░
░ ░ ░
░
░ ░ ░ ░ ░ ░
░ ░ ░ ░
░ ▒ ░ ░ ░
░ ░ ░ ░ ░▓ ░ ░ ░ ░ ░ ░
▒ ░ ▒ █ ░ ░ ░ ░ ▒ ░ ░ ░
▓ ░ ░▓ ░█░ ▒ ░ ░ ░ ▒ ░▓ ▒ ▒░ ░▒
█░ ▒█ ░ ▒█▒ ░ ▓░ ▒░ ▒ ▒▓ ▒█ ▓ ▀▓▒░▒▓
█▒ ░ ▒▓█▓ ░ ▓▓█▓▒ ░ ▓█▒ ░ ▓▒ ▓░ ▓█▓▒░▒▓█ █▓ ▀████
█▓ ░ ▒ ▄▄█▀▀▀▀▓ ░▒▓███▓▒░░ ░▒▓███▓ █▓▒░ ▓█▓░▓▓███▀▀▀█▓█ ███▄▄▄ ▀
██▒░ ▓ ▀ ▄▄▄██▌█▓▒░░░▒▓████████████████▓▒░ ░░▒▓███████▀▀▀▀ ▄▄▄█ ▐█▌ █░▒░░███
████▀ █ ░ ███▓▒░█▌█████▀▀▀▀▀▀ ▄▄▄▄▄ ▀ ▄ ▀▀▀▀▀▀█████ ▄ ▀▀▀ ▀████▒▓█▌▐█ ▐█░░░░░▒█
▀ ▄▄▄██ ▐█▒░░▒█ ▄▄▄▄▄██ ████▓▓▓███▄ ██████▄▄▄▄▄▄ ▀▀▀█▄▄▄▄▄░▄▄░█▌ █ ▐▓░▒░░▒█▌
███▓▒░█ ░ ▐█░░░░█▐██▓▒▒░▓█▌▒░░▒░▒░▒▒▓█▌▐▓▒░░░▒░░▒▒▓███░▒░░▒▓███▌░▓█ ▌ █▒░░▒░▓█
█▓░░░░█ ░ █░░▒░█░▒░░░░░▒█▌░██████▒▒▒▓█ ░░░▒░░░░░░▒▓█░░░░▒░░░▓█▌░░█ ▐█░▒░░▓█▌▄
██░▒░░█ ░░ █▒░░░█░░███▀▀▀▀▌░█▌▄▄ ▀█░▒▒█▌████░▒░███▓▓█░░▓████▒▓█░▒░█▄ █▓░░░▒██ ▄
▀█░░░▒█▌░▒ █░▒▒░█▒░▌ █▌░▒█▌▐ █▓░▒▓▌▀ █░░░█▌▀▀▀█░▒█▌ ▀▀▀█░░░▓█ █▒░▒▒██ ▄▌
▌█░▒░░█▌▐░ █▒░░▒█░░▌ ▐█░░▓█ █▓▒▒█▌░ ▐█░▒░█▌ ▐░█░░█ ░░ ░ ▄█▒▒███▒░▓██ ▄█
▌█▒░░▒█▌▐▒ █▓▒▒▒█░▒█ ▄▌ █▒░▒█ ▐█▒▒▓█ ▐▓▒░▒█▌ ▐░▓░▒█ ██▒▒▓▒░▒██ ▄█ ▄
▌██▒░▒▓█ ▓ █▒▒▒▓█░░███▌ █░▒▒█▌▄▄█▒▒██▀ ░ ▐▓░▒▒█ █░▒░▒██▄▄█▌ ██▒▒░▓██ ▄█ ▄█
▌ █▒▒░▒█ ▓ █▒▓▒▒█▒░▒▒▓█ ▐█▓▒▓██▓▒▒█▄ ░ ▐▒▒▒▓█ █▓░▒▒▒▒▒▒█▌ ░ ▄█▒▒▓██ ▄█░ ▓█
█▌█▓░▒▒█▌▐ █▓▒▒▓█▓▒█▀▀▀ ▀▒▓▒▒▒▒▒▒▓▓██▄ █▒▓▒▒█ █▒▒▒▓██▓▓█ ░ ▄█▓▒▓▒█▄ █▒ █▓
▌▀█▒▒░▓█ █▒▓▓▓▌▒▒█ ░ ▄▌▓▒▒▓███▒▒▒▓▒█▌ █▓▒▒▓▌ █▓▒▓█▌▀▀▀█ █▓▒▓▒▓▓█▄ █░ ▓█
█ █▓▒▓▒█▌ █▓▓▒▓▌▓▒█▌▄▄███▌▐▓▓▒█ ▀█▒▓▒▓█▌ █▒▓▓▒▌ ▐█▒▒▒█ ░░ █▐▒▒▓███▒▓█▄ █ ▀█
█ ▀█▓▒▓▓█▌█▓▓▓▓▌▓▓▓██▓▓▓▓█▐▓▓▓█ █▓▓▓██ ▐█▓▒▓▓▌ ▐▓▓▒▓█▄▄▄▄▄███░▓▒██ █▓▒▓█▄ █ █
▀█ █▓▓▓▒▓██▓▒▓▓▌▓▒▓▓▓▓▒▓▓█ ▓▓▓█ ▐█▓▒▓█ ▐▓▓▓▓█▌ ▐▓▒▓▓▓▓▓▒▓▓▓▓█▒▒▓█ ▐█▓▓▒█▄ ▄▐
░ █ ▀█▓▒▓▓▓█▓▓▓█▌▓▓▓▒▓▓▓▓▓█▌▓▓▓█ █▓▓▓▓██ █▓▓▒▓█ █▓▓▓▒▓▓▓▓▓▓▓▓█░▓█▌ █▓▒▓▓█▄ ▄
▒ ▀█ █▓▓▓▒▓▓▓▓▓█░▓▒▓▓▓▓▓▓▓▓▌▐▓▓█ ▐█▓▓▓▓███▓▓▓▓█ █▓▓▓▓▓▓▓▓▓▓▓█▌▒▓█ ░ █▓▓▓▒▓█▄
▓▓ █ ▀█▓▓▓▓▓████▐▓▓█████████▐▓▓█ ██▓▓▓▓▓▓▓▓▓▓█ █▓██████▓▓▓▓█▌▓█▌ ░░ ▐▓▒▓▓▓▓█▄
█▓▄ ▄ ██▓███▀▀ ▐██▀ ▄▄▄███ ██▓▓██▀█████▄ █▀▀ ▄▄ ▀▀▀▀██░▓█ ▒▒ ▐▓▓▓▓███▀
▓█▓ ▀ ██▀ ▄▄▓▓█ █ ▄▓▓█▓▓▐▀▀▀▀ ▄▄▓▄ ▀█▀▀ ▄▄▄▄ ▀▀ ▌▄▓▓ ▄▄███▄▄▒▒█▌ ▓▓▓▓▐███▀▀ ▄▄
█▓██ ▄ ▀ ▄▓█████ ▌▄██████▄▄█████████▄▄▄█████████ ▌███▄▄▄▄ ▀▀▀███ ▐████▐▀ ▄▄██▓█
