▄ ▄▄▄
▄▀▀ ▀ ▀▀▄
▐▌ ▐█
_ ▀█▄▄▄▄ ___ __________ _ ▄ __________ _ ▄ ______ _ ▄▄█▀ _
▀▀▀▀█████▄▄▄▄ ░ ▄▄▄▄▄█▄ ██▄▄▄ ▄▄█▌ ▄ ▄███▓░
▄▄████▄▄▄ ▀▀█████▓▄ ▄▄▄███▀▀▀▀██████▐██████▄ ▄██████▄██████▄ ░▓████▌
▐██████ ▀████▄█████▄ ▐█████▀████████▄███████▓▐████████▄ ▐████▓░
▐██████ ▐███▌█████▓░ ▄▄▄██████▌██████ ▀█▀ ██████▌██████ ▀██▄▐████▌
▐██████ ▄████░▓██████▀▀▀▀██████▌▓█████ ██████▌▓█████ ▀██████▓░
▄▄▄▐█████▓ ▄▄ ▄▓████▌▐██████ ▄▄▄ █████▓▐█████▓ ▄▄▄ ▒█████▐██████ ▄▄▄▐██████▌▄▄▄
██████▌▓▓▐█████▓░▐██████ ▓▓▓░▓█████▐██████▌▓▓▓ ▐████▓▐█████▒ ▓▓▓ █████▓░
██████▌▒ ▓██████▌░▓████▓░▒▒▒ ▐████▌░▓█████▌▒▒▒ ▐████▌ ██████▌ ▒▒ █████▌
░▓█████▌░ ▐██████▒ ░▓████▌░░░ ▐███▒ ░▓████▌░░░ ▐███▓░ ▒█████▌ ░░ ▓████▌
▀▀▀█▀▀████▄███████▌ ░▀███▌ ░ ▄██▀▀ ░▀███▌░ ▄██▀▀░ ▀▀▀█▀▀▀▀▀░ ▐████▓░
_ ________ ▀▀▀▀▓███▓░ _ ▀▀█▄ ▀ _sRT!CRo_ ▀▀█▄ ▀ ___________ _ ▄▄██▓▀▀░ _
░ ░▀██▌ ▀ ▀ ▄█▀ ░
░ ▐█ ░ ░ ▐▌ ░
░ ▀▄ ░ ░ ▀ ░
░ ░
░ ░ ░
░ PRESENTS
░ ░ ░
░
░ Intact Intelligence v3.0 *Incl.Keymaker*
▄▄▄▄▄▄▄▄ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ▄▄▄▄▄▄▄▄▄
╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┐
┌─┤▌ RELEASE INFO ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ [ Program ................................ Intact Intelligence v3.0 ] █
█ [ Type ................... System Integrity Assessment in Real Time ] █
█ [ OS ...................................................... WinNT2k ] █
█ [ Protection ............................. Tough scheme using SHA-1 ] █
█ [ By ....................................... Pedestal Software, LLC ] █
█ [ Homepage ........................ http://www.pedestalsoftware.com ] █
█ █
█ [ Cracked by ................................ Ivanopulo ] █
█ [ Release type .......................... Incl.Keymaker ] █
█ [ Release date ........................... Sep 09, 2000 ] █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
│╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤
┌┴┤▌ DESCRIPTION ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ Intact Intelligence provides an intelligent engine for determining █
█ the system components to check in three steps. It also includes █
█ detection of changes in the registry, users, groups, user rights, █
█ account and audit policies. It comes with an easy-to-use GUI █
█ interface. █
█ █
█ Intelligence means that Intact will examine the behavior of your █
█ system during a learning period of several days to determine which █
█ changes are normal and which ones are not. After this learning █
█ period, Intact will look for (and report or act on) abnormal and █
█ unusual changes. In Windows versions, change detection occurs in real █
█ time so you immediately know when the change occured and who made the █
█ change. █
█ █
█ Detect changes to system objects: █
█ - File attributes and file contents █
█ - Registry keys and values █
█ - Dates, times, size, attributes, etc. █
█ - User and group permissions █
█ - Auditing parameters █
█ - SAM and LSA █
█ █
█ Detect configuration and hardware changes █
█ - Add, move or remove hardware components █
█ - Reconfigure addresses and ports █
█ █
█ Self-identification and automatic configuration uses our innovative █
█ behavior monitoring technology to make installation and configuration █
█ simple while maintaining maximum coverage. Here's how it works: █
█ 1. You tell Intact what you want to monitor--typically everything. █
█ 2. Intact will monitor the behavior of your system over a period of █
█ time. █
█ 3. After this identification period, Intact will define what are █
█ "normal changes" and create a configuration file that monitors only █
█ those items which do not change. █
█ █
█ It's easy to configure behavioral monitoring for various degrees of █
█ sensitivity. █
█ █
█ In addition to standard file and directory change detection, Intact █
█ has these additional features: █
█ █
█ - Change detection of user accounts: █
█ - Add, move, or remove users. █
█ - Detect changes to user account characteristics, such as home █
█ directory path, script path, profile path. █
█ - Group memberships. █
█ - Logon parameters such as password expired, bad password count, █
