[Разное] Safety-Lab Shadow Security Scanner

Тема в разделе "Софт", создана пользователем kauh, 25 июн 2007.

Статус темы:
Закрыта.
  1. kauh

    kauh Создатель

    Регистр.:
    12 мар 2007
    Сообщения:
    39
    Симпатии:
    75
    [​IMG]

    Safety Lab Shadow Security Scanner is a Proactive Computer Network Security Vulnerability Assessment Scanner with over 5000 audits.
    This is a new generation of hi-tech software (network vulnerability assessment scanner) that performed greatly in the 20th century and remains on the front line in the new millennium! Shadow Security Scanner (network vulnerability assessment scanner) has earned the name of the fastest - and best performing - security scanner in its market sector, outperforming many famous brands. Shadow Security Scanner has been developed to provide a secure, prompt and reliable detection of a vast range of security system holes. After completing the system scan, Shadow Security Scanner analyses the data collected, locates vulnerabilities and possible errors in server tuning options, and suggests possible ways of problem solution. Shadow Security Scanner employs a unique system security analysis algorithm based on a patented "intellectual core". Shadow Security Scanner performs the system scan at such a speed and with such a precision so as to be able to compete with the professional IT security services and hackers, attempting to break into your network.

    Running on its native Windows platform, Shadow Security Scanner also scans servers built practically on any platform, successfully revealing breaches in Unix, Linux, FreeBSD, OpenBSD, Net BSD, Solaris and, of course, Windows 95/98/ME/NT/2000/XP/.NET. Because of its unique architecture, Shadow Security Scanner is the world's only security scanner able to detect faults with CISCO, HP, and other network equipment. It is also the only commercial scanner capable of tracking more than 4,000 audits per system.

    Currently, the following key services supported are: FTP, SSH, Telnet, SMTP, DNS, Finger, HTTP, POP3, IMAP, NetBIOS, NFS, NNTP, SNMP, Squid (Shadow Security Scanner is the only scanner to audit proxy servers - other scanners just verify ports availability), LDAP (Shadow Security Scanner is the only scanner to audit LDAP servers - other scanners limit their actions to ports verification), HTTPS, SSL, TCP/IP, UDP, and Registry services. Because of a fully open (ActiveX-based) architecture any professional with knowledge of VC++, C++ Builder or Delphi may easily expand the capabilities of the Scanner. ActiveX technology also enables the system administrators to integrate Shadow Security Scanner into practically any ActiveX supporting product.

    As network vulnerability assessment scanner provides a direct access to its core, you may use the API (for a detailed information please refer to API documentation) to gain full control to Shadow Security Scanner or to change its properties and functions. Being not a professional programmer, but having some basic knowledge of computer networks and having found a new security breach you may either contact Safety-Lab directly or use the BaseSDK wizard: it will guide you through the whole process of new audit creation. BaseSDK also lets you add more than 95% of new audit types.

    The Rules and Settings Editor will be essential for the users willing only to scan the desired ports and services without wasting time and resources on scanning other services. Flexible tuning lets system administrators manage scanning depth and other options to make benefit of speed-optimized network scanning without any loss in scanning quality.

    The function of simultaneous multiple network scanning (up to 10 hosts per session) has also been added to improve the overall speed.

    Another unique capability of the Scanner concerns the possibility of saving detailed scan session log not only in traditional HTML format (which is available in 99% other scanners) but also in XML, PDF, RTF and CHM (compiled HTML) formats.

    The new interface is both user-friendly and simple to use and it has been optimized to provide even easier access to program's main functions. Managing Shadow Security Scanner options is also made simpler: all the key elements of the program interface have bubble help windows with a concise description of their function.

    The Update Wizard provides the timely updates of program's executive modules with the most up-to-date security information, guaranteeing a solid protection for your system and its high resistance to malicious attacks. Safety-Lab has also accompanied its new product with the direct access to its Internet Security Expert service and a daily-updated Download Zone.

