Showing posts with label Windows 7 and PC App. Show all posts
Showing posts with label Windows 7 and PC App. Show all posts
Hide ALL IP 2015 Crack:
Hide ALL IP 2015 is best Ip hiding tool in world and used by millions of users around the globe. This tool hide your IP, and helps to play online games, run applications and keep you hidden from hackers, to anonymously use internet.

Hide ALL IP 2015 Crack Full Download
Hide ALL IP 2015 Crack also helps to save you from theives, and protect PC from hackers attacks. You can do all this task in just few mouse clicks by just downloading and installing the program. You will be able to use IP address by linking internet connection to your IP. Your online identity will also be protected by changing your IP address and it will be diverted to our private server’s IP. Now your all online activity will be moved to our servers. These servers always send encrypted data to lnline and keep you protected every time without any problem.

Features of Hide ALL IP Cracked:

  • It helps to Change your original IP Address
  • It also helps to Change your original Location
  • send Encrypt data to online.
  • You can easily use online tv channels.
  • Remote DNS lookups
  • Unique Support HTTP servers
  • All Games and apps websites are supported.
  • Unique support UDP applications
  • Safety browse technology
  • Unique have portable version
  • Reduce your game ping.
  • Unique support hide win8/8.1 metro apps ip

What’s New:  
  • Add full Windows 10 support, include Microsoft Edge browser.
How to Crack ?
  1. Download Hide ALL IP 2015 With Universal Crack fromlinks given below.
  2. Use Winrar to Unpack the package.
  3. Now install the setup.exe in default directory.
  4. Finish its setup with default options.
  5. If you have already installed any remove previous version of Hide ALL IP 2015 then you must completely uninstall software and its registry items.
  6. Copy its crack content (loader amd original setup.) to installation directory
  7. Run loader as admin.
  8. You are all Done.
  9. Ejoy using Hide ALL IP 2015 Full Version.

Hide ALL IP 2015 Crack Full Download:

Kaspersky Antivirus 2016 Activation Code:
Kaspersky Antivirus 2016 (KAV 2016 Activated) is a smart and fantastic anti-virus that helps your PC against all types of malwares, adwares, trojans, and other online threats.

Kaspersky Antivirus 2016 Activation Code + Crack
Kaspersky Antivirus 2016 Activation Code product helps to change any problems caused during severe problem that are dorectly linked to viruses in PC. This Kaspersky Antivirus 2016 Activation Code provides non stop security with complete functions through very well security plans after noticing the viruses prosent in your PC or coming while using internet. Kaspersky Antivirus 2016 also helps to give a complete feedback system when using this software and gives you a safe environment for using online work and best safety measures. It helps against Trojans, viruses, worms, backdoors, and different threats causing problem directly or indirectly on system. This latest Activation Code of Kaspersky Antivirus 2016 is very improved and helps to activate Kaspersky Antivirus 2016 easily in just a matter of few seconds. This tool has new and improved technology features which were not accessible in earlier series.
Kaspersky Antivirus 2016 Activation Code installation is very easy and quick. Its procedure of checking for viruses is here as :First it take the scan of PC and checks for each part of the PC and detect the viruses present in PC within a few seconds. Then it easily removes all of the dangerous malwares in few seconds.
Kaspersky Antivirus 2016 Key Features:
  • Kaspersky Antivirus 2016 Activation Code has complete Bundle offer for internet users to provide free security with no compromise on security concerns.
  • There will be no need for further anti-malwares to use for your PC.
  • All security options are present in one place.
  • installation is very easy and quick.
  • Kaspersky Antivirus 2016 Activation code has best tech around the globe.
  • trial versions provide full security.
  • Kaspersky Antivirus 2016 Activation Code can be used for personal as well as corporate use.
How to activate this Activation Code of Kaspersky Antivirus 2016?
  • Download Kaspersky Antivirus 2016 With Activation Code and Install its trial version.
  • Install the program in defaul directory.
  • Open the program and remove the cover.
  • Go to crack folder, open “KRT_5.0.0.99_beta.exe” and use KAV enabled.
  • You have activated Kaspersky Antivirus 2016 Full Version.

