asC/Strick9
Deviance
Industry Giant 2 *Proper* (C) Jowood
Supplier....: Team Deviance CD Count.......: 01 CD
Protection..: Securom + Serial Date...........: 06/2002
ALWAYS READ THIS NFO PROPERLY
** Release Information **
Seems iMMERSiON forgot to check for BIN errors on their release, and also
forgot to put the crack on the CD.
A CDmage scan of their ISO reveals a total of 23 bin erros, here is a small
snippet from the total error log (full log at the end of this nfo):
|Severity|Content of sector
|Low |JOLIET: directory record for "\DirectX81\"
|Low |ISO9660: bytes 20480-22527 of the file "\BIN\IG2.EXE";
|Low |ISO9660: bytes - of the file "\DIRECTX8\DX81ENG.EXE";
|Medium |ISO9660: bytes 4829184-4831231 of the file "\VIDEOS\LOK_10.BIK";
|Medium |ISO9660: bytes - of the file "\VIDEOS\STATION3.BIK";
|Medium |ISO9660: bytes 5236736-5238783 of the file "\VIDEOS\TRAIN_DA.BIK";
We present an error free image with crack on the CD as it is required in the
iso scene.
Game Notes:
This brand-new business simulation starts in America at the turn of the 19th
to the 20th century. Trade and economy range from the rise of industrial
revolution to the age of information technologies. As in IndustryGiant,
you again take over the role of an super-entrepreneur, trying to establish a
global organization by managing the buying of resources, processing products,
ogistics and sales.
Game Features:
For the first time, the player has the option to interact with his/her opponent;
play as a team or play against each other.
The player faces a significantly wider range of resources and final products,
including resources which depend on weather.
Seasonal demand for products require the player to carefully plan storage for
finished goods.
The exchange of goods can only be managed via storage. The information on how
much is available can be retrieved by the player at all times. This provides
better control over the product cycle.
These product cycles can be interrupted, meaning that wheat can be grown and
sold without further processes. This makes it easier for beginners.
Over 50 means of transportation; from simple coaches to trucks and steam-engines,
to locomotives, and of course a wide range of ships.
Differing climates bring changes to the game-play and add to the complexity of
strategic planning.
Detailed buildings and vehicles; with transparent smoke.
Install Notes:
1) Unrar.
2) Burn the .cue and .bin with CDRWin or Fireburner.
3) Install the game.
4) Copy over the cracked game .exe file from the CD.
5) Enter any serial from the list below when starting the game.
Read this NFO properly!
DEViANCE Application Information
You think you can contribute to the scene too? You have one or more
talents in:
- supplying NEW unreleased GAMES (maybe you work at a game/util
magazine, courier delivery firm, newspaper, game press/marketing
company, distributor, publisher, duplicator, tv/radio show, shop,
warehouse, language translator company, store etc.) You don't
need a fast internet connection for the above!
- supplying NEW unreleased store/shop games BEFORE the store release
date & have a fast UPLOAD 300k+ internet connection and time to
spare on weekday mornings. We are NOT interested in modem,
cable, or DSL links as they can be capped at anytime! Proper
internet connections are needed! Of course we shall reimburse you
for the costs of the games you buy. As we buy our games!
- you are experienced in removing executable protection systems
(such as ASProtect, ASPack, Armadillo, tELock, NeoLite etc.)
and you are willing to help defeating the latest versions of
commercial iso copying protection systems like Safedisc 2+ or
Securom or Tages or VOB or Copylok or Laserlok. You must be
able to code in assembly language.
- you are a coder with lots of experience in Debugging/ASM & C/C++.
You also can code your OWN tools to automatically remove
commercial iso protections like the latest versions of any of the
following: SafeDisc or Securom or TAGES or VOB or Laserlok or
Copylok. Using tools created by others does NOT count and we
check! You will also need advanced knowledge of import tables
setting breakpoints with/and PE File Formats.
- you are a Unix guru with good Ansi-C software developing knowledge
and understanding how to prevent network security vulnerabilities.
That means you must be able to code to ansi-c guru level. And you
must also have a good coder perspective of hostbase and network
based intrusion detection systems. You should be able to code tools
to generically prevent stack and heap buffer overflows on unix in
Ansi-C. And Be able to code tools to look after a group of systems
and code sniffing avoidance tools. And you can configure a system
in ways to prevent packet sniffers and "man in the middle" attacks.
