break for all is about the same. This code sets up a load of
the actual protection check code within the GMA3 file. (Those
of you interested in the drive code for the protection should
load and inspect GMA3.) A JSR to $C800 within this code
checks protection, and if the check is successful, a value of
$97 is place at computer location $0002. Upon return from the
JSR C800, the value in location $0002 is loaded into the
accumulator and EORed with a value of $97. Lastly the code
Branches if Equal (to 0) to $C02A. Remember, if protection WAS
satisfied, a value of $97 was placed at $0002. The EOR Truth
Table in the back of the book tells us that $97 EORed with
$97 is in fact zero. If the branch does take place, it will
cause a jump around the instruction at $C027 which is a JMP
($FFFC). This instruction is actually a Jump to a Kernal
routine that does a system reset, which in turn will crash
the load process.
B) The break is now quite simple. We can jump around the whole
protection check. All that is necessary is to replace the JSR
C800 with a JUMP around the reset code to $C02A. We will
replace the 20 00 C8 with 4C 2A C0 (JMP C02A). Remember, we
don't want to allow any protection check because if the
protection is not in place, the drive hangs up and goes into
an endless spin. Let's make our changes with Disk Doctor.
C) Using the converter in Hesmon, find the decimal equivalent to
4C 2A C0. In a clear work space type <$ 004C>. The decimal
value 76 will be returned. The same procedure for 002A and
00C0 will return 42 and 192 respectively. Power down and
remove Hesmon. From the Utility Disk, load Disk Doctor and
again insert the backup into the drive. At Track 18/Sector 1,
position 34, you'll find the Prg byte for the GM1 file. Place
the cursor on the Track pointer at position 35 and press j to
Jump to Link. You'll be taken to Track 17, Sector 1. Starting
at position 0 cursor along and look for the hex bytes 20 00
C8 (JSR C800) pattern. At position 34 you'll find the first
byte of that pattern. Use the @ key to change three bytes
starting at position 34 to 76, 42, 192 (decimal equivalent).
Hit the r key to rewrite the sector and then y for yes. Your
title is now free from all protection and may even be file
copied if desired.
INTRO : PROTECTION SCHEME TYPE G
Most computer software houses utilize some form of "copy
protection" that prevents the average consumer from making backup
copies of the program(s) that the company distributes. Even the
K.J. REVEALED TRILOGY PAGE [74] (C)1990 K.J.P.B.
<<previous page -
next page>>