    Homepage: http://www.safety-lab.com/en/products/securityscanner.htm
     
  2. kauh

    kauh Создатель

    Регистр.:
    12 мар 2007
    Сообщения:
    39
    Симпатии:
    75
    Safety-Lab.Shadow.Security.Scanner.v7.110.Bilingual.Cracked-ARN
    Код:
                                       ▐█▄   ▄█▌
                                 ▀▓▄ ▄▄▀▀▀▀▄▀▀▀▀▄▄ ▄▓▀
             ▄                 ▄▄██▓▌ ▄▄▄▀▄ ▄▀▄▄▄ ▐▓██▄▄
      ▄▓▄      ▀     ▄▄██████████▀▀▀ ▀▄ ▀█▄▀▄█▀ ▄▀  ▄███████████▄▄
       ▀ ▄▄█▀▀▓▓░  ▄▀▄▄█████████▀▀ ▄▄   ▓▄▀█▀▄▓   ▄▄ ▀▀██████▓██▄▄▀▄
      ▄▓▓▀▄▓▀▀    ▐▌███▀▀  ▄▄▄▄▄██▐ ░▀  ▐█▌ ▐█▌  ▀░ ▌██▄▄▄▄▄ ▒▀▀███▐▌
     ▓▓▓▌▐▓  ▄▓▄   ▀▓█▌    ▐▓▓█▀██  ▀▀ ▀▄▀▀ ▀▀▄▀ ▀▀  █▄▀██▓▌ ░  ▐██▀ ▄
     ▓▓█▌▐▌   ▀     ░▀▀▄  ▄▓▓█▄█▀▄▓█▄▄██▄▄█▄█▄▄██▄▄██▄▀██▓▓█▄  ▄▀▀     ▀ ▄▓▄
     ▒▓▓█▄▀▄             ▀▓▓██▀▄▀▓██▌▐█▌▐█▌▀▐█▌▐█▌▐███▀▄▀█▓▓█▀            ▀
     ░  ▀▀▀█▓▓██▄▄▄▄▄▄    ▄▓█▌▐▌░▐██  ▀ ▐ ▀ ▀ ▌ ▀  ▓█▌░▐▌▐█▓▄   A G G R E S S i O N
                ▀▀▀▀▀▀  ▄▓▓███▄▀▄ ▀▌    ▌     ▐    ▐▀ ▄▀▄███▓▓▄
                     ▄ ▀▓▓███▀▄▀░       ▌▀▒▓▄▀   ▌    ░▀▄▀██▄▀  ░▓▓███▄▄▄▄
      F E E L  T H E    ▄▓▓█▌▐▌░  ▄ ▄█▄▄  ▀▄▄▄█▓▄▀     ░▐▌▐█▓▓▄    ▄ ▀▀▀▀▀███▄
                       ▐▓████ ▀▒  ▌▀▀ ▀▀▀██▄▀███▌      ▒▀ ████▓▌  ▀▓▀      ▄▓▀██▄
                 ▀ ▄ ▐▌ ▀▓██▌▓▄▄    █████ ▓▓▌▐██▀▄     ▄▄▓▌██▓▀ ▄   ▄ █▓▓▌  ▀▄ ██▓
             ▄ ▄▓▄ ▐▌▓▄▓ ▄██▐█▓▓█   ▐▀ ██▌▐▓▓██▌▐█▌   ▓▓▓▓▌██▄ ▓█▌▀▄▐▌██▓▌   ▐▌▐█▓
           ▄▐▌  ▀ ▄█▓▓█▌▀▀▀▄██▓▓▓▐█▄▐  ███▄▀▀▄██▓▀ ▄█▌▓▓▓██▄▀▀▀▄██▓▄█ ███▌  ▄▀▄▓▓
          ▐██▀▄▄▀██▓▀▀▄▄▄████▓█▓▓ ▀▓▐░░█▐████▄▄▀░  ▀▓ ▓▓█▓████▄▄▄ ▀▓▓▌███▌█▓▀▀▀
     ▀ ▄▓▄ ▀█▓█▌▐█▀▄██████▀▀▐██▓▓  ▒▐░░█▌▀█████▓▓▄  ░ ▓▓██▌▀▀██████▄▀ ███▌▒  ▄▓▄
     ▄▀ ▀    ▒▀█▀▄████▀ ▄▄▄ ▐███▓  ░▐▒▒█▌░  ▀███▓▓▌  ▄▓▓██▌ ▄▄▄ ▀▀███▄███▌░ ▄ ▀ ▀▄
    ▐▌▄▀ ▄▄█▀   ▐▓▓██   ▀▓█▌▐██▀▄▀  ▐▒▒█▌░░  ▐██▓▓▌  ▐▓███▌▐█▓▀    ██████▌    ▀▄▄▐▌
    ██▌▄▓▓▀ ▄   ▓▓██▌    ░▀▀▐█▄█ █▄▀▐▓▓██▄▄▄▄███▓▀  ▄▀▓███▌▀▀░     ▐████▓▌     ▐▄▓█
    ██▐▓▓▌ ▀▓▀ ▐▓███▌ ▄███▄ ▐██▀▄▓█ ▐▓▓█▀█▓███▀▀░  █▌ ████ ▀▓▄      ███▓▓▌    ▄▓▓▓▌
    ▐▓▄▀▓█▄   ▄▓████ █▓▀  ▀█▄▄▄██▀  ▐▓▓▌▐▓▓█▄       ▀▄▓██▓  ▓▓▒     ██▓▓▒▌ ▄▐▓▓▓▓▀
     ▀▓▓▓▀████████▓▄█▀ ▄ ▄▄▄████▄▄▄▀████▄▀▓▓▓█▄▄   ▀▄███▓░ ▐▓█ ▄  ▄▄█████▓▄██▀▓▓
      ▀▓▓▌   ▄▄▄█▀▀█▀▀▄     ▐███░   ▄ ▀██▓▄░▀░▓███▄▄▄▀▀▀ ▄▄▓▓   ▄▀▀█▀ ▄▄▄▄    ▓
        ▒▀▄▀▀ ▄▄▄ █▌▄  ▄▄▄▓▄▐███▒ ▄▄▄▓█ █▒▓█ ▓▄▄▄▀▀▀█████▓▀▀░▄▄▄▄▄ ▐█ ▄▄▄ ▀▀▄ ▒ ▄
        ░▐▌▄▓▄  ▄█▀▀▓█▄    ▀ ▀██▓   ▀░  ▐█▓▓▌ ▄▄▄▓▓█▄▄ ▄▄▄ ▄██▀     ▀█▄  ▄▓▄▐▌░
        ░ ▀▄▀▄▄█▀   ░▀███▄▄    ▀█     ▄▄█▓▓▀▄███▀▀▀▀███▄▀█▌ ▄▄▄▓▒░░   ▀█▄▄▀▄▀ ░
             ▄     ▄    ▀▀████▄▄▄▄▄█████▀▀ ▐█▀        ▀█▓▄▄██▀▀    ▄▓▄   ▄
        ▄▓▄  ▐▌▀▄▄▀▓▀        ▀▀▀▀▀▀▀▀                               ▀▄▄▀▐▌  ▄▓▄
         ▀  ▄▀   ▄▄▄█▓▄  A   G   G   R   E   S   S   i   O   N  ▄▓█▄▄▄   ▀▄  ▀
         ▄▀▄▓▓▀▄▀    ▒                                           ▒    ▀▄▀▓▓▄▀▄
        ▐▌▐▓▓▌▐▌     ░                                           ░     ▐▌▐▓▓▌▐▌
      ▀▄▀▄ ▀██▄▀▄▄▀                    Safety-Lab                   ▀▄▄▀▄██▀ ▄▀▄▀
        ▄▄▄███▓▀▀▓▀▀   Shadow.Security.Scanner.v7.110.Bilingual    ▀▀▓▀▀▓███▄▄▄
      ▄▓▓▀▄▀▀  ▀ █ ▀                                               ▀ █ ▀  ▀▀▄▀▓▓▄
     ▐█▓▌▐▌ ▄▓▄  █                                                   █  ▄▓▄ ▐▌▐▓█▌
    ▐▌▀▓█▄█▄ ▀   █     Cracker ........: ARN                         █   ▀ ▄█▄█▓▀▐▌
     ▀▄  ▀▀▀██▄▄ █     Packer .........: ARN                         █ ▄▄██▀▀▀  ▄▀
         ▌█▄▄    █                                                   █    ▄▄█▐
        ▄▀▓▓▀    █     Protection .....: Other                       █    ▀▓▓▀▄
       ▐▌▐▓▌     █     Crack Type .....: Cracked                     █     ▐▓▌▐▌