█ RAS flags, RAS callback phone number and logon-to workstations. █
█ █
█ - Change detection of groups: █
█ - Granular change detection of local and global group membership. █
█ - Characteristics such as name, comment, etc. █
█ █
█ - Update mode. █
█ █
█ - Wildcard support for files (useful for DLL's, EXE's, and config █
█ files). █
█ █
█ - Detect Changes to System policies: █
█ - Audit policy. █
█ - Account policies. █
█ - User rights. █
█ █
█ - Additional GUI Support: █
█ - Easy-to use configuration editor for building and tuning █
█ configurations. █
█ - View large output files in a tabular form. █
█ - Search, sort and extract information. █
█ - Update detection database by clicking on items █
█ █
█ - Includes the Intact Integrity Protection Driver to help guard █
█ against rootkit installation and trojan hiding. █
█ █
█ - Signature verification of the detection database, configuration █
█ file and executables. █
█ █
█ The Benefits of Self-identification and Auto-configuration █
█ █
█ Administrators no longer have to guess what is critical to watch in █
█ the system. Intact Intelligence allows you to watch everything in the █
█ system which does not normally change. █
█ This not only saves time by eliminating the trial-and-error █
█ configuration process typical of other similar systems, but it also █
█ ensures that coverage is as complete as possible. The Windows NT █
█ registry is particularly difficult to configure manually because █
█ programs write registry values all over the place and the data █
█ location is not often documented. █
█ █
█ An example may help to illustrate how useful this is. A web page █
█ contains content which is updated nightly, but the permissions on the █
█ file never change (or should never change). During █
█ self-identification, Intact Intelligence will record this and produce █
█ a configuration file entry for that web page which watches the file █
█ permissions but not the file content. █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
│╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤
┌┴┤▌ INSTRUCTIONS ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ Run the keymaker and register the program. Serial generated must be █
█ entered during program installation. █
█ █
█ Enjoy =) █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
│╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤
┌┴┤▌ VERIFICATION ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ Due to the every day increasing amount of lamers who fake DAMN █
█ releases ALL DAMN releases starting from July 1, 2000 are digitally █
█ signed. █
█ █
█ Download DAMN Release Signature Verificator from http://www.damn.to █
█ (about 100K only) if you want to be sure that release you got was █
█ really made by DAMN. █
█ █
█ Don't use any stuff claiming to be made by DAMN if it's released █
█ after July 1, 2000 and doesn't pass verification. Using it can be █
█ dangerous. █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
│╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤
┌┴┤▌ GREETINGS ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ Our greetings fly to all groups and crackers who work hard to keep █
█ the Scene alive. █
█ █
█ Personal greetings to: egis, Dimedrol, Duelist, Recca, russ97, tHE █
█ EGOiSTE. █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
│╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤
┌┴┤▌ CONTACT ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ Visit our www site at [ http://www.damn.to ] █
█ Backup page [ http://damn.da.ru ] █
█ █
█ Email address for contacts [ [email protected] ] █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
└─ ────── ─ ──══── ─ ────── ┬ ────── ─ ────── ┬ ────── ─ ──══── ─ ────── ─┘
│▌ (c) 2000 DAMN ▐│
└ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┘
----------------------- DAMN RELEASE SIGNATURE START ------------------------
damn_intactint30.exe 1 viu0H9Y74J/bZvca4F6CE3ycrSY 0+KOULX67o901KIZuQrDuod2x/g
damn.nfo 0 5zUZLjaDqgmRKzDd4Lc+E7qP1FI MPiA6uCdb0GbAwZmMHtPRJuq1ag
------------------------ DAMN RELEASE SIGNATURE END -------------------------