Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
2Activity
0 of .
Results for:
No results containing your search query
P. 1
Atari Software Protection Techniques

Atari Software Protection Techniques

Ratings: (0)|Views: 45 |Likes:
Published by Blackshadow Man

More info:

Published by: Blackshadow Man on Aug 04, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

06/01/2012

pdf

text

original

 
A T A R I
S O F T W A R EP R O T E C T I O N T E C H N I Q U E S
b y
G e o r g e
M o r r i s o n
F o r w a r d
b y
E d
S t e w a r t
( A u t h o r
o f
L e t t e r m a n )
A N
A L P H A
S Y S T E M S
P R O D U C T
 
SOFTWARE
PROTECTION TECHNIQUES
DISK
UTILITIES
(C)
COPYWRITE
1983
FROM
ALPHA
SYSTEMS
ATARI
is
a
registered
trademark
of
Atari,
Inc.Atari
Software
Protections
Techinques
Disk
Utilities
is
a
utility
package
designed
for
use
by
software
writers
to help
protect
your
software
from,
illegal
copying.
The
theory
is
described
in
the
book
(Atari
Software
Protection
Techniques)
that
is
included
in
this
package,
but
this
disk
utility
shouldhelp
even
the
beginner
use
some
of
the
methods
described.
A
menu
of
options will automatically
appear
on
your
screen
when
thedisk
is
loaded(with
the
BASIC
cartridge
in),
or
just
type
RUN
"D:MENU"
from
BASIC.
Each
of the
utilities
and
options
contain
instructions
which
appear
on
the
screen
when
the
program
is
run.
For
your
convenience,
most
of
the
programs
are
listable,
and
are
well
documented
to help
you
understand
them.
I
suggest
you LIST
or
RUN
each one
to
see
the
instructions,
but type
NO
when
asked
~f
you
wish
toexecute the
program.
Also
all
the
program
listings
from
the
book
are
contained
on
this
disk.
Forexample,
Figure
4.4
from
the
booJ{
is
called
"FIG44"
on
the
disk.
The
following information
will help
you
better
understand
some
of
the
programs
on
the disk
Directory
Hider
(called
H~DER
on
the
disk)
The
directory
Hider
is
used
tohelp prevent
DOS
copies.
It
is
especially
useful
for
menu
driven
programs,
or
programs
whichmust
epe-A
files
or
run
other
programs
from
the
disk.
The
Directory
Hider
hides
your
disk
directory
in
a
new
locatTonon
the
disk.
Your
programs
will
automatically
use
the
hidden
directory
(because
this
program
changes
DOS
to point
to
it).
But
others
trying
to
copy
your programs
will
see
707
free sectors.
WARNING
-
Make
a
back-up
of
the
disk
you
wish
to
protect
before
running
this
program.
SETSCAN -
Th
i s
program
wi
11
scan
the
sec
tors
on
the
di
s~{
for
bad
or
misassigned
sectors.
It
asks
for
the
starting
and
ending
sectors
you
wish
to
scan,
and
then
displays
a
message
for
each
sector.
SECTLOOK
-
This
displays
the
contents
of
a
sector
in
character
format.
Just
enter
the
sector
you
wish
to
read,
and
it
will
be
displayed
on
the
screen.
VTOCER
-
This
program
has
two
parts.
Option
One
shows
you
which
sectors
on
the
disk
are
used
andwhich
are
free
(accordingto
the
VTOC)
Option
Two
is
used
to
reserve
space
on
a
disk
for
a
hidden
directory.
As
indicated
in
the
book,
the
directory
should
be
hidden
in
a
certain
range of
sectors. If
HIDER
can/t
find
thespaceto hide
your
directory,
a
message
will
be
displayed
telling
you
to
run
this
program.
Complete
instructions
are
displayed
on
the
screen.
BADWRITE
-
This
program
enables
you
to
protect
your
disKs
with
bad-sectoring.
The
methods
used
to
have
your program
checK'
for
the
bad
sectors
are
explained
in
the
book.
This
utility
lets
you
create
bad
sectors
on
your
disk.
There
are
two
simple
ways
to
create
a
bad
sector
on
a
disk using
only
standard
hardware.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->