CSM_Program_Protection_Manual_Volume_II.pdf

(33115 KB) Pobierz
PROGRAM PROTECTION MANUAL
FOR THE C - 64
VOLUME II
COPYRIGHT 1985
BY CSM SOFTWARE, INC.
ALL RIGHTS RESERVED
CSM SOFTWARE, INC.
P.O. BOX 563
CROWN POINT, IN
INTRODUCTION
expertise. We only expect that the reader ha$ read
and
become
familiar with the
information presented
in
the
PROGRAM
PROTECTION MANUAL FOR THE C-64 (VOLUME I).
program protection.
This manual is designed for the computer user or programmer who
has some background in programming,
machine language and
We are not going to assume a hijgh level
of
back to it for information when needed.
purposes
The best way to get the most out of this book is to keep the
PROGRAM PROTECTION MANUAL FOR THE C-64 (VOLUME I) handy for
reference.
One cannot be expected to remember!
all
the
techniques described in the first manual, so feel firee to refer
The information
only.
the near future, they've done it before.
original and contain code ts-imilar to that in actual use.
Don't
be surprised if you see some programmers using our routines in
The
presented
routines
herein
featured
will
be
in
this
for
illustrative
manual
are
The first few chapters are a
these chapters seems familiar, that's because it is mainly from
the first manual on program protection. Please take the time to
re-read this information.
It is very important!
aspects of computer software.
review
If the information
of
some
very
contained
important
in
The rest of the manual contains all new information,
presented
in a logical manner. Read this book from front to back,
first
chapter to last. The information presented in the earlier
chapters is used as building blocks for the later chapters.
Take your time when reading the chapters,
try to understand
each and eyery concept before going on. It has
aken months to
compile the information contained in this manua so don't feel
bad if you don't understand all of it the first time through.
We have called upon many different experts to help us write
this manual. We would like to give special cred t to these fine
folks for all their help. Without their help tn s manual
could
not have been written.
MANUAL - YOU FOLKS DID A GREAT JOB!!
THANKS TO THE FOLLOWING PEOPLE FOR CONi .JBUTING TO THIS
£ JOHNSON
. j. MYERS
BILL MELLON
CAYE GIRGENTI
PHILIP SLAYMAKER
MIKE POWERS
T.
wnting
this.
N.
SIMSTAD
P.S. Thanks to my wife and kids for putting up
with
me
while
COPYRIGHT NOTICE
COPYRIGHT 1985 (C) BY CSM SOFTWARE INC
ALL RIGHTS RESERVED
PROGRAM PROTECTION MANUAL FOR THE C-64 VOLUME II
This manual and the computer programs on the accompanying floppy disks, which are
described by this manual, are copyrighted and contain proprietary information
belonging to CSM SOFTWARE INC.
No one may give or sell copies of this manual or the accompanying disks or of the
listings of the programs on the disks to any person or institution, except as
provided for by the written agreement with CSM SOFTWARE INC.
No one may copy, photocopy, reproduce, translate this manual or reduce it to
machine readable form, in whole or in part, without the prior written consent of
CSM SOFTWARE INC.
WARRANTY AND LIABILITY
Neither CSM SOFTWARE INC., nor any dealer or distributor makes any warranty,
express or implied, with respect to this manual, the disk or any related item,
their quality, performance, merchantability, or fitness for any purpose. It is
the responsibility solely of the purchaser to determine the suitability of these
products for any purpose.
In no case will CSM SOFTWARE INC. be held liable for direct, indirect or
incidential damages resulting from any defect or omission in the manual, the disk
or other related items and processes, including, but not limited to, any
interruption of service, loss of business, anticipated profit, or other
consequential damages.
THIS STATEMENT OF LIMITED LIABILITY IS IN LIEU OF ALL OTHER WARRANTIES, EXPRESS
OR IMPLIED, INCLUDING WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE. CSM SOFTWARE INC. will not assume any other warranty or liability. Nor
do they authorize any other person to assume any other warranty or liability for
them, in connection with the sale of their products.
UPDATES AND REVISIONS
CSM SOFTWARE INC. reserves the right to correct and/or improve this manual and
the related disk at any time without notice and without responsibility to provide
these changes to prior purchasers of the program.
IMPORTANT NOTICE
THIS PRODUCT IS SOLD SOLELY FOR THE ENTERTAINMENT AND EDUCATION OF THE PURCHASER.
IT IS ILLEGAL TO SELL OR DISTRIBUTE COPIES OF COPYRIGHTED PROGRAMS. THIS PRODUCT
DOES NOT CONDONE SOFTWARE PIRACY NOR DOES IT CONDONE ANY OTHER ILLEGAL ACT.
11
TABLE
OF
CONTENTS
1).
2).
3).
4).
SOFTWARE LAW
ARCHIVAL COPIES
COPY PROTECTION
EVOLUTION OF COPY
1
5
PROTECTION
8
11
6).
5).
THE FUTURE OF COPY PROTECTION
AUTOBOOTS
INTERRUPTS AND RESETS
COMPILERS
UNDOCUMENTED OPCODES
ENCRYPTION TECHNIQUES
PROGRAMMING EPROMS
GCR RECORDING
READING GCR
6510 AND THE
PLA
INTRODUCTION TO MACHINE LANGUAGE
.
17
19
35
46
61
71
78
88
103
93
7).
8).
9).
10).
11).
12).
13).
14).
15).
16).
WORKING INSIDE THE DISK DRIVE
STANDARD TRACK FORMAT
CUSTOM DOS ROUTINES
CARTRIDGES - EASY
ADVANCED CARTRIDGES
DECRYPTION
THE BACKDOOR APPROACH
123
130
135
159
170
181
187
117
17).
18).
19).
20).
21).
22).
23).
24).
THE DOCTOR'S WAY
TRACING PROGRAMS
203
.218
25).
26).
27).
28).
PROTECTING YOUR OWN SOFTWARE
ADVANCED MEMORY THEORY
EPROM/EEPROM PROGRAMMING
DEFINITIONS
(ADVANCED)
233
239
265
273
iii
Zgłoś jeśli naruszono regulamin