████▄▄▄▄██▀░█░█░ ▌░█░█░█░█░█░█░█░█░█░█░█░█░█░█░█▌ █░█░█░█░█░▄ █ ▄ ▄ ▀██▄▄▄▄███
▐█▓███▓██▀ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ▀███▓█▓██
█████▀▀ ▄▓▀ ▄█▓▒░▒░▒░▒░▒░▒░▒▓█▀▀ PRESENTS ▀▀█▓▒░▒░▒░▒░▒░▒░▒▓█▄ ▀▓▄ ▀▀████▌
▄▄▄▄▄███▄▄▄▄██▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀██▄▄▄▄███▄▄▄▄▄
████▀███▀█▀█▀ MonitorIT v8.0.14 ▀█▀█▀███▀████
██▀ █ (c) Breakout Software █ ▀██
▐█ ▄█████▄ ▄█████▄ █▐
▌ █▓█▓▒░▓ CRACKER.....[ L0wrider REL.DATE.[ 10/09/2006 ▓░▒▓█▓█ ▌
█▓█▓▒░▓ SUPPLiER....[ Team VERTEX REL.TYPE.[ Keygen ▓░▒▓█▓█
▌ █▓█▓▒░▓ TESTER......[ Team VERTEX OS.......[ WinAll ▓░▒▓█▓█ ▌
█▓█▓▒░▓ PROTECTiON..[ Custom/Base64 DISKS....[ 01x5.00MB ▓░▒▓█▓█
█▓█▓▒░▓ ▓░▒▓█▓█
▀▀█▀▀ URL: http://www.breakoutsoft.com ▀▀█▀▀
▀█▀ ▀█▀
▀█▀ ▄▄▄▄▄▄▄▄ ▄▄▄▄▄▄▄▄ ▀█▀
▀█▀ ▄▄▄▄█▄▄▄▄ ▀▓▄ ▄▓▀ ▄▄▄▄█▄▄▄▄ ▀█▀
▀█▀▄█▓▀▀▀▀▀▀▓██▄ ▀▓▄▄▄▄▄▄▄▄ ▄▄▄▄▄▄▄▄▓▀ ▄██▓▀▀▀▀▀▀▓█▄▀█▀
▀█▀▓▀ ▄▓▓█▓▄ ▀▓██▄▄ ▀▓▄ ▀█▄ ▄█▀ ▄▓▀ ▄▄██▓▀ ▄▓█▓▓▄ ▀▓▀█▀
▀█▓ ▄▓█▀▀▀▀▀▀ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ ▀▀▀▀▀▀█▓▄ ▓█▀
▀▓ ▄▓█▓ ██▀█ ██▀▀ ██ ██▀▀ ██▀█ ██▀▀ ██▀▀ ██ █▄ █ ██▀▀ ██▀█ ▓█▓▄ ▓▀
█ ▄▓█▓▒ ██▄▀ ██▀ ██ ██▀ ██▀█ ▀▀▀█ ██▀ ▄▄ ████ ██▀ ██ █ ▒▓█▓▄ █
▄▀ ▄▓█▓▒░ ▓█ █ ▓███ ▓███ ▓███ ▓█ █ ▓███ ▓███ ▓█ ▓█ █ ▓█ ▓███ ░▒▓█▓▄ ▀▄
▀ ▄▓██▀ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ▀██▓▄ ▀
▀ ▀▀▀▀▀ ▄▓▀ ▄█▓▒░▒░▒░▒░▒░▒░▒▓█▀▀ ▀▀█▓▒░▒░▒░▒░▒░▒░▒▓█▄ ▀▓▄ ▀▀▀▀▀ ▀
▄▄▄▄▄███▄▄▄▄██▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀██▄▄▄▄███▄▄▄▄▄
████▀█▀█▀█▀█▀ ▀█▀█▀█▀█▀████
▓┌ ─┐▓
MonitorIT from Breakout Software is a cost-effective, easy to use
solution that monitors the availability, health and performance of
your servers, workstations and network devices on IP-based networks.
It provides extensive, proactive monitoring, analysis, alert
notification and automatic corrective action capabilities, dynamic
graphing and reporting that enable you to keep your network of