Kaspersky Antivirus 2016 Activation Code + Crack Free Download:

Free Download Freemake Video Converter Key 4.1.7 Crack
There a scores of video formats and people find it difficult to run different videos on the system due to the problem of format configuration. Freemake Video Converter Key 4.1.7 Full Crack gives the freedom of video conversion into more than 250 different formats. The good thing is that this software makes it possible for the users to convert videos to make them compatible with different smart devices such as iPhones, Apple TV, Game Consoles, Smart phones and Tablets etc.

Freemake Video Converter Key + Crack Free Download

Features of Freemake Video Converter Key:

Freemake Video Converter Key 4.7.1 is a powerful video conversion and editing tool. This program empowers the users to create Blu-Ray discs in order to run the video on the latest devices. In this way the users can carry the disc to different places and enjoy the video whenever and wherever they want.
Freemake Video Converter Crack 4.1.7 also allows the users to download top quality videos from different online platforms including You Tube, Facebook and Dailymotion. This software is powerful enough to download videos from more than fifty websites. The downloading process is extremely simple because the users just need to copy video link and paste in the download field. The downloading speed is fast and the users can convert the video in any format according their requirement.
CUDA and DXVA:
Freemake Video Converter Serial key comes with a unique feature which allows the users to benefit from both CUDA and DXVA technologies. This is the first software which contains both of these features so it provides a cutting edge advantage over other video conversion tools. The combination of CUDA and DXVA enables the software to download and convert videos at comparatively faster rate. Freemake Video Converter With Crack also requires less processing from the CPU so the system’s performance remains efficient.
Screenshot:
Freemake Video Converter Key + Crack Free Download image
DVAD and DVD-DL (Up to 40 Hours):
Different video converters come with DVD burn feature but they restrict the users through time limitation and mostly they allow just two hours for DVD burn. With Freemake Video Converter 4 Crack the users have the luxury to Burn DVD up to 40 Horus. It also supports Burn DVD-Dl up to 20 Hours.
Operating System:
Freemake Video Converter License key is compatible with Windows XP, Windows 7, Windows Vista and Windows 8. The system must have minimum 256MB RAM. The minimum processor capacity required to run the application is 500MHz. Freemake Video Converter Key 4.1.7 requires only 1MB space on the Hard Drive.
Freemake Video Converter 4.1.7 Crack + Key Full Free Download:


Autodesk AutoCAD 2016 Crack: Features of the Best 3D Designing Tool Ever
Autodesk AutoCAD 2016 Crack is an effective software which allows the users to get a better understanding of AutoCAD 2015. This application also enables the users to utilize Maya 2015 as well as 3ds Max 2015. It is very simple to operate or use Autodesk AutoCAD 2016 because the GUI is highly user friendly and there is no complexity at all. Moreover, the instructions are very clear and presented in a simple way so users can understand things at all levels. The tutorials do not include text only. They are equipped with proper screen shots or pictures to make enable the users understand each and everything quite clearly. Video illustrations are also provided with Autodesk AutoCAD 2016 in order to guide the users in a comprehensive and practical way.
Screenshots:

Operating System Requirements
Autodesk AutoCAD 2016 Crack
Autodesk AutoCAD 2016 runs equally well and efficiently on different Windows operating systems. You can install and run this program on Windows XP, Windows 7, Windows 8 and Windows 10. In order to run the program on the system you need the following specification.
  1. 4GB RAM
  2. 4 GB Space on the Hard Disk
  • Intel processor or Multi-Core processor
  1. Graphic Card of at least 512 MB
The program is basically for the purpose of better understanding of designing and planning. This program has attracted thousands of users from all over the world. It is proving to be the best program designed for working on AutoCAD 2015 as well as Maya 2015. The main appreciation is for Autodesk AutoCAD 2016 comes from the users working in the field of designing and architecture.
Fast, Compact and Effective
In order to evaluate the performance of any software we use a criteria based on three factors which include speed, size of the program and applicability. Autodesk AutoCAD 2016 fulfills all of these three conditions. Its processing speed is faster as compared to the competitive programs in the market. This program is applicable for different designing purposes and allows the designers to perform multiple functions without any problem.
How to Activate?
  1. Download and Install the Product
  2. Use as Serial 666-69696969, 667-98989898, 400-45454545 066-66666666
  3. Use Product Key while installation: 001H1
  4. Use Keygen To Activate product
  5. Finish the installation & restart Autodesk Product
  6. YOu are all set. Enjoy :)
Note: Don’t Forget To Run Keygen As Admin

