K.J. REVEALED III
<< Publisher's Notes >>
Welcome to Kracker Jax Revealed Vol III. We at Kracker Jax want
to thank you for your purchase and let you know that we do
appreciate your support of our products.
First of all, we'll assume that you have read Kracker Jax
Revealed Vols I & II (the previous sections in this manual) and
that you've performed many of the procedures in those sections. The
format of Vol III has changed substantially. Although we've
retained the cookbook approach, we have been forced to drop the
major types. Protection has progressed to the point of excellence
(in some cases) and is often better than the programs that it
protects! Most programs today are protected in very individual
styles. In this edition of Kracker Jax Revealed, we try to hit the
highlights and prepare you for your trek ahead.
Please understand that we can't be responsible for the machine
language training that must be done before you can thoroughly
understand the procedures and principles set forth in this manual.
You don't have to be a fluent M/L programmer, but you MUST have a
cursory knowledge of M/L and a strong natural curiosity. Don't
expect to discover (as some beginners do) a generic method of de-
protection. It just doesn't exist. We can and will give you hints,
tips, and techniques that can be applied to other programs, even if
they are a completely different protection type than discussed in
this manual.
Finally, many protection schemes are based on the fact that no
standard or nybble copier on the market can duplicate the program
data. This protection becomes even harder to back up. No longer are
we dealing with a sector or track of special protection; EVERY byte
on the disk is protected. These programs must be either broken from
memory or have a special copier developed to duplicate that
program's format. Both of these methods are far too complicated to
discuss within this manual. As you become more and more proficient
at the patch method, the memory break method will become obvious.
Writing copiers is in the realm of DOS experts that have a complete
knowledge of M/L. Leave the special copiers to them.
Kracker Jax Revealed Vol III has many features worth mentioning.
Berkeley fans will really enjoy Bob's new work on GEOS. He shows us
exactly how to use Super Snapshot to obtain a working copy of GEOS
that may be booted from ANY drive. Also, for those of you more
inclined to know the internal workings of GEOS protection, Bob has
K.J. REVEALED TRILOGY PAGE [104] (C)1990 K.J.P.B.
<<previous page -
next page>>