servers, workstations and network infrastructure at its peak, helping
you to avoid costly downtime situations.
MonitorIT helps you manage
all of the servers and network devices in your organization by
monitoring their availability, response time, health and performance
through the use of nine monitoring components:
1) ServerWatch
monitors servers running any operating system to check for failures,
response times and IP services availability, such as HTTP (Web
Service), SMTP & POP3 (Email Service), DNS, TELNET, FTP, SNMP, and
even SQL Server and ORACLE database checks. Also supports the secure
(SSL) protocol checks for HTTP/S, FTP/S, SMTP/S, POP3/S, and
TELNET/S.
2) SNMPWatch monitors all SNMP compliant servers and
network devices for SNMP Traps.
3) CounterWatch for SNMP and Windows
monitors and analyzes performance and operation using all the
available and very detailed performance counters; includes real-time
and historic, dynamic graphs that can replay previous monitored data,
and a variety of reports to analyze monitored data. You can even
easily create your own custom monitoring and report templates to
simplify what counters you want to regularly monitor and on which
specific servers/devices. In addition, you can define watches on any
counter and be alerted when the counter value exceeds your specified
threshold. SNMP counters are derived from the server/device MIBs you
provide. Windows counters are available for monitoring the processor,
memory, disk drives, network, printers, Windows OS, Microsoft
applications such as SQL Server, Exchange, IIS, and 3rd party
applications such as Oracle, and are automatically derived by the
MonitorIT Agent service.
4) SYSLOGWatch monitors SYSLOG messages,
received by the MonitorIT Server on the standard SYSLOG UDP port. You
can be alerted when critical SYSLOG messages are received. Use
SYSLOGWatch to centralize your SYSLOG collection, management and
reporting.