Autodesk AutoCAD 2016 Crack Full Version Free Download:




Removing or Hiding traces is most important thing that every hacker should know otherwise you will be busted in less than 5 minutes. In our previous article we have learned about how to remove traces over Network. Today we will learn how to make your computer almost untraceable, so that you cannot be tracked or monitored by anyone. This will not only help you in hiding your identity during hacking attempts but also make you anonymous over the network. Hiding or removing traces sometimes also referred as Anti-forensics.
Let’s get started… How to make your computer untraceable i.e. Leaving no traces behind any hack attempt. Hackingloops presents you complete Anti-Forensics hacker’s step by step guide to hide traces or logs.
Make your computer untraceable - Hackers Guide to Anti-Forensics

Anti-Forensics Guide for Hacker’s :

1. Encrypt Your Keystrokes

You need to protect yourself from keyloggers/Rats. As strange as it may sound even the government/ security agencies/ windows/Hackers all has keyloggers, which records the users IP address, Mac address, open ports, operating system, installed applications, default web browser, visited URLs, logged in user, etc…
In order to protect yourself from keyloggers, you should encrypt your keystrokes. You can do this using a software called ‘Keyscrambler’.

2. Making Encryption Secure

Encryption is pointless if it can be easily bypassed or overcome. You need to make sure that the encryption is secure too.
Step 1 – Make Sure Your Password Is Strong
Even with your computer encrypted, it is still vulnerable. Make sure your password is good (for optimal security, your password should be twenty or more characters, with symbols, numbers, and random capitals, and a special symbol (like ALT+1456) really increase security). Norton password generator is great for this.
Step 2 – Create A Locked Screen Saver
Encryption is pointless if the Forensic Team get to your computer while its running. They can use live forensic tools that don’t require the movement or shutdown of a computer.
A very simple technique to overcome this is to create a locked screen saver. To create a locked screen saver in Windows Vista or Windows 7; Right click your desktop and click on ‘Personalize’. In the bottom left or right hand corner you should see ‘Screen Saver’, click that. Now, check ‘On Resume, Display Logon Screen’, and set ‘Wait’ to 5. Now, underneath that you may set what you want your screen saver to be.
Now you must go to your Control Panel. Click on System and Security now click on ‘Power Options’ find your selected plan and click ‘Change plan settings.’ Now, set ‘Turn Off Display’ to 5 minutes. That’s it! You have now created a locked screen saver.
Step 3 – Get Some Good Antivirus
This may seem obvious, but all this is pointless if you get infected with a keylogger that takes screen shots. Having a good anti-virus is one of the most important things you can do. Now, listen up. AVG, Avast, McCafe, Norton? They all SUCK. The only Anti-Virus you should even consider are BitDefender, ESET, Nod32 and Kaspersky is also pretty good. Advance System Care Ultimate is Good To it uses BitDefender Anti virus engine but is also a utility tool i.e Registry fix/defrag disk defrag privacy sweep security fix etc.
You rarely even need anti-virus software when using Linux, as most viruses are built to infect Windows systems, given these make up the majority of computers, but it’s best to be safe.

3. Disabling Windows Hibernation

You may as well hand your computer over to the feds if they raid your house and your computer is in hibernation. Also, putting your computer into hibernation is pretty much just taking a screen shot of your RAM that gets saved to your hard drive.
To disable hibernation in Windows Vista/7/10:
a. Open your Control Panel.
b. Click System and Security, then click ‘Power Options’.
c. Click ‘Change plan settings’ for you current power plan.
d. Now click ‘Change advanced power settings’. Expand ‘Sleep’, then expand ‘Hibernate After’. Enter “0″ for ‘Setting:’ to set hibernate to ‘Never’. Hibernation is now disabled.

4. Disable and Remove USB Logs

Next on the list of Anti-Forensics in to disable logs of USB activity, flash drives, etc…
This can be valuable if you have a flash drive with sensitive data and you don’t want any logs of it ever being plugged it to your computer.
Step 1 – Delete the USBSTOR Registry Setting
The USBSTOR setting contains history of plugged in USB devices.
To delete it, hit the WINDOWS Home Button + R at the same time. This will open up ‘Run’; type: “Regedit” (without quotes). Browse to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USBSTOR
Now, right click ‘USBSTOR’ and hit ‘Delete’, then confirm that you want to delete the key. Now, the key has been deleted.
Step 2 – Delete The Setupapi.log File
The Setuppapi.log is a plain-text file that stores the list of installed USB devices and their drivers. We will delete it with a program called CCleaner.
CCleaner is actually one of the best anti-forensic tools out there, and its free.

