directory data. Most important: when tracing the program through
it's loading process, you will generally run into a decryption
routine and a sector or two of encrypted code.
When this encryption is located, you can be sure it is hiding the
protection check code.
Remember, I stated that a sector or two in memory will be
encrypted, and that this area in memory surely contained
the protection check. Well, one other thing needs to be
mentioned.
This is the fact that this encrypted memory starts out as garbled
code, then decrypts into a protection check routine and finally
after the protection check has been satisfied, is REPLACED with
valid program code. This code, as previously stated, is one or two
sectors in length and can be found anywhere on the program disk.
You'll find that the directory track (track 18) is the most likely
spot. In most cases, we can let the program insert the hidden code
in it's proper place. Then a memory save and replacement over the
encrypted code in the proper file will not only defeat protection
but will totally remove the check for it.
Most of the programs protected with this scheme can be
defeated with a simple memory save, but a few have had to
have some of the code re-written by hand. This is
relatively uncommon and cannot be explained in the scope
of this manual.
Experience will prove to be the best teacher.
Before starting to work on the following programs, please
do a disk file log (print out is best), format a blank
work disk, and have a (non-working) backup available.
Please make sure you have a write protect tab on your
original program disk as you will be using it in the
breaking process. Now let's get on to the specifics.
INFILTRATOR : MINDSCAPE
Procedure:
Loading the original produces a rattle free load, and an
error scan shows no standard errors. A backup made with
the C-64 Fast Copier provides a non-working backup. Nybble
utilities also provide a non-working backup. Loading the
backup results in a load that stalls rather quickly. We
can assume the protection is in the loader file. Before
starting to work on this title, please make a backup and a
disk log (printout is best).
Working with your original:
1) Place a write protect tab on your original to
protect it during the breaking process.
K.J. REVEALED TRILOGY PAGE [51] (C)1990 K.J.P.B.
<<previous page -
next page>>