cartridge port. Turn the computer on again and load the boot
         file from the original <> LOAD "DWARF",8: <>. You can list this
         file and inspect it. You'll find it loads the file called BOOT2
         and then a SYS 49152 ($C000).

      5) From your utility disk, load the $2000 monitor
         <> LOAD "8192",8,1 <>. Sys it in with SYS 8192. Now load the
         BOOT2 file <> L "BOOT2",08 <> and start disassembly at $C000
         (D C000). The first instruction at $C000 is a JSR to $C028.
         Disassemble $C028 (D C028) and here you'll find the decryption
         routine that is the heart of this protection scheme. It resides
         from $C028 to $C037. The break itself is very simple. Make sure
         you have a write protect tab on the ORIGINAL and that it is in
         the drive. Start the program by typing G C028 and press RETURN.
         The drive will spin for a short time and then stop. At this
         point, reset the computer and re-SYS the monitor back in with
         SYS 8192. Again disassemble code at $C028. You should find new
         code in the place of the encrypted code. All that's left is to
         save this broken loader back to the backup.

      Working with your backup:

      6) Reset the computer and place your prepared backup in the drive.
         Scratch the BOOT2 file <> OPEN15,8,15,"S0:BOOT2" <>. Re-SYS the
         monitor in with SYS 8192. The disk log provides the start and
         end addresses of the BOOT2 file. Be sure to add one byte to the
         end address. With your backup in the drive, save the BOOT2 file
         back to the backup <> S "BOOT2",08,C000,C151 <>.

      Your backup is completely broken and can now be copied with any
      whole disk copier. Unfortunately, it remains non-file copyable
      because of the way the programers set up the disk files.



      INTRO : PROTECTION SCHEME TYPE K

      This protection scheme is, at this writing, one of the most
      effective and prevalent methods of defeating today's nybble
      copiers. When you know what to look for, you'll find this scheme
      is being employed by many different software houses. I like to
      think of this protection as the "big brother" of the long sectors
      discussed in the previous section.

      This scheme can be recognized by the following similarities. When a
      disk error check is done, no write errors will be found on the
      original. When booted, no drive rattle will be encountered. The
      program cannot be backed up with either a fast copier or a nybbler.
      Usually, you will find data in the directory other than normal

            K.J. REVEALED TRILOGY    PAGE [50]     (C)1990 K.J.P.B.

<<previous page - next page>>