457 lines
20 KiB
Plaintext
457 lines
20 KiB
Plaintext
![]() |
|
|||
|
PIRACY BY TEACHERS??
|
|||
|
|
|||
|
I was shocked that after watching a stupid Video Tape
|
|||
|
critisizing and Stating how stupid Hackers and Pirates are (Which is
|
|||
|
not true of course), that the school is using pirated software? Yes,
|
|||
|
that's right, If you will notice the next time you use Print shop in
|
|||
|
the computer room, that it says "Cracked By Mr. Krackman." So I've
|
|||
|
decided to start a column on unprotecting IBM programs... To start it
|
|||
|
off, here's one for News Room and Kings Quest III.
|
|||
|
|
|||
|
|
|||
|
The following debug session will alow you to copy the Newsroom files to any
|
|||
|
disk and run them from that disk.
|
|||
|
However, the Newroom program will still want you to enter the clip-art disks
|
|||
|
in drive A: and any banner, panel, or wire service disks in will also have to
|
|||
|
be put in drive A:.
|
|||
|
None of the disks need any copy protection, so therefore can be copied from
|
|||
|
disk to disk and still be run.
|
|||
|
|
|||
|
Just follow the instructions carefully.
|
|||
|
|
|||
|
First copy all the Newsroom files on to a clean disk.
|
|||
|
Also copy the Debug program on to the same disk.
|
|||
|
|
|||
|
RENAME NWSRM.EXE 1
|
|||
|
DEBUG 1
|
|||
|
-E 691A EB 41
|
|||
|
-E 6973 90 90
|
|||
|
-E 6977 EB 25 90
|
|||
|
-
|
|||
|
{THE FOLLOWING PORTION IS TELLING THE NEWSROOM DISK WHERE TO FIND CERTAIN FILES
|
|||
|
SUCH AS LOGO.PIC, NRTITLE.PIC, NRSETUP, ALONG WITH ALL THE PRINTER AND MODEM
|
|||
|
CONFIG TABLES.}
|
|||
|
|
|||
|
AT THE FOLLOWING LOCATIONS ENTER THE APPROPRIATE HEX VALUE:
|
|||
|
FOR DRIVE A: 41
|
|||
|
FOR DRIVE B: 42
|
|||
|
FOR DRIVE C: 43
|
|||
|
FOR DRIVE D: 44
|
|||
|
|
|||
|
-E 8F4B XX
|
|||
|
-E 92D2 XX
|
|||
|
-E 9316 XX
|
|||
|
-E 9349 XX
|
|||
|
-E 9354 XX
|
|||
|
-E 9B59 XX
|
|||
|
-E 9B66 XX
|
|||
|
-E 9B73 XX
|
|||
|
-E 9B8F XX
|
|||
|
-E 9BA5 XX
|
|||
|
-E 9CD4 XX
|
|||
|
-E 9D9D XX
|
|||
|
-E 9DAA XX
|
|||
|
-E 9DB7 XX
|
|||
|
-E 9DCE XX
|
|||
|
WHERE XX = THE DRIVE NUMBER DESIGNATED ABOVE
|
|||
|
|
|||
|
-W
|
|||
|
-Q
|
|||
|
|
|||
|
RENAME 1 NWSRM.EXE
|
|||
|
|
|||
|
DEBUG NWSRM1.OVL
|
|||
|
-E 05DB 8B 46 04 89 46 FE 3B 46 04
|
|||
|
-W
|
|||
|
-Q
|
|||
|
|
|||
|
DEBUG NWSRM22.OVL
|
|||
|
-E 10C6 B8 05 43
|
|||
|
-W
|
|||
|
-Q
|
|||
|
|
|||
|
That's all there is to it. Now just copy it over to any disk you want and
|
|||
|
run it from there. Just remember that it is going to look for certain files
|
|||
|
on the drive that you told it before in the debug session.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
NPROTECTING KINGS QUEST III - IBM PC VERSION
|
|||
|
---------------------------------------------
|
|||
|
|
|||
|
To unprotect Kings Quest III, you will need a DOS disk with DEBUG.COM,
|
|||
|
the original master diskette 1, a freshly formatted diskette, and
|
|||
|
about 15 minutes.
