[Myth]
End of Twilight (Levels Unlocker)
Text file description:
_ _ UUUU UUU UUUU UUUU UUU UUU UUUU UUUU UUUUU UUUUU UUUUU UUUUUU UUUUU UU UUUUU _UUUUUUU UUU UUUUU UUUU U UUUUU UUUUUU UUUUU UUUUUUUU UUUU UUUUU_UUUUU UUUUU UUUUU UUUU UUU UUUUU UUUU _UUUUUUUUU UUUUU_UUUU UUUU UUUU UUUUU_ _UUUUU UUU UUUU UUU UUU UUUU UU UUU UU U UUUU UUUUU _ UU U UUUUU UU U FerrexU _ MYTH _UU _ _ _ _ _ _ MYTH IS PROUD TO PRESENT : UUU End Of Twilight *UNLOCKER* SUPPLIED BY : MYTH TEAM RELEASE SIZE : 1 * small TRAINED BY : MYTH TEAM RELEASE DATE : 03/2002 U _ _ _ _ U U [ RELEASE NOTES ] _ UU Simply copy the file "saves.cfg.obj" included in the archive to your installdirdbProfile directory, overwriting the existing file. Choose the game "Myth" to play, and you will have access to all levels in the game. _ _ _ _ _ _ _ _ [ NEWS + APPLICATION iNFO ] _ UUUUU You think you can contribute to the scene too? You have one or more talents in: - supplying NEW unreleased games (maybe you work at a game/util magazine, courier delivery firm, newspaper, game press/marketing company, distributor, publisher, duplicator, tv/radio show, shop, warehouse, store etc.) You do not need a fast internet connection for the above! - supplying unreleased NEW store/shop games & have a fast UPLOAD 300k+ internet connection and time to spare on weekday mornings. Of course we shall reimburse you for the costs of the games you buy. - you are a coder with lots of experience in Debugging/ASM & C/C++. You also can code your OWN tools to automatically remove commercial iso protections like the latest versions of any of the following: SafeDisc or Securom or TAGES or VOB or Laserlok or Copylok. Using tools created by others does NOT count and we check! You will also need advanced knowledge of PE File Formats. - you are a Unix guru with good Ansi-C software developing knowledge and understanding how to prevent network security vulnerabilities. That means you must be able to code to ansi-c guru level. And you must also have a good coder perspective of hostbase and network based intrusion detection systems. You should be able to code tools to generically prevent stack and heap buffer overflows on unix in Ansi-C. And Be able to code tools to look after a group of systems and code sniffing avoidance tools. And you can configure a system in ways to prevent packet sniffers and "man in the middle" attacks. No window's lamers ;p - supplying linux/BSD eggdrop/bnc shells to the group (for free). They should have 2mbit MINIMUM link. We shall require flexible control over the shell. Root access on the box with dynamic ident such as midentd for bncs, but just normal shell accounts are fine for eggdrop shells. All boxes must have legitimate IP's, they should not be running NAT or a firewalling system that will constantly interfere with the link. Ideal shells will have multiple vhosts, reasonably good uptime (20+ days), and a low system load. Public shells such as JEAH.NET or similar with 25+ load averages and 3 day uptimes are not acceptable. The more reverse ips you have the better. We are only interested in LEGIT, NON-HACKED/CARDED shells. These shells will be used only for the purposes listed above and will NOT be used for any kind of 'dump site' or for spreading any kind of releases. We are NOT interested in modem, cable, or DSL shells. The shells should be up 24/7 with minimum downtime for upgrades, etc and should not be overloaded with processes. - If you know the difference between reindexing and unpacking large files. Or if you can identify ANY major file formats by looking at the hex byte code of the header. Or if you can tell and show the difference between MPQ & HAPI. And can code your own tools to rip apart the above technologies (to show you fully understand them) then apply at once. - making trainers for newly released games (menu driven, must work in Win9x and Win2K/WinXP). If you can meet one or more of those requirements and want to join the finest active group in the scene today, e-mail us. Use the contact information given below. And always remember: we do this just for FUN. We are against any profit or commercialisation of piracy. In fact, we BUY all our own games with our own money, as we love game originals. And if you like this game, BUY it. We did! _ _ _ _ _ _ _ _ [ RELEASE COMMENT ] _ UUUUU " Enjoy! " _ _ _ _ [ CONTACT ] _ _ _ _ UUU _ _ _ READ BELOW FIRST OR YOU WILL BE IGNORED! U MYTH DOES NOT PASSWORD FILES, OTHERS DO THAT! MYTH DOES NOT MAIL/SEND/PASSWORD MISSING FILES! _ MYTH DOES NOT PUBLISH FILES ON WEB SITES, NEVER! _ MYTH DOES NOT USE IRC TO PUBLISH FILES, NEVER! _ MYTH DOES NOT DO TECHNICAL SUPPORT, NEVER EVER! _ MYTH DOES NOT HAVE, WANT OR NEED ANY WEB SITES! _ MYTH DOES NOT GIVE OUT ANY LINKS OR FILENAMES! _ _ WWW : NEVER (WE DON'T USE WEB & WE DON'T WANT ONE _ MAIL : GODS@MYTHELITE.COM (READ NOTES ABOVE) _ _ U U _ NFO LAYOUT + HEADER BY FERREX OF SUPERIOR ART CREATIONS _ _ _ _ _ _ [ UPDATED ] _ [ ON 14/DEC/2001 ]_ _ _ _ Support the software companies. If you play this game, BUY it!
File information
Trainers are memory resident programs that alter the behaviour of a game.
Your anti-virus software and web browser may detect them as malware (viruses, worms, trojans, bots etc.).
This is almost always a false alarm.
File name: END.OF.TWILIGHT.LEVUNLOCKER.MYTH.ZIP
File size: 3.84 KB
Mime type: text/plain; charset=iso-8859-1 compressed-encoding=application/zip; charset=binary
March 4, 2002 - 9:00pm