        ▀▄▀█▄ ▄  █     Release Date ...: 22.06.2007                  █  ▄ ▄█▀▄▀
            ▀█   █     Release Size ...: 3x 4.89 mb                  █   █▀
         ▄▓▄ ▐▌  █                                                   █  ▐▌ ▄▓▄
          ▀ ▄▀   █     Release Type ...: Application                 █   ▀▄ ▀
          ▀      █     Operating Sys ..: WinAll                      █      ▀
                 █                                                   █
                 █                                                   █
           ▄███▀ ▓           ▄■                         ■▄           ▓ ▀███▄
          ▐▓▓█▌  ▄        ▄ █▌                           ▐█ ▄        ▄  ▐█▓▓▌
           ▀▓▓█▄     ▄▓▄ ▀▓▓██▄ ▄                     ▄ ▄██▓▓▀ ▄▓▄     ▄█▓▓▀
        ░ ▄▄██▓██▄▄▄  ▀   ▐▓▓██▌▐▌                   ▐▌▐██▓▓▌   ▀  ▄▄▄██▓██▄▄ ░
       ▄▓██▀█▀ ▀▄  ▀▀█▓▄▄▄█▓██▀ ▀▄                   ▄▀ ▀█▓██▄▄▄▓█▀▀  ▄▀ ▀▄▀██▓▄
      ▐▓██▌▐▌         ▒▀███▀                              ▀▀███▀▒         ▐▌▐██▓▌
       ▀▓▓█▄▀    ▀    ░▐▓▓▌    R E L E A S E   N O T E S    ▐▓▓▌░    ▀    ▀▄█▓▓▀
         ▌███    ▓      ▀▓▓▄▄▀                           ▀▄▄▓▓▀      ▓    ███▐
        ▄▀▓▓▀▀▄  █                                                   █  ▄▀▀▓▓▀▄
       ▐▌▐▓▌     █                                                   █     ▐▓▌▐▌
        ▀▄▀█▄░   █                                                   █   ░▄█▀▄▀
           ▄▀▓   █                                                   █   ▓▀
             ▐▌  █                                                   █  ▐▌ ▄▓▄
            ▄▀   █                                                   █   ▀▄ ▀
          ▀      █                                                   █      ▀
                 █     Safety Lab Shadow  Security Scanner  is a     █
                 █     Proactive   Computer   Network   Security     █
                 █     Vulnerability  Assessment  Scanner   with     █
                 █     over 5000 audits.                             █
                 █     This  is  a  new  generation  of  hi-tech     █
                 █     software      (network      vulnerability     █
                 █     assessment   scanner)    that   performed     █
                 █     greatly in the  20th century  and remains     █
                 █     on the front line in the  new millennium!     █
                 █     Shadow    Security    Scanner    (network     █
                 █     vulnerability  assessment  scanner)   has     █
                 █     earned the name of the fastest - and best     █
                 █     performing  -  security  scanner  in  its     █
                 █     market sector, outperforming  many famous     █
                 █     brands. Shadow Security Scanner  has been     █
                 █     developed to provide a secure, prompt and     █
                 █     reliable  detection  of  a vast  range of     █
                 █     security  system holes.  After completing     █
                 █     the system scan, Shadow  Security Scanner     █
                 █     analyses  the  data  collected,   locates     █
                 █     vulnerabilities  and  possible  errors in     █
                 █     server  tuning   options,  and   suggests     █
                 █     possible ways of problem solution. Shadow     █
                 █     Security Scanner employs a  unique system     █
                 █     security  analysis  algorithm based  on a     █
                 █     patented   "intellectual  core".   Shadow     █
                 █     Security Scanner performs the system scan     █