For Windows-based servers and workstations, using the
MonitorIT Agent service that is centrally managed, and remotely
installed using MonitorIT's Agent "push" technology:
5) EventLogWatch
monitors Application, System and Security Event Logs for your Windows
NT, 2000, XP & 2003 servers and workstations; and for Windows 2000
Server and later, the new Event Logs for DNS, Directory Service, and
File Replication Service are monitored. Be alerted when any event you
are monitoring for is written to the Event Logs. Includes a very
flexible interface for defining the Event Log monitoring and for
reporting on captured events; also includes an Event Log Viewer to
view the Event Logs from one or more servers in one view; and an
automatic Archiving feature that will monitor the Event Logs for
several different conditions and automatically and automatically
create an archive of the naticve EVY files, Centrally manage Event
Logs from all your servers and workstations.
6) WinServicesWatch
monitors the Windows services on your Windows NT, 2000, XP & 2003
servers and workstations. Be alerted when critical services you
specify are detected as stopped. Have MonitorIT automatically restart
the service.
7) FileWatch monitors any file on you Windows NT, 2000,
XP & 2003 servers and workstations. Watch for specified files to be
created, or optionally watch for specified files to exceed a maximum
size, or any change in size from current size, or any change in
last-modified date/time from the current last-modified date-time, or
even watch for the file to contain a specified substring. Be alerted
when your FileWatch conditions are met. Perfect for watching those
applications that create and use their own logs, and perfect for
watching for key files to be "hacked" or modified without
authorization.
8) ProcessWatch monitors the Windows processes on your
Windows NT, 2000, XP & 2003 servers and workstations. Set Watches on
select processes, including optional CPU and Memory utilization
Thresholds, plus there is a option to terminate processes that should
not be running. You can be alerted if a Process that should be
running is not running, optionally start it; and if it is running,
optionally be alerted if the Process CPU and/or Memory utilization
(Physical, Paged Pooled, NonPagePool, or Virtual) exceed the
specified thresholds.
9) CustomWatch runs any Windows program,
command, batch, and/or script executable on a periodic schedule at
select Windows NT, 2000, XP & 2003 servers and workstations.
Optionally, generate an alert notification if the executable's Exit
Code fails a comparison with your specified exit code..
Sophisticated
alert features notify you of potential problems, enabling you to
automatically execute corrective actions when alert conditions have
been met. Monitoring data can be viewed in real-time or historical
data reports can be generated. All monitoring data is stored in a
database that enables you to perform comprehensive analysis and
obtain recommendations for improving performance.
Schedule MonitorIT
Reports for automatic, periodic report generation with optional Email
of the Report output, or a link to the output, to one or more
recipients; Complete flexibility on what is reported, for what
time-frame and for what servers/devices, and when the periodic
reports run. Exclude Time Period feature to exclude time-of-day and
day-of-week periods from Report analysis to more accurately reflect
your Service-Level Agreements.
Plus, you can access MonitorIT
anytime, from anywhere, using your Internet Explorer (IE) Web browser
to view real-time monitoring data, generate reports or perform
administration tasks. MonitorITs seamless integration with IE removes
the tough learning curve often associated with the use of server and
desktop management tools. If you can use Internet Explorer, you can
use MonitorIT! And with its built-in HTTP server, no other software
is needed. Just install MonitorIT on any Windows based server or
workstation, and you can use IE for remote console access to the
MonitorIT Server.