|
|||
|
|
|||
|
Boot the system with a standard DOS disk and answer the date and time
|
|||
|
prompts. Place the Kings Quest disk in the A drive and the DOS disk
|
|||
|
with DEBUG in the B drive. Enter the following lines, explanations and
|
|||
|
non key strokes are shown in parenthesis.
|
|||
|
|
|||
|
A>B:DEBUG SIERRA.COM
|
|||
|
-G100,3E4 (during this time the KQ disk will run,
|
|||
|
you will be prompted to press ENTER twice)
|
|||
|
(remove the KQ disk and place the freshly formatted diskette in the A drive)
|
|||
|
-A100
|
|||
|
xxxx:0100 JMP F10
|
|||
|
xxxx:0102 (just press ENTER here)
|
|||
|
-AF10
|
|||
|
xxxx:0F10 MOV AX,CS
|
|||
|
xxxx:0F12 MOV DS,AX
|
|||
|
xxxx:0F14 MOV ES,AX
|
|||
|
xxxx:0F16 MOV SS,AX
|
|||
|
xxxx:0F18 MOV SP,2C1
|
|||
|
xxxx:0F1B MOV BX,9E
|
|||
|
xxxx:0F1E MOV AH,4A
|
|||
|
xxxx:0F20 INT 21
|
|||
|
xxxx:0F22 MOV AX,1C0D
|
|||
|
xxxx:0F25 MOV BX,70
|
|||
|
xxxx:0F28 MOV CX,1
|
|||
|
xxxx:0F2B MOV DX,1A00
|
|||
|
xxxx:0F2E MOV BP,0
|
|||
|
xxxx:0F31 MOV SI,636
|
|||
|
xxxx:0F34 MOV DI,1C1
|
|||
|
xxxx:0F37 JMP 3E4
|
|||
|
xxxx:0F3A (just press ENTER here)
|
|||
|
-RCX
|
|||
|
0001:0E3A
|
|||
|
-W
|
|||
|
0E3A Bytes Written
|
|||
|
-Q
|
|||
|
A>
|
|||
|
|
|||
|
(Place the original KQ disk in the B drive and enter the following.
|
|||
|
|
|||
|
COPY B:AGI
|
|||
|
COPY B:*.OVL
|
|||
|
COPY B:WORD.TOK
|
|||
|
COPY B:OBJECT
|
|||
|
COPY B:LOGDIR
|
|||
|
COPY B:SNDDIR
|
|||
|
COPY B:VIEWDIR
|
|||
|
COPY B:PICDIR
|
|||
|
COPY B:VOL.*
|
|||
|
|
|||
|
(Have fun! KQ should also be able to be used on a hard drive with this
|
|||
|
procedure, but hasn't been tried.)
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
Here's a little Tutorial on how to Crack games..
|
|||
|
|
|||
|
+------------------------------------------------------------------------------+
|
|||
|
| |
|
|||
|
| Cracking Tutorial 1 |
|
|||
|
| By Captain Quazmo |
|
|||
|
| (INT 13 and DOS files) |
|
|||
|
+------------------------------------------------------------------------------+
|
|||
|
This is a Tutorial on Cracking. Let's start out with a simple defintion
|
|||
|
for the word "CRACKING". Cracking is the art or STRIPPING the protection off a
|
|||
|
disk or file. Thus allowing that program to run on a Hard Disk or be copied
|
|||
|
freely. In the case of a whole disk, the disk must be decoded and converted
|
|||
|
into a file. This process is rather hard to do so I will discuss it in
|
|||
|
ter Tutorial.
|
|||
|
In this tutorial, I will explain how to beat the "INT13 Protection".
|
|||
|
this routine is used on most disks today. In this tutorial I will make
|
|||
|
refrence to these programs
|
|||
|
|
|||
|
LOCKSMITH - Aplha Logic
|
|||
|
PCWATCH - IBM
|
|||
|
FSD - IBM
|
|||
|
|
|||
|
You can use these programs or any others that
|
|||
|
do the same things. DiskMechanic will work in place of Locksmith (used for
|
|||
|
analyss of Track information.) TRAP13 will replace PCWATCH (to find where
|
|||
|
the program access INT 13h), and dos's DEBUG will surfice for FSD. Please
|
|||
|
remember that if you use DEBUG on and ".EXE" file, you will first need to
|
|||
|
rename it "filename.ZAP" and when in debug, all address are +100h.