                 █     at such a speed and with such a precision     █
                 █     so  as  to  be able  to compete  with the     █
                 █     professional  IT  security  services  and     █
                 █     hackers,  attempting  to break  into your     █
                 █     network.                                      █
                 █                                                   █
                 █     Running on  its native  Windows platform,     █
                 █     Shadow   Security   Scanner  also   scans     █
                 █     servers   built   practically    on   any     █
                 █     platform, successfully revealing breaches     █
                 █     in  Unix,  Linux,  FreeBSD,  OpenBSD, Net     █
                 █     BSD,  Solaris  and,  of  course,  Windows     █
                 █     95/98/ME/NT/2000/XP/.NET. Because  of its     █
                 █     unique   architecture,  Shadow   Security     █
                 █     Scanner  is  the  world's  only  security     █
                 █     scanner able to detect faults with CISCO,     █
                 █     HP,  and other  network equipment.  It is     █
                 █     also the only commercial  scanner capable     █
                 █     of  tracking more  than 4,000  audits per     █
                 █     system.                                       █
                 █                                                   █
                 █     Currently,  the  following  key  services     █
                 █     supported  are:  FTP, SSH,  Telnet, SMTP,     █
                 █     DNS, Finger,  HTTP, POP3,  IMAP, NetBIOS,     █
                 █     NFS, NNTP,  SNMP, Squid  (Shadow Security     █
                 █     Scanner  is  the  only  scanner  to audit     █
                 █     proxy  servers  -  other  scanners   just     █
                 █     verify ports availability),  LDAP (Shadow     █
                 █     Security Scanner is  the only  scanner to     █
                 █     audit LDAP servers - other scanners limit     █
                 █     their  actions  to  ports  verification),     █
                 █     HTTPS,  SSL,  TCP/IP,  UDP,  and Registry     █
                 █     services.   Because  of   a  fully   open     █
                 █     (ActiveX-based)      architecture     any     █
                 █     professional with knowledge of  VC++, C++     █
                 █     Builder or Delphi  may easily  expand the     █
                 █     capabilities  of  the  Scanner.   ActiveX     █
                 █     technology   also   enables  the   system     █
                 █     administrators   to    integrate   Shadow     █
                 █     Security  Scanner  into  practically  any     █
                 █     ActiveX supporting product.                   █
                 █                                                   █
                 █     As   network   vulnerability   assessment     █
                 █     scanner provides a  direct access  to its     █
                 █     core, you may use the API (for a detailed     █
                 █     information    please   refer    to   API     █
                 █     documentation)  to  gain full  control to     █
                 █     Shadow Security Scanner or to  change its     █
                 █     properties  and  functions.  Being  not a     █
                 █     professional programmer, but  having some     █
                 █     basic knowledge of computer  networks and     █
