▄
· ██▄
: █▄ ▄▄█▀▀▀████▄ ▄▄▄▄▄▄▄▄▄ ▄ ▄▄▄▄▄
···──│·┐ ███▄ ▄████ ░ █▓▓▓█ █████ ██ ▄██ ░ █████
··--───-·█████·──════--·█▓▓▓█·░·█▒▒▒█··█▓███·░·▐██▄·-─-·▄████·░░·█████·-─··
··─┘ █▓███ ░ █▒▒▒█ ░ █▓▓▓█ █▓▓██ ░ ████ █▓███ ░░ █▓███
│ ▄ █▓▓▓█ ▄ █░░░█ ░ ▀███ █▓▓▓█ ░░ █▓▓█ ░ █▓▓▓█ ░░ █▓▓▓█
│ ██▄█▒▓▓█▄██ █▒▒▒█ ░ ▀█ █▒▓▓█ ░░ █▒▒█ ░ █▒▓▓█ ░░ █▒▓▓█
│ ██▀█▒▒▒█▀██ █▓▓▓█▄▄▄▄▄ █▒▒▒█ ░░ █▓▓█ ░ █▒▒▒█ ░ █▒▒▒█
| ▀ █░░░█ ▀ ████████████▄ █░░░█ ░░ ████ ░ █░░░█ ▄ █░░░█
: █ █ Nitrogen ▀▀██████▓▓▓█ █ █ ░░ ██▀ ░░ █ █ ██ █ █
: █░░░█ [TSRh] ▄ █▒▒▒█ █░░░█ ▄▄▄█▀ ░░ █░░░█ ▀ █░░░█
. █▒▒▒█ ░ ▄█ ██▄ ░ █░░░█ █▒▒▒█ ██▄ ░░ █▒▒▒█ ░ █▒▒▒█
. █▓▓▒█ ░ ▄███ ████▄ ░ █▒▒▒█ █▓▓▓█ ░░ ████ ░ █▓▓▓█ ░░ █▓▓▓█
· █▓▓▓█ ░ █▓▓▓█ █▓▓▓█ ░ █▓▓▓█ █▓▓▓█ ░░ █▓▓▓█ ░ █▓▓▓█ ░░ █▓▓▓█
··─────·███▓█·░·█▒▒▒█··█▒▒▒█·░·█████··█▓███·░░·█▒▒▒█·░·█▓███·░░·█▓███·──··
· ████ ░ █▓▓▓█ █▓▓▓█ ░ ████▀ ███▀ ░ █▓▓▓█ ░ █████ ░ ███▀
· ▀▀█▄▄▄████▀ ▀████▄▄▄█▀▀ █▀ █████ █████ █▀
▀██ ▀███
▀ ▀█
▄┌█───────────────────────────────────────────────────────────┐▄
─ ── : -=NFO=- : ── ─
│░░░░└───────────────────────────────────────────────────────────█┘░░░░│
┌─│──────────┘ └───────────│─┐
│█: :█│
│█ Target: [ Stealth Encryptor 5.0 ] █│
│█ URL: [ http://www.tropsoft.com/ ] █│
│█ █│
│█ Cracker: [ B-$hep ] █│
│█ Crack Type: [ Keyfile ] █│
│█ █│
│█ Release Date: [ 20.12.01 ] █│
│█ Release Name: [ tsrh-stencr50k.zip ] █│
│█ █│
│█: :█│
└─│──────────────────────────────────────────────────────────────────────│─┘
│ █████████▓▓▓▓▓▓▓▓▓▒▒▒▒▒▒▒▒▒▒▒░░░░░░░░▒▒▒▒▒▒▒▒▒▒▒▓▓▓▓▓▓▓▓▓█████████ │
┌ ─ ── ────────────────────────────────────────────────────────────── ── ─ ┐
││ [Target.Description] ││
││ ─ ── ─── ────── ·:
└─--··
In this era of inter networking, work groups and digital highways,
it becomes more and more important to protect personal sensitive
data from malicious or unintended harm.
More and more documents and information are migrated to the
computer in the form of files stored in the hard disk.
More and more computers are linked together, exposing those files
to dangers of being destroyed, examined, or adulterated
intentionally or not by other users (hackers) of the network.
Stealth Encryptor(tm) brings powerful encryption with ease of use.
You enter a secret key, Stealth then performs complicated mathematical
calculations using the key and the contents of the file resulting in a
file the has no apparent resemblance with the original and is completely
unreadable until the reverse calculations are performed by using the exact
same key.
The name of the file is also changed to a random numeric name but within
Stealth the original name shows in the lists.
Special E-Mail encrypt/Decrypt Wizard lets use your favorite e-mail program
with total privacy.
└┐ ┌┘
││ [Register.Notes] ││
└┐ ─ ── ─── ────── ┌┘
Copy file "Gerhts23.dru" in Windows directory.
┌┘ └┐
││ ││
└ ─ ── ────────────────────────────────────────────────────────────── ── ─ ┘
│ █████████▓▓▓▓▓▓▓▓▓▒▒▒▒▒▒▒▒▒▒▒░░░░░░░░░░▒▒▒▒▒▒▒▒▒▒▒▓▓▓▓▓▓▓▓▓█████████ │
└────────────│───────────────────────────────────────────────│─────────────┘
│ [TSRh.Members] │
│ │
┌─│──────────┘ ││ └───────────│─┐
│█: └┐ :█│
│█: [ OxEn ] ............... ││ [ cracker, founder, design ] :█│
│█: [ B-$hep ] ............... ┌┘ [ cracker, founder ] :█│
│█: [ Dr_Net ] ............... ││ [ cracker, coder, design ] :█│
│█: [ Nitrogen ] ............... └┐ [ cracker, coder ] :█│
│█: [ EGOiST ] ............... └┐ [ cracker ] :█│
│█: ││ :█│
└─│──────────────────────────────────────────────────────────────────────│─┘
| · .o0o. CONTACTS .o0o. · |
└─┼·· ··┼─┘
| via HTTP at http://tsrh.cjb.net |
: via e-mail - [email protected] :
· ·