|
|||
|
In this tutorial, We will go thru and crack "The Ancient Art of War".
|
|||
|
we will start by analyzing the disk with Locksmith and End of Changeing it with
|
|||
|
DEBUG (if you are asking why I am using debug, when I cracked it I didn't have
|
|||
|
FD.)
|
|||
|
The first thing we will do is analyze the disk with LOCKSMITH. We search
|
|||
|
both sides of the disk using the "Analyze" command in the track menu. We mark
|
|||
|
down the sector that have high SECTOR NUMBERING, WRONG N SIZE, or CRC ERRORS.
|
|||
|
Make carefull note of these numbers for we will need them in the future.
|
|||
|
Now Exit Locksmith and Enter PCwatch. EXCLUDE everything in window #1 execpt
|
|||
|
"CARRY FLAG SET", INCLUDE [F1] this. Go over to window #3 and hit PgDn until
|
|||
|
you see the INT13 options. INCLUDE "READ SECTOR". In window #2 tell it to
|
|||
|
output to printer. Now exit the program [F4]. Place the AAOW (ancient art of
|
|||
|
war) disk in drive A:. Type "A>WAR". The Game will load but slowly and the
|
|||
|
printer will run. When the game is loaded replace the AAOW disk with DOS and
|
|||
|
reboot. Take the listing and examine it. Forget about any call from
|
|||
|
[0070:xxxx] for these are used to load in the program.
|
|||
|
Now make a copy of you war disk using DISKCOPY or LOCKSMITH sector copy.
|
|||
|
This will be out work cpy. Debug the main program on the disk [WAR.EXE].
|
|||
|
Examine the listing from PCWATCH. Find the First address [nnnn:XXXX] besides
|
|||
|
[0070:xxxx]. In AAOW it is or rather should be [nnnn:8BDA]. unassemble [U]
|
|||
|
10 bytes back [U 8BAA]. This allows us to see the int13. The next instruction
|
|||
|
after the CD 13 [INT 13h] should either be a CMP or a JMP of some sort. In
|
|||
|
most protection routines usually have a JC or JB after their INT13.
|
|||
|
You must decide now what is needed to be done here according to the jumps
|
|||
|
seen. If a JC or JB follow INT13 then try this. Replace INT13 (2 bytes CD 13)
|
|||
|
with STC & NOP. These 2 command SET the CARRY Flag. If the program Doesn't
|
|||
|
rechange "STC" to "CLC". The CLC is one of the most used ways to get around
|
|||
|
INT13 protection. AAOW uses "CLC". It goes out and looks for a Sector. If
|
|||
|
it is not found then it has an Error. The CLC hardwires the Error. Write
|
|||
|
the file out again.
|
|||
|
You have now cracked your first program (with a little HELP.) You can
|
|||
|
use this techinque on st DOS files. Please remember, after you crack
|
|||
|
something, leave the UNPROTECT on your local board so other can use them.
|
|||
|
----------------------------------------------------------------------
|
|||
|
Captain Quazmo....Leader of the AT&T Underground..............
|
|||
|
----------------------------------------------------------------------
|
|||
|
Here's an underground Newspaper on Kracking...
|
|||
|
|
|||
|
+----------------------------------------------------------------------------+
|
|||
|
| |
|
|||
|
| KRACK |
|
|||
|
| April 1986 |
|
|||
|
| Volume 1 Number 1 |
|
|||
|
| |
|
|||
|
+----------------------------------------------------------------------------+
|
|||
|
|
|||
|
You are reading KRAK, the official Kracking Textfile. This file is put
|
|||
|
out by the Cellar Elite. Captain Quazmo is the Head editor.
|
|||
|
If you wish to submit articals to KRACK just upload a Text file in IBM
|
|||
|
PC format to one of the official KRACK boards. Krack is for all type of
|
|||
|
computers. Apple and C/64-128 users let's get going.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
+----------------------------------------------------------------------------+
|
|||
|
| |
|
|||
|
| Cracking NewsRoom |
|
|||
|
| IBM-PC format |
|
|||
|
| |
|
|||
|
| Captain Quazmo |
|
|||
|
| |
|
|||
|
+----------------------------------------------------------------------------+
|
|||
|
There are a couple of unprotects going around for this piece of software.