5. Disabling Time Stamps

Using Time Stamps, forensic experts can build a ‘digital time-line’, this can be very compelling evidence when cross-referenced with other known evidence. In order to strengthen security, we must disable these logs.
Step 1- User Assist File
There is a registry setting that keeps logs and dates of all launch programs, forensic experts can use this to build a digital timeline, we must disable this for computer security. Navigate to HKEY_Current_User\Software\Microsoft\Windows\Currentversion\Explorer\User assist. Do this by hitting the Windows button on your keyboard and R at the same time and typing regedit in). You should see two subkeys called Count, delete both these keys. Now right-click the UserAssist key and create a new key named ‘Settings’. In this key (right clicking on it) create DWORD value named NoLog, set the value to 1.
Windows will no longer store hidden logs of the exact times you have been accesing files, therefore forensics experts can no longer use these hidden logs to create a digital timeline.
Step 2 – Last Access Logs
Next we will disable the last access in Windows. What last access is is a setting on Windows that allows you to see when you opened, modified, and/or created files on your computer and is similar to the UserAssist registry key. By disabling this forensic
experts won’t as easily be able to tell when you’ve been accessing programs or files on your computer.
To disable last access open command prompt on your computer, if on Vista or Windows 7 make sure to run as administrator. In command prompt type the following:
fsutil behavior set disablelastaccess 1
Last access has now been disabled, in order for it to take effect you must restart your computer. (You have to have admin rights to do this).

6. Windows Security Miscellaneous

This is for the shit that has to do with windows anti-forensic security, but wasn’t big enough to have its own section. That does NOT mean this section isn’t important, the stuff in here may actually be the most important in the whole guide.
Step 1 – Disable System Restore Points
System Restore points can be used to bring your computer back to a date when it wasn’t secure and can also be used to restore overwritten files.
To disable System Restore points, right click ‘Computer’ and click ‘Properties’. Now click ‘Advanced System Settings’. Under ‘System Protection’ click ‘Configure’.
Now, select ‘Turn Of System Protection’ and apply it.
Step 2 – Disable ‘Send Error Report to Microsoft
This is self-explanatory, we obviously don’t want Microsoft having logs of all our crashed programs. To do this, go to your start menu and search ‘problem reporting settings’ and then click on ‘Choose How To Report Problems’. Click ‘Change Report Settings For All
Users’ and then set it to ‘Never check for solutions’.
Step 3 – Wipe With CCleaner
This is the heart of Anti-Forensics right here. CCleaner is actually one of the most powerful Anti-Forensic tools, -IF- used correctly.
As it turns out, when deleting files, you DO NOT need to do multiple overwrites. With modern hard-drives, one overwrite really is enough to delete a file beyond repair, even though it is popular belief that you need several overwrites to be secure.
With CCleaner, I would recommend three overwrites, just in-case it misses something the first time around (remember, it is a free software).
Once you have CCleaner installed, run it (AS ADMIN), go to ‘Settings’ and make sure you have it set to overwrite deleted data with three passes. Go back to ‘Cleaner’ and check EVERYTHING. I mean EVERYTHING, and hit ‘Run Cleaner’. You might want to leave this on overnight.
Do this every time you are done with a major hacking job. When using normally (what should be every time you are done with your computer), uncheck ‘Wipe Free Space’, this will cut down the time from hours to a few minutes.
Step 4 – Disable Debugging Upon Failure
This keeps logs of your computers failures and blue screen info.
To disable it, right click ‘Computer’ and go to ‘Advanced System Settings’, now go to ‘Start Up and Recovery’. Now, set ‘Debugging Information’ to ‘None’.
Step 5 – Disable Windows Event Logging
Windows keeps logs of all events on the computer. First, before we disable, we must clear all the logs.
To disable it, go to Control Panel then System and Security. Now, click Administrative Tools, and then Event Viewer. In either pane of the Event Viewer window, right-click System and then select Clear All Events, you will get a window that says: “Do you want to save ‘System’ before clearing it?”, click ‘No’.
Now we must disable Windows Event Logging. Go to ‘Run’ and type in ‘msconfig’, then go to ‘Services’ and make sure ‘Hide all Microsoft Services’ is UNCHECKED. Now scroll down until you find ‘Windows Event Logging’, and UNCHECK it.
Now restart your computer right away.