- supplying linux bnc shells to the group (for free).
They should have 2mbit MINIMUM link. We shall require flexible
control over the shell. Root access on the box with dynamic
ident such as midentd for bncs. All boxes must have legitimate
IP's, they should not be running NAT or a firewalling system
that will constantly interfere with the link. Ideal shells will
have multiple vhosts, reasonably good uptime (20+ days), and a
low system load. Public shells such as JEAH.NET or similar with
25+ load averages and 3 day uptimes are not acceptable. The more
reverse ips you have the better. We are only interested in LEGIT,
NON-HACKED/CARDED shells. These shells will be used only for the
purposes listed above and will NOT be used for any kind of
'dump site' or for spreading any kind of releases. We are NOT
interested in modem, cable, or DSL shells. The shells should be
up 24/7 with minimum downtime for upgrades, etc and should not be
overloaded with processes. We check!
- are you able to write source code to unpack & repack game related
major file format types such as MPQ, MIX & WAD? And can you also
identify most major big-file formats(files that contain more
files) by looking at the hex byte code of the header for that
file? Do you know what reindexing is in regards to game .exe's
and can you do it? And can you turn your OWN source code
written in ASM/C/C++ for the above tasks into executable group
tools? And do you also have 50K downlink for downloading new game
formats to write tools for? You must send example code of your
work with sources on major file formats for depacking/repacking.
Existing/stolen source will not be allowed!
- making trainers for newly released games, menu driven, must work
in Win9x and Win2K/WinXP. Also you must be on a 50k downlink at
least. And you have time during the week to do trainers.
Also you understand DMA & ASM debugging techniques and use them
to find your trainer codes. This is needed to make sure your
trainers will work on all operating systems!
If you can meet one or more of those requirements and want to join
the finest active group in the scene today, e-mail us.
Use the contact information given below.
And always remember: we do this just for FUN. We are against any
profit or commercialisation of piracy. We do not spread anything,
others do that. In fact, we BUY all our own games with our own
money, as we love game originals. Nothing beats a quality original.
And if you like this game, BUY it. We did!
How to Contact DEViANCE
READ BELOW FIRST OR YOUR MAIL WILL BE DELETED:
DEViANCE DOES NOT PASSWORD FILES, OTHERS DO THAT!
DEViANCE DOES NOT MAIL OR FTP OR SEND MISSING FILES OF OUR RELEASES!
DEViANCE DOES NOT PUBLISH FILES ON WEB SITES, NEVER!
DEViANCE DOES NOT USE IRC TO PUBLISH FILES, NEVER!
DEViANCE DOES NOT DO TECHNICAL SUPPORT, NEVER EVER!
DEViANCE DOES NOT HAVE, WANT OR NEED ANY WEB SITES!
DEViANCE DOES NOT GIVE OUT ANY LINKS OR NAMES FOR FILES!
DEViANCE DOES NOT GIVE OUT ANY MUSIC OR GAME FILES!
DEViANCE DOES NOT TELL TO GROUP OUTSIDERS HOW TO CRACK OR TRAIN GAMES!
DEViANCE DOES NOT TELL WHERE YOU CAN GET OUR RELEASES!
SO DO NOT ASK...
Via the WWW : WE DO NOT USE OR WANT ONE, THANKS.
Via E-Mail :apcsupply*hushmail*com (READ NOTES ABOVE FIRST).
DEViANCE: ALWAYS FASTER THAN LiGHT!
[NFO UPDATED 22/APR/2002]
Support the software companies. If you play this game BUY it!
