ that is simple to use and understand. █
█ █
█ Produce Executive Reports █
█ - With the release of Iris 2.0, eEye made analyzing your network even █
█ easier through the use of Iris' new graphing functionality. These █
█ graphs can be used to help administrators understand the happenings █
█ of their networks. They can also be used to generate reports █
█ detailing network activity for an organization's upper-level █
█ management. █
█ █
█ Monitor Web-Based Email and Instant Messenger Services █
█ - Iris allows you to monitor non-encrypted Web-based email traffic and █
█ instant messages. This feature can greatly complement normal █
█ company-based email control, audit and monitoring procedures. █
█ █
█ New in v3.6 █
█ █
█ - Added SNMP decoding █
█ - Added the ability to save Capture log reports as CSV (Comma Delimited █
█ Format) files. █
█ - Added the ability to save Packets in CSV format. █
█ - Introduced notification when new versions of Iris are available. █
█ - Fixed - Issue with changing adapters. █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
│╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤
┌┴┤▌ INSTRUCTIONS ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ Start the program, copy the reference code to the clipboard when asked █
█ for license key. Start the keymaker, enter the reference code and █
█ generate your license key. Go back to Iris and license it. █
█ █
█ Enjoy =) █
█ █
█ NOTE: The keymaker only works for the RETAIL version of the program. It █
█ is not supposed to (and it WILL NOT) work for the demo version █
█ available for public download from www.eeye.com. The demo is crippled █
█ and can't be registered. █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
│╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤
┌┴┤▌ VERIFICATION ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ Due to the every day increasing amount of lamers who fake DAMN releases █
█ ALL DAMN releases starting from July 1, 2000 are digitally signed. █
█ █
█ Download DAMN Release Signature Verifier from http://www.damn.to if you █
█ want to be sure that release you got was really made by DAMN. █
█ █
█ Don't use any stuff claiming to be made by DAMN if it's released after █
█ July 1, 2000 and doesn't pass verification. Using it can be dangerous. █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
│╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤
┌┴┤▌ GREETINGS ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ Our greetings fly to all groups and crackers who work hard to keep the █
█ Scene alive. █
█ █
█ Personal greetings to: Dimedrol, Duelist, egis, Jovi, Quantico, Recca, █
█ russ97, tE!. █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
│╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤
┌┴┤▌ CONTACT ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ Visit our www site at .......................... [ http://www.damn.to ] █
█ Backup page .................................... [ http://damn.da.ru ] █
█ █
█ Email address for contacts ..................... [ [email protected] ] █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
└─ ────── ─ ──══── ─ ────── ┬ ────── ─ ────── ┬ ────── ─ ──══── ─ ────── ─┘
│▌ (c) 2001 DAMN ▐│
└ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┘
Release ID: 3C0D3922E6F513CB
Zip name: dm_i3701.zip
----------------------- DAMN RELEASE SIGNATURE START ------------------------
damn_iris3701.exe 1 NbguZBHdlugleX/vfCf8Xs5IbFc fKwrgDQ5VdWRbVGIWTCNa/tka8g
damn.nfo 0 5REPpgvtgm1+sizAjJ4rdY6Z1TM dI49TXzwgtXkSwEpxF1Kc0q5pvs
------------------------ DAMN RELEASE SIGNATURE END -------------------------