7. Online Anonymity Guide

Hiding online identity and anonymity is essential; because it prevents you from getting traced or tracked down.
Proxies : Proxies are used mainly for security purposes and IP Address, it may be also used to speed up the loading of resources by caching, bypass parental controls and open blocked sites.
Web Proxies : Web Proxies are services that provides proxy access using a website, the function is, when you request a webpage, the server will contact the website indirectly and will server the resource to your web browser.
VPNs : VPNs are similar to proxies, it hides your IP address but the advantage is, it encrypts your traffic so that it would not be intercepted by data sniffing tools, it is useful for public wifi hotspots and for home/office use.
User-Agent Switcher : Spoofs and mimics a user-agent to hide the browsers’ identification.
IPFuck/IPFlood : Used for hiding IP address by using multiple proxies simultaneously, which obfuscates the user’s IP address.

8. Anonymity Tips

a. Do not post private information in the web, including your address, birth date and contact info, including on your registration details, if the authorities found one, they will use it to track you.
b. Do not engage private activities while on public places, other people might see you.
c. Always use anonymity tools so your IP address is masked, if in case they found it out, the IP is fake.
d. Do not brag or talk about hacking, obviously, if you brag/talk about it with your friends, they might report you to the police.
e. Hide your files in an encrypted container, encrypting data on the USB is better.
f. Always use SSL when its available; it encrypts your details so that it would be safe.
g. Use SSH (Secure Shell) when connecting to a remote system, one good example is PuTTy.
h. Never trust anyone; and rely on your instincts.
i. Try “proxy chaining”, or using of multiple proxies.
j. Use a VPN together with a high-anonymity proxy so that there would be an increased privacy advantage.

That’s all friends!! This is must for all Hackers. Keep Learning !! Keep Connected!!

One of  my blogging  friends (Black star) has developed password cracking tool. Password Cracker 1.1 .This tool can crack  MD5,SHA-1,.. Hash codes using Dictionary Attack Method. Password Cracker 1.1 is open source (free) , you can download the tool from the following link 




Download :-


For windows Users :-
Download the Password Cracker 1.1 from Here
Open the HashCodeCracker.exe which is inside the folder .


Note :- You need JRE (Java run time Environment) to run this .If you don't have it, Download it from Oracle.com


For Linux Users 
Download the HashCodeCracke.zip file from Here
Extract the zip file, Open a new  Terminal. Navigate to the path of Extracted zip file, Type this command "java -jar HashCodeCracker.jar".Now the application will run.


How To Use Password Cracker 1.1 


1. First download the tool from the above link , then run the application ( Password Cracker 1.1 )


2. Now Select  the Input case type 
There are 3 options ., select one of them
  • Default          - As it is in the dictionary file
  • Upper case   -  Change the dictionary file input to upper case
  • Lower case   - Change the dictionary file input to lower case

3. Now Select Other type option as shown 
There are 3 options ..select one of them  

Reverse Input:  Reverse the dictionary file input.  
Example :- Let us assume the dictionary file contains the following inputs: pass, i loveyou. if you choose reverse input , it will reverse like this : "ssap","uoyevoli".

Double: Just doubles the input.
Example :- If the input is " pass " then it simply doubles it as "passpass"


Numbers at the End: Add numbers from 0 to 99. 
Example :- pass0,pass1,pass2....pass99.

4. Now paste the hash code and Select the Hash method (MD5,MD4,SHA-1,SHA-128,SHA-256,SHA-512).


5. Select a dictionary file and and click the "Crack the Hash " button.




Wait for a some time, it will return you with the password. If the hash is not cracked, then try to changing the   "other type" and "Input Case type".

Pros :- Very easy to use , Has a nice GUI (Graphical user interface ) , available for both windows and Linux platforms

Cons :- Very slow to crack , It only uses dictionary attack to crack passwords 



The MD5 Message-Digest Algorithm is a widely used cryptographic hash function that produces a 128-bit (16-byte) hash value, Md5 is an encryption that cannot be reversed, the only successful way to find out the content of a md5 hash, is by running a Brute force Attack


BarsWF Worlds Fastest MD5 Hash Cracker 
Barswf is a program designed to crack md5 hashes. It combines old with newer CUDA technologies. So, it uses your graphical card and if available, multiple cores to manage the cracking of md5 hashes. It's considered to be  the fasted Md5 Hash cracking tool available.

