INTRO : PROTECTION SCHEME TYPE C
This protection scheme employs the use of a "fat track" to
prevent the user from making his backup. To make matters worse,
the fat track is placed on the outer (36-40) tracks.
Most of the examples covered in this manual work approximately
the same. The following general loading procedure is taken with
each.
1) The boot is loaded and autostarts the program.
2) A fast loader is set up and activated.
3) The logo screen is loaded in and activated.
4) The protection routine is decrypted.
5) The files pertaining to the program are loaded in. These
are generally encrypted.
6) The protection is checked, which places a numeric value
($FF) in the disk drive's memory.
7) The value is checked using a memory read.
8) The value is used as a part of a decryption routine to
decrypt the main program. Proper decryption takes place
ONLY if the correct value is returned.
9) The code then jumps to the start of the program.
The Activision examples in this manual represent this protection
scheme in it's most difficult form to un-protect. You'll find this
same scheme being used by other software publishers, but generally
not encrypted. They usually check for the value in the same way
and start the program if found. One example of this will be given,
and will be unprotected by a different method. Understanding this
routine is imperative, because this scheme has been improved, and
will be covered in it's expanded form in updates to this manual.
K.J. REVEALED TRILOGY PAGE [21] (C)1990 K.J.P.B.
<<previous page -
next page>>