GEdit 2.OO Key v1.01 by The Registration Terrorists
1 of 5 files
the registration terrorists
- Browsers may flag this download as unwanted or malicious. If unsure, scan it with VirusTotal.
-
Last modified Aug 14, 1993 4:41:00 PM
MD5 checksum 1af7d5c031f83e512a8262824d744f60
Mime type
Download GE200KEY.DOC
Size 2 kB
1993 August 14
- Text / NFO file or scene release
┌───────────────────────────────────────────────────────────┐
│ GEdit 2.OO Key v1.01 (c) 1993 The Registration Terrorists │
╔╧═══════════════════════════════════════════════════════════╧╗
║ CODING/CRACK : The Illusive Shadow ║
║ DOCUMENTATION : The Illusive Shadow ║
║ BETA TESTER : Wolfgang ║
╚═════════════════════════════════════════════════════════════╝
A quote from [TRT]: " Support REGOWARE !!! Register programs within 24 hours! "
A message from [TRT]:
─────────────────────
Greetings to all of you who downloaded this product in support of our
anti-REGO/CRIPPLEWARE campaign! Just think, if they wanna cripple their product
unless Registered, how are we supposed to "TRY" the program to it's full
potential before registering it? Are they trying to "con" us into Paying for a
product which we don't know how well it works at full potential? Better still,
how can we tell if there are NO MAJOR BUGS in the "disabled" parts?
In accordance to our general interest in Freedom of Information (esp.
for some of you Crack/Rego compilers), we have decided NOT to encrypt any of
our registration programs. It will be distributed as REGOWARE (hehe.. take a
joke!). All portions of the program is copyrighted(yeah..sure..). All
"derivitives"/extraction/dissassembly of this program IS permitted under the
condition that credits MUST be given to The Author AND/OR [The Registration
Terrorists] (or [TRT] for short)
... btw, we're proud to be 100% OZ run and owned! :)
- The Illusive Shadow
[Full Rego Terrorist!]
Revision notes:
───────────────
v1.00 - This version is currently being beta-tested. Please do not hesitate to
report any "conflicts".
v1.01 - Revamped copyright msg. Improved Camouflage
TECHNICAL NOTES:
────────────────
GEdit 2.OO uses a complex scheme which encodes ALL items given to the
author and is encoded in the file. Any attempt to "lend" the KEY will result
in the "Registeree"'s name/address/node number/baudrate/age/etc. being able to
trace from! Uses a 2D array with numerous shifts.. NOT EASY!!
Next release will include asking for YOUR age,node address,real address
maximum baud rate,etc. This will make the Key more "legit".. :)
SPECIAL GREETS:
───────────────
Special thanx to Wolfgang Gullich for such a great job on Beta-testing.
If anyone needs a Quality Control Personnel, I'll HIGHLY recommend him..hehe..
=============================== END OF DOCUMENT ===============================