************************************************
************************************************

Unfortunately, this site has restricted functionality as this browser does not support the HTML button formaction attribute.

Unfortunately, this site has restricted functionality as this browser has HTML web storage turned off.

1 of 5 files the registration terrorists
  • Text / NFO file or scene release
[+] Configuration Copy text
┌───────────────────────────────────────────────────────────┐ │ GEdit 2.OO Key v1.01 (c) 1993 The Registration Terrorists │ ╔╧═══════════════════════════════════════════════════════════╧╗ ║ CODING/CRACK : The Illusive Shadow ║ ║ DOCUMENTATION : The Illusive Shadow ║ ║ BETA TESTER : Wolfgang ║ ╚═════════════════════════════════════════════════════════════╝ A quote from [TRT]: " Support REGOWARE !!! Register programs within 24 hours! " A message from [TRT]: ───────────────────── Greetings to all of you who downloaded this product in support of our anti-REGO/CRIPPLEWARE campaign! Just think, if they wanna cripple their product unless Registered, how are we supposed to "TRY" the program to it's full potential before registering it? Are they trying to "con" us into Paying for a product which we don't know how well it works at full potential? Better still, how can we tell if there are NO MAJOR BUGS in the "disabled" parts? In accordance to our general interest in Freedom of Information (esp. for some of you Crack/Rego compilers), we have decided NOT to encrypt any of our registration programs. It will be distributed as REGOWARE (hehe.. take a joke!). All portions of the program is copyrighted(yeah..sure..). All "derivitives"/extraction/dissassembly of this program IS permitted under the condition that credits MUST be given to The Author AND/OR [The Registration Terrorists] (or [TRT] for short) ... btw, we're proud to be 100% OZ run and owned! :) - The Illusive Shadow [Full Rego Terrorist!] Revision notes: ─────────────── v1.00 - This version is currently being beta-tested. Please do not hesitate to report any "conflicts". v1.01 - Revamped copyright msg. Improved Camouflage TECHNICAL NOTES: ──────────────── GEdit 2.OO uses a complex scheme which encodes ALL items given to the author and is encoded in the file. Any attempt to "lend" the KEY will result in the "Registeree"'s name/address/node number/baudrate/age/etc. being able to trace from! Uses a 2D array with numerous shifts.. NOT EASY!! Next release will include asking for YOUR age,node address,real address maximum baud rate,etc. This will make the Key more "legit".. :) SPECIAL GREETS: ─────────────── Special thanx to Wolfgang Gullich for such a great job on Beta-testing. If anyone needs a Quality Control Personnel, I'll HIGHLY recommend him..hehe.. =============================== END OF DOCUMENT ===============================
80x56 Font
80