                 █     having  found a  new security  breach you     █
                 █     may either contact Safety-Lab directly or     █
                 █     use the BaseSDK wizard: it will guide you     █
                 █     through  the whole  process of  new audit     █
                 █     creation. BaseSDK also lets you  add more     █
                 █     than 95% of new audit types.                  █
                 █                                                   █
                 █     The  Rules  and  Settings Editor  will be     █
                 █     essential for the  users willing  only to     █
                 █     scan  the  desired  ports  and   services     █
                 █     without  wasting  time  and  resources on     █
                 █     scanning other services.  Flexible tuning     █
                 █     lets    system    administrators   manage     █
                 █     scanning depth and other options  to make     █
                 █     benefit   of    speed-optimized   network     █
                 █     scanning  without  any  loss  in scanning     █
                 █     quality.                                      █
                 █                                                   █
                 █     The  function  of  simultaneous  multiple     █
                 █     network  scanning  (up  to  10  hosts per     █
                 █     session) has also  been added  to improve     █
                 █     the overall speed.                            █
                 █                                                   █
                 █     Another unique capability of  the Scanner     █
                 █     concerns   the   possibility  of   saving     █
                 █     detailed  scan  session  log not  only in     █
                 █     traditional   HTML   format   (which   is     █
                 █     available in 99% other scanners) but also     █
                 █     in XML, PDF, RTF and CHM  (compiled HTML)     █
                 █     formats.                                      █
                 █                                                   █
                 █     The new  interface is  both user-friendly     █
                 █     and  simple  to  use  and  it  has   been     █
                 █     optimized to  provide even  easier access     █
                 █     to  program's  main  functions.  Managing     █
                 █     Shadow Security  Scanner options  is also     █
                 █     made simpler: all the key elements of the     █
                 █     program   interface   have  bubble   help     █
                 █     windows  with  a  concise  description of     █
                 █     their function.                               █
                 █                                                   █
                 █     The  Update  Wizard  provides  the timely     █
                 █     updates  of  program's  executive modules     █
                 █     with   the   most   up-to-date   security     █
                 █     information,    guaranteeing    a   solid     █
                 █     protection for your  system and  its high     █
                 █     resistance    to    malicious    attacks.     █
                 █     Safety-Lab has  also accompanied  its new     █
                 █     product  with  the  direct access  to its     █
                 █     Internet  Security  Expert service  and a     █