System Requirements
  • CUDA version only:nVidia GeForce 8xxx and up, at least 256mb of video memory.
  • LATEST nVidia-driver with CUDA support.Standard drivers might be a bit older (as CUDA 2.0 is still beta)
  • CPU with SSE2 support (P4, Core2Duo, Athlon64, Sempron64, Phenom).
  • Recommended 64-bit OS (WinXP 64 or Vista64). 32-bit version is also available.

Download 

AMD BROOK Beta 0.9:
BarsWF Brook x64
BarsWF Brook x32

CUDA 0.B:
BarsWF CUDA x64
BarsWF CUDA x32

SSE2:
BarsWF SSE x64
BarsWF SSE x32



Tutorial

The following video shows us how we can crack MD5 hashes using BarsWF





Hack Windows Password Using Pwdump and John The Ripper 



Things we need :-

1. Pwdump - To dump windows password hashes
2. John the Ripper - To crack the dumped password hashes



Procedure:-


1.  Open My computer and go to C:\Windows\system32 ,now place the Pwdump file which we download earlier

2. Now open command prompt and navigate to C:\Windows\system32 \Pwdump By Using the "cd " command  and  click enter

Example :-
Cd C:\Windows\system32 \Pwdump

3. Now you can see a list of Pwdump commands as shown


4. Now enter pwdump - localhost >>“ destination of the output file “ (for 32-bit computers) and pwdump -x localhost >> “destination of the out put file “(for 64- bit computers )


Example :-
Cd C:\Windows\system32 \Pwdump localhost >> C:\hash.txt (for 32-bit computers )


Cd C:\Windows\system32 \Pwdump -x localhost >> C:\hash.txt (for 64-bit computers)




5. Now open  the Out put  file (In my case its hash.txt )From c:/ you can see the names of the different  users with password hashes Now copy the hashes  corresponding to the admin account

6. Now make JTR (John the ripper ) crackable file by Opening a notepad and pasting the hashes which we copied in the previous step in the format given below
Example:-
User:gyuJo098KkLy9
where "gyuJo098KkLy9" is the  hash which we copied in the 5th step 

7. Save the file as crackme.txt (just an example) and go to the prompt and type 'john crackme.txt' (with out quotes ). Now wait for a while ,the password hashes will be cracked  .You can also use the Various options in John the ripper to make the cracking a little faster .For this you can refer my Tutorial on John the Ripper 


Note : You can also use any other password cracking tool or online password cracking sites like www.cracker.offensive-security.com to crack the hashes 




Hello everyone,today I want to share special application for Windows 7 User that its already include in Windows 8,

BlueStacks is the first production software that allows you to use your favorite mobile Android apps on a Windows PC. You can download apps like Angry Birds Space, Temple Run, Evernote or Documents to Go directly into BlueStacks.

System requirements


-Windows 7, Windows Vista, Windows XP operating system

-PC must 2GB RAM





Download Link : 
                                                 


Windows 7 Boot Changer Mediafire Links

Modifies the boot animation, colors, text, and background
Modifies the resume from hibernation screen as well
Will create the animation from 105 BMP, PNG, GIF, or TIFF images or use a single (non-animated) image
Does not require any other applications (like ImageX)
Designed to be idiot-proof by having numerous checks
Automatically backs-up the modified files
Does not require test-signing or no-integrity-checks to be enabled
Works for all versions of Windows 7: any language, any edition, 32-bit or 64-bit, RTM or SP1
Works even if your setup has the hidden "System Reserved" partition

Changes
v0 Beta 1 (v0.0.1.1)
Able to work with already modified files (that were modified with this version of this program or later)
Improved BCD device detection and elimination of redundant error messages
Fixed many problems with the installer which caused it to crash
Improved backup system and unlocking files when possible
Improved patching system
Smaller BS7 files (but they cannot be opened by older versions of the program)
Includes translations for Spanish, French, Dutch, Hungarian, Hebrew, and Vietnamese (contribute a translation)
Improved language support including external translation loading (means there can be language packs and translators can see how the translations look)
Numerous other minor changes and fixes

Download

Mediafire


Previous PostOlder Posts Home