K.J. REVEALED III
      
                         << Publisher's Notes >>
      
      Welcome to Kracker Jax Revealed Vol III. We at Kracker Jax want
      to thank you for your purchase and let you know that we do
      appreciate your support of our products.
      
      First of all, we'll assume that you have read Kracker Jax
      Revealed Vols I & II (the previous sections in this manual) and
      that you've performed many of the procedures in those sections. The
      format of Vol III has changed substantially. Although we've
      retained the cookbook approach, we have been forced to drop the
      major types. Protection has progressed to the point of excellence
      (in some cases) and is often better than the programs that it
      protects! Most programs today are protected in very individual
      styles. In this edition of Kracker Jax Revealed, we try to hit the
      highlights and prepare you for your trek ahead.
      
      Please understand that we can't be responsible for the machine
      language training that must be done before you can thoroughly
      understand the procedures and principles set forth in this manual.
      You don't have to be a fluent M/L programmer, but you MUST have a
      cursory knowledge of M/L and a strong natural curiosity. Don't
      expect to discover (as some beginners do) a generic method of de-
      protection. It just doesn't exist. We can and will give you hints,
      tips, and techniques that can be applied to other programs, even if
      they are a completely different protection type than discussed in
      this manual.
      
      Finally, many protection schemes are based on the fact that no
      standard or nybble copier on the market can duplicate the program
      data. This protection becomes even harder to back up. No longer are
      we dealing with a sector or track of special protection; EVERY byte
      on the disk is protected. These programs must be either broken from
      memory or have a special copier developed to duplicate that
      program's format. Both of these methods are far too complicated to
      discuss within this manual. As you become more and more proficient
      at the patch method, the memory break method will become obvious.
      Writing copiers is in the realm of DOS experts that have a complete
      knowledge of M/L. Leave the special copiers to them.
      
      Kracker Jax Revealed Vol III has many features worth mentioning.
      Berkeley fans will really enjoy Bob's new work on GEOS. He shows us
      exactly how to use Super Snapshot to obtain a working copy of GEOS
      that may be booted from ANY drive. Also, for those of you more
      inclined to know the internal workings of GEOS protection, Bob has
      
            K.J. REVEALED TRILOGY    PAGE [104]    (C)1990 K.J.P.B.

<<previous page - next page>>