░ ▄▄▄▄▄▄▄▄ ▄▄▄▄▄▄▄▄ ░
▒ ▄▄▄▄█▄▄▄▄ ▀▓▄ ▄▓▀ ▄▄▄▄█▄▄▄▄ │▒
▓└ ▄█▓▀▀▀▀▀▀▓██▄ ▀▓▄▄▄▄▄▄▄▄ ▄▄▄▄▄▄▄▄▓▀ ▄██▓▀▀▀▀▀▀▓█▄ ─ ─┘▓
▀▀▀▀▀▀██▓▀ ▄▓▓█▓▄ ▀▓██▄▄ ▀▓▄ ▀█▄ ▄█▀ ▄▓▀ ▄▄██▓▀ ▄▓█▓▓▄ ▀▓██▀▀▀▀▀▀
▄▓ ▄▓██▀▀▀▀▀ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ ▀▀▀▀▀██▓▄ ▓▄
▓ ▄▓█▓▒ ██ █▄ █ ██▀▀ ▀██▀ ██▀█ ██ ██ ██ █▄ █ ██▀▀ ██▀█ ▒▓█▓▄ ▓
█ ▄▓█▓▒▒ ▄▄ ████ ▀▀▀█ ██ ██▀█ ██ ██ ▄▄ ████ ██▀ ██ █ ▒▒▓█▓▄ █
▄ ▄▄▀ ▄▓█▓▒▒░ ▓█ ▓█ █ ▓███ ▓█ ▓█ █ ▓███ ▓███ ▓█ ▓█ █ ▓█ ▓███ ░▒▒▓█▓▄ ▀▄▄ ▄
▄▓██▀ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ▀██▓▄
▀ ▀▀▀▀▀ ▄▓▀ ▄█▓▒░▒░▒░▒░▒░▒░▒▓█▀▀ ▀▀█▓▒░▒░▒░▒░▒░▒░▒▓█▄ ▀▓▄ ▀▀▀▀▀ ▀
▄▄▄▄▄███▄▄▄▄██▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀██▄▄▄▄███▄▄▄▄▄
████▀█▀█▀█▀█▀ ▀█▀█▀█▀█▀████
▓┌ ┐▓
1) Use the keygen to generate a working serial
2) Have Fun!
NOTE: Keygen generates a max of 9999 Agent Licenses :)
░ ▄▄▄▄▄▄▄▄ ▄▄▄▄▄▄▄▄ ░
▒ ▄▄▄▄█▄▄▄▄ ▀▓▄ ▄▓▀ ▄▄▄▄█▄▄▄▄ │▒
▓└ ▄█▓▀▀▀▀▀▀▓██▄ ▀▓▄▄▄▄▄▄▄▄ ▄▄▄▄▄▄▄▄▓▀ ▄██▓▀▀▀▀▀▀▓█▄ ─ ─┘▓
▀▀▀▀▀▀██▓▀ ▄▓▓█▓▄ ▀▓██▄▄ ▀▓▄ ▀█▄ ▄█▀ ▄▓▀ ▄▄██▓▀ ▄▓█▓▓▄ ▀▓██▀▀▀▀▀▀
▄▓ ▄▓███████▄ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ ▄███████▓▄ ▓▄
▓ ▄▓██▓█▓█▓█▓▓▒ ██▀▀ ██▀█ █▄ █ ▀██▀ ██▀█ ██▀▀ ▀██▀ ▒▓▓█▓█▓█▓██▓▄ ▓
█ ▄▓██▓▒▓▒▓▒▒░▒░ ██ ██ █ ████ ██ ██▀█ ██ ██ ░░▒░▒▒▓▒▓▒▓██▓▄ █
▄ ▄▄▀ ▄▓█▓▒▒▓▒▓▒▒░▒░░ ▓███ ▓███ ▓█ █ ▓█ ▓█ █ ▓███ ▓█ ░░░▒░▒▒▓▒▓▒▒▓█▓▄ ▀▄▄ ▄
▄▓██▀ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ▀██▓▄
▀ ▀▀▀▀▀ ▄▓▀ ▄█▓▒░▒░▒░▒░▒░▒░▒▓█▀▀ ▀▀█▓▒░▒░▒░▒░▒░▒░▒▓█▄ ▀▓▄ ▀▀▀▀▀ ▀
▄▄▄▄▄███▄▄▄▄██▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀██▄▄▄▄███▄▄▄▄▄
████▀█▀█▀█▀█▀ ▀█▀█▀█▀█▀████
▓┌ ┐▓
Team VERTEX is currently looking for:
* Keygenners:
You are capable reversing serial protection schemes and making
a keygen in your preferred programming language.
You have knowledge about different crypto algorithms like
MD5/SHA1/RSA/TEA,...
* Unpackers:
You are capable unpacking the latest software packers (Armadillo,
Asprotect,Safecast,...) by either manually or by your own tools.
* Affilation sites:
Secure glftpd sites located in Europe or Asia
with atleast 6 months uptime.
* Unix shells:
10mbit+ unix shells located in Europe for private group usage.