                 █     daily-updated Download Zone.                  █
                 █                                                   █
                 █                                                   █
                 █           http://www.safety-lab.com/en/           █
                 █                                                   █
                 █                                                   █
                 █                                                   █
                 █                                                   █
                 █                                                   █
           ▄███▀ ▓           ▄■                         ■▄           ▓ ▀███▄
          ▐▓▓█▌  ▄        ▄ █▌                           ▐█ ▄        ▄  ▐█▓▓▌
           ▀▓▓█▄     ▄▓▄ ▀▓▓██▄ ▄                     ▄ ▄██▓▓▀ ▄▓▄     ▄█▓▓▀
        ░ ▄▄██▓██▄▄▄  ▀   ▐▓▓██▌▐▌                   ▐▌▐██▓▓▌   ▀  ▄▄▄██▓██▄▄ ░
       ▄▓██▀█▀ ▀▄  ▀▀█▓▄▄▄█▓██▀ ▀▄                   ▄▀ ▀█▓██▄▄▄▓█▀▀  ▄▀ ▀▄▀██▓▄
      ▐▓██▌▐▌         ▒▀███▀                              ▀▀███▀▒         ▐▌▐██▓▌
       ▀▓▓█▄▀    ▀    ░▐▓▓▌    i N S T A L L   N O T E S    ▐▓▓▌░    ▀    ▀▄█▓▓▀
         ▌███    ▓      ▀▓▓▄▄▀                           ▀▄▄▓▓▀      ▓    ███▐
        ▄▀▓▓▀▀▄  █                                                   █  ▄▀▀▓▓▀▄
       ▐▌▐▓▌     █                                                   █     ▐▓▌▐▌
        ▀▄▀█▄░   █                                                   █   ░▄█▀▄▀
            ▀▓   █                                                   █   ▓▀
         ▄▓▄ ▐▌  █                                                   █  ▐▌ ▄▓▄
          ▀ ▄▀   █                                                   █   ▀▄ ▀
          ▀      █                                                   █      ▀
                 █     1) Unpack                                     █
                 █     2) Install                                    █
                 █     3) Unzip patch(s) to application              █
                 █     directory and apply.                          █
                 █     4) Enjoy!                                     █
                 █                                                   █
                 █                                                   █
                 █                                                   █
                 █                                                   █
                 █                                                   █
                 █                                                   █
           ▄███▀ ▓           ▄■                         ■▄           ▓ ▀███▄
          ▐▓▓█▌  ▄        ▄ █▌                           ▐█ ▄        ▄  ▐█▓▓▌
           ▀▓▓█▄     ▄▓▄ ▀▓▓██▄ ▄                     ▄ ▄██▓▓▀ ▄▓▄     ▄█▓▓▀
        ░ ▄▄██▓██▄▄▄  ▀   ▐▓▓██▌▐▌                   ▐▌▐██▓▓▌   ▀  ▄▄▄██▓██▄▄ ░
       ▄▓██▀█▀ ▀▄  ▀▀█▓▄▄▄█▓██▀ ▀▄                   ▄▀ ▀█▓██▄▄▄▓█▀▀  ▄▀ ▀▄▀██▓▄
      ▐▓██▌▐▌         ▒▀███▀                              ▀▀███▀▒         ▐▌▐██▓▌
       ▀▓▓█▄▀    ▀    ░▐▓▓▌    N E W S  &  C O N T A C T    ▐▓▓▌░    ▀    ▀▄█▓▓▀
         ▌███    ▓      ▀▓▓▄▄▀                           ▀▄▄▓▓▀      ▓    ███▐
        ▄▀▓▓▀▀▄  █                                                   █  ▄▀▀▓▓▀▄
       ▐▌▐▓▌     █                                                   █     ▐▓▌▐▌
        ▀▄▀█▄░   █                                                   █   ░▄█▀▄▀
            ▀▓   █                                                   █   ▓▀
         ▄▓▄ ▐▌  █                                                   █  ▐▌ ▄▓▄