CDmage B5 1.02.1 error report for image "ims-ig2.cue"
Track #| Sector|Sync|Header|Subheader|EDC|Intermediate|ECC P|ECC Q|Severity|Content of sector
1| 179| No | No | N/A |No | No | No | Yes |Low |JOLIET: directory record for "\DirectX81\"
1| 198| No | No | N/A |No | No | No | Yes |Low |ISO9660: bytes 20480-22527 of the file "\BIN\IG2.EXE"; JOLIET: bytes 20480-22527 of the file "\bin\ig2.exe"
1| 6,927| No | No | N/A |No | No | No | Yes |Low |ISO9660: bytes - of the file "\DIRECTX8\DX81ENG.EXE"; JOLIET: bytes - of the file "\DirectX81\DX81eng.exe"
1|126,238| No | No | N/A |Yes| No | Yes | Yes |Medium |ISO9660: bytes 4829184-4831231 of the file "\VIDEOS\LOK_10.BIK"; JOLIET: bytes 4829184-4831231 of the file "\videos\Lok 10.BIK"
1|214,835| No | No | N/A |Yes| No | Yes | Yes |Medium |ISO9660: bytes - of the file "\VIDEOS\STATION3.BIK"; JOLIET: bytes - of the file "\videos\Station_steam.bik"
1|223,229| No | No | N/A |Yes| No | Yes | Yes |Medium |ISO9660: bytes 5236736-5238783 of the file "\VIDEOS\TRAIN_DA.BIK"; JOLIET: bytes 5236736-5238783 of the file "\videos\Train_Damage.bik"
1|306,640| No | No | N/A |No | No | No | Yes |Low |ISO9660: bytes - of the file "\SETUP.EXE"; JOLIET: bytes - of the file "\setup.EXE"
1|309,427| No | No | N/A |No | No | No | Yes |Low |ISO9660: bytes - of the file "\SETUP.EXE"; JOLIET: bytes - of the file "\setup.EXE"
1|310,038| No | No | N/A |No | No | No | Yes |Low |ISO9660: bytes - of the file "\SETUP.EXE"; JOLIET: bytes - of the file "\setup.EXE"
1|314,571| No | No | N/A |No | No | No | Yes |Low |ISO9660: bytes - of the file "\SETUP.EXE"; JOLIET: bytes - of the file "\setup.EXE"
1|316,790| No | No | N/A |No | No | No | Yes |Low |ISO9660: bytes - of the file "\SETUP.EXE"; JOLIET: bytes - of the file "\setup.EXE"
1|316,856| No | No | N/A |No | No | No | Yes |Low |ISO9660: bytes - of the file "\SETUP.EXE"; JOLIET: bytes - of the file "\setup.EXE"
1|316,966| No | No | N/A |No | No | No | Yes |Low |ISO9660: bytes - of the file "\SETUP.EXE"; JOLIET: bytes - of the file "\setup.EXE"
1|317,010| No | No | N/A |No | No | No | Yes |Low |ISO9660: bytes - of the file "\SETUP.EXE"; JOLIET: bytes - of the file "\setup.EXE"
1|317,077| No | No | N/A |No | No | No | Yes |Low |ISO9660: bytes - of the file "\SETUP.EXE"; JOLIET: bytes - of the file "\setup.EXE"
1|318,090| No | No | N/A |No | No | No | Yes |Low |ISO9660: bytes - of the file "\SETUP.EXE"; JOLIET: bytes - of the file "\setup.EXE"
1|318,443| No | No | N/A |No | No | No | Yes |Low |ISO9660: bytes - of the file "\SETUP.EXE"; JOLIET: bytes - of the file "\setup.EXE"
1|318,774| No | No | N/A |No | No | No | Yes |Low |ISO9660: bytes - of the file "\SETUP.EXE"; JOLIET: bytes - of the file "\setup.EXE"
1|323,312| No | No | N/A |No | No | No | Yes |Low |ISO9660: bytes - of the file "\SETUP.EXE"; JOLIET: bytes - of the file "\setup.EXE"
1|327,319| No | No | N/A |No | No | No | Yes |Low |ISO9660: bytes - of the file "\SETUP.EXE"; JOLIET: bytes - of the file "\setup.EXE"
1|332,532| No | No | N/A |No | No | No | Yes |Low |ISO9660: bytes - of the file "\SETUP.EXE"; JOLIET: bytes - of the file "\setup.EXE"
1|332,645| No | No | N/A |No | No | No | Yes |Low |ISO9660: bytes - of the file "\SETUP.EXE"; JOLIET: bytes - of the file "\setup.EXE"
1|333,543| No | No | N/A |No | No | No | Yes |Low |ISO9660: bytes - of the file "\SETUP.EXE"; JOLIET: bytes - of the file "\setup.EXE"
Total error count:23