CONTACT: [email protected]
░ ▄▄▄▄▄▄▄▄ ▄▄▄▄▄▄▄▄ ░
▒ ▄▄▄▄█▄▄▄▄ ▀▓▄ ▄▓▀ ▄▄▄▄█▄▄▄▄ │▒
▓└ ▄█▓▀▀▀▀▀▀▓██▄ ▀▓▄▄▄▄▄▄▄▄ ▄▄▄▄▄▄▄▄▓▀ ▄██▓▀▀▀▀▀▀▓█▄ ─ ─┘▓
▀▀▀▀▀▀██▓▀ ▄▓▓█▓▄ ▀▓██▄▄ ▀▓▄ ▀█▄ ▄█▀ ▄▓▀ ▄▄██▓▀ ▄▓█▓▓▄ ▀▓██▀▀▀▀▀▀
▄▓ ▄▓██████▀ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ ▀██████▓▄ ▓▄
▓ ▄▓██▓█▓█▓ ██▀▀ ██▀█ ██▀▀ ██▀▀ ▀██▀ ██ █▄ █ ██▀▀ ██▀▀ ▓█▓█▓██▓▄ ▓
█ ▄▓██▓▒▓▒▓▒ ██ █ ██▄▀ ██▀ ██▀ ██ ▄▄ ████ ██ █ ▀▀▀█ ▒▓▒▓▒▓██▓▄ █
▄ ▄▄▀ ▄▓█▓▒▒▓▒▓▒▒ ▓███ ▓█ █ ▓███ ▓███ ▓█ ▓█ ▓█ █ ▓███ ▓███ ▒▒▓▒▓▒▒▓█▓▄ ▀▄▄ ▄
▄▓██▀ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ▀██▓▄
▀ ▀▀▀▀▀ ▄▓▀ ▄█▓▒░▒░▒░▒░▒░▒░▒▓█▀▀ ▀▀█▓▒░▒░▒░▒░▒░▒░▒▓█▄ ▀▓▄ ▀▀▀▀▀ ▀
▄▄▄▄▄███▄▄▄▄██▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀██▄▄▄▄███▄▄▄▄▄
████▀█▀█▀█▀█▀ ▀█▀█▀█▀█▀████
▓ ▓
▀█▄ ARN - CORE - CRO - EMBRACE - HERETIC - TMG - ZWT ▄█▀
▄ ▀▀▀▄ ▄▀▀▀ ▄
█ ▀▀▄ ▀█▄█▄█▄ ▄█▄█▄█▀ ▄▀▀ █
███▄ █ ▀█▀▀▀▀██▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄██▀▀▀▀█▀ █ ▄███
█▓▓█▄ ▓ ▀▓▄ ▀█▓▒░▒░▒░▒░▒░▒░▒▓████████████████▓▒░▒░▒░▒░▒░▒░▒▓█▀ ▄▓▀ ▓ ▄█▓▓█
▓▓▒▓█ ▀▓ ▀██▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄██▀ ▓▀ █▓▒▓▓
▓ ▒▓█ ▀▓▄ ▄▓██▀▀ ▄▓▀ ▄█▀ ▄▄▄▄ ▀█▄ ▀▓▄ ▀▀██▓▄ ▄▓▀ █▓▒ ▓
▒ ░▓██ ▀█▓▄▄▄▄▄▄▓███▄▄▄▄▓▀▀▀▀▀▀▀▀ ▄██████▄ ▀▀▀▀▀▀▀▀▓▄▄▄▄███▓▄▄▄▄▄▄▓█▀ ██▓░ ▒
░ ▓███▄ ▀▀▀▀▀▀▀▀▀ ▄▄▄▄▄▄▄█████████▓█▓▒▓▓█████████▄▄▄▄▄▄▄ ▀▀▀▀▀▀▀▀▀ ▄███▓ ░
░ ░█▓▓███████████████▓▒░▒▓█▓▒▓██▓▒░█▒ ░▒▓██▓▒▓█▓▒░▒▓███████████████▓▓█░ ░
█▒░▓██▓▒░ ░░▒▓███▓▒ ▓▒ ▒█▒ █░ ░ ▒█▒ ▒▓ ▒▓██▓▒░ ▓░▒▓██▓░▒█
░ ▓░ ▒█▓▒ ░ █▒ ░ ▒ ▒█░ ▓ ░█▒ ▒ ░ ▒▓░ ayl▒ ▓█▒ ░▓ ░
▒ ░▓ ░ ▓░ ░ ░█ ▒ ░ █░ ░ ░▒ cro░ ▓░ ▒
░ ▒ ░ ▒ █ ░ █ ░ ▒ ░
░ ░ ▓ ▓ ░
░ ▒ ▒ ░ ░
░ ░ ░
░ ░
░ ░