          ▀ ▄▀   █                                                   █   ▀▄ ▀
          ▀      █                                                   █      ▀
                 █     After so many years in the scene, both as     █
                 █     individuals   and   as   a  group   we've     █
                 █     definately  become  more  refined,   with     █
                 █     keygens  and retail  supplies and  not to     █
                 █     mention the  latest addition,  ebooks. We     █
                 █     hope  to  bring you  more of  the quality     █
                 █     stuff  we've  brought  so  far  and we're     █
                 █     sure,  unless a  meteorite hits  earth or     █
                 █     something that we'll be  here for  a long     █
                 █          time, on top, as you know us :)          █
                 █     Even  though  we've   grown  quite   big,     █
                 █     there's always room for more  people, and     █
                 █     we're      looking      for      talented     █
                 █     crackers/keygeners  who  can crack/keygen     █
                 █     most protections like  arma/aspr/hasp etc     █
                 █     and  suppliers.  If  you  are interested,     █
                 █     drop us an email at aggression[at]hush.ai     █
                 █                                                   █
          ▄      █                                                   █      ▀
            ▀▄   █                                                   █   ▄▀
             ▐▌  █                                                   █  ▐▌
           ▀▄▓   █                                                   █   ▓▄▀
        ▄▀▄█▀░   █                                                   █   ░▀█▄▀▄
       ▐▌▐▓▌     █          Contact: aggression[at]hush.ai           █     ▐▓▌▐▌
        ▀▄▓▓▄▄▀  █                                                   █  ▀▄▄▓▓▄▀
         ▌███ ▄▓ █                                                   █ ▓▄ ███▐
       ▄▓▓█▀▄▀▀▀▀▓▄▄                       ▄                       ▄▄▓▀▀▀▀▄▀█▓▓▄
      ▐▓██▌▐▌  ▀ ▀                       ▀▐▓▌▀                       ▀ ▀  ▐▌▐██▓▌
     ▐▌▀▓██▄█    ▀       ASCii DiRECT  ▄▓▄▐█▌▄▓▄  FROM STARS         ▀    █▄██▓▀▐▌
      ▀▄░ ▀▀▀▀▓█▄▄▄▄                 ▄  ▀ █▀█ ▀  ▄                 ▄▄▄▄█▓▀▀▀▀ ░▄▀
      ▀ ▀▄ ▄▓▓█▀▄▀                  ▐▌██▄▀▄░▄▀▄██▐▌                  ▀▄▀█▓▓▄ ▄▀ ▀
     ▄▓▄▐▌▐▓▓█▌▐▌   ▄▓▄ ▀▓▓██▄▀▄     ▀   ▐▌▀▐▌   ▀     ▄▀▄██▓▓▀ ▄▓▄   ▐▌▐█▓▓▌▐▌▄▓▄
      ▀ ▄▀ ▀███▄█▄   ▀   ▐▓▓██▌▐▌▄▓▄    ▄▀ ▌ ▀▄    ▄▓▄▐▌▐██▓▓▌   ▀   ▄█▄███▀ ▀▄ ▀
          <artik>▀▀▀█▓▄▄▄█▓██▀ ▀▄ ▀  ▄▓ ▐▌ ▐ ▐▌ ▓▄  ▀ ▄▀ ▀██▓█▄▄▄▓█▀▀<gDFS>
                     ▒▀▀▀▀███▄▄▄   ▄  ▒▀▄█ ▐ █▄▀▒  ▄   ▄▄▄███▀▀▀▀▒
                     ░ ▄ ▀   ▀██▓▓▄ ▀▄░ ▐█ ▐ █▌ ░▄▀ ▄▓▓██▀   ▀ ▄ ░
                      ▐▌  ▄▓▄ ▐██▓█▌ ▐▌  █ ▐ █  ▐▌ ▐█▓██▌ ▄▓▄  ▐▌
                       ▀▄▄ ▀ ▄██▓█▀ ▄▀▓▄ █ ▐ █ ▄▓▀▄ ▀█▓██▄ ▀ ▄▄▀
                          ▀▀▀▀▀▀     ▀▄  █ ▐ █  ▄▀     ▀▀▀▀▀▀
                                    ▄▓▄  █ ▐ █  ▄▓▄
                                     ▀ ▀ █ ▐ █ ▀ ▀
                                         ▐▌ ▐▌
                                          ▀▄▀
    x
    
    http://rapidshare.com/files/39221378/Safety-Lab.Shadow.Security.Scanner.v7.110.Bilingual.Cracked-ARN.rar
    из ссылки убрать пробелы
     
  3. Panadol

    Panadol Продавец здоровья

    Регистр.:
    20 апр 2007
    Сообщения:
    303
    Симпатии:
    180
    Сылка умерла...
    Перезалей, плиз..
     
  4. alyjack

    alyjack Прохожие

Статус темы:
Закрыта.