|
|||
|
This one is rather short but others make you change 51 other bytes that seem
|
|||
|
to be unneeded. You will need DEBUG for you dos diskette and a Copy (doesn't
|
|||
|
matter if it works) of NewsRoom.
|
|||
|
|
|||
|
At Dos: A> Ren nwsrm.exe nwsrm.zap
|
|||
|
A> Debug nwsrm.zap
|
|||
|
-E 691A EB 41
|
|||
|
-E 6973 90 90
|
|||
|
-E 6977 EB 25 90
|
|||
|
-W
|
|||
|
-Q
|
|||
|
A> Ren nwsrm.zap nwsrm.exe
|
|||
|
A> Debug nwsrm1.ovl
|
|||
|
-E 05db 8B 46 04 89 46 FE 3B 46 04
|
|||
|
-W
|
|||
|
-Q
|
|||
|
A> Debug nwsrm22.ovl
|
|||
|
-10C6 B8 05 43
|
|||
|
-W
|
|||
|
-Q
|
|||
|
|
|||
|
You now have a working copy of newsroom. The only not is that all file
|
|||
|
most reside on drive A:. Assign can be use to allow this program to work
|
|||
|
on a hard drive.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
+----------------------------------------------------------------------------+
|
|||
|
| |
|
|||
|
| Defeating Prolock |
|
|||
|
| from the Locksmith Procedures manual |
|
|||
|
| |
|
|||
|
+----------------------------------------------------------------------------+
|
|||
|
You will need: Dos DEBUG
|
|||
|
A formatted Blank diskette
|
|||
|
A non working copy of the program
|
|||
|
|
|||
|
This tutorial show how defeat prolock on dBASE III but can be used for most
|
|||
|
prolocked disks.
|
|||
|
|
|||
|
A> Debug DBASE.exe
|
|||
|
-R
|
|||
|
|
|||
|
You will now see whats in the registers. Record the values
|
|||
|
-U
|
|||
|
-U
|
|||
|
|
|||
|
Look for a LOOP instruction. The next instruction will be a XCHG.
|
|||
|
Using the Address in the first column [091B:XXXX 92 XCHG DX,AX]
|
|||
|
enter -G XXXX
|
|||
|
-S 100 3000 83 c4 08
|
|||
|
|
|||
|
Some address will be listed. Take the last address 091b:XXXX and
|
|||
|
-A XXXX
|
|||
|
XOR AX,AX
|
|||
|
RET
|
|||
|
Press Return twice until the "-" prompt. enter
|
|||
|
-S 100 3000 C0 45 F8
|
|||
|
This will display a single value [091B:XXXX]. use it and enter
|
|||
|
-E XXXX 0B 46
|
|||
|
-M 0:c f 0:200
|
|||
|
Prolock will test for the original diskette enter
|
|||
|
-R BX
|
|||
|
0001
|
|||
|
-R CX
|
|||
|
When prompted enter the original value of CX
|
|||
|
-N TEMP
|
|||
|
-S 100 3000 4D 5A
|
|||
|
Several values will be displayed. Remove the program disk and
|
|||
|
insert the black disk and type
|
|||
|
-W 1A50
|
|||
|
-Q
|
|||
|
A> Ren temp dbase.exe
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
+----------------------------------------------------------------------------+
|
|||
|
| |
|
|||
|
| LockSmith Instructions |
|
|||
|
| IBMpc Format |
|
|||
|
| |
|
|||
|
+----------------------------------------------------------------------------+
|
|||
|
Locksmith is in my oppion the BEST copy program for the IBMpc. Using
|
|||
|
Special Parameters Locksmith can copy almost anything. I hope to explain to
|
|||
|
all you PC Pirates how to use this great program. This is first in a 2 part
|
|||
|
series on the use of locksmith.
|
|||
|
|
|||
|
|
|||
|
LOCKSMITH MAIN SCREEN
|
|||
|
|
|||
|
Status Line Drives: A: > B:
|
|||
|
DRIVE TRACK SECTOR OPTIONS MISC QUIT Locksmith/PC Ver. 0.0
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
|||
|
TRACK: 0000000000000001111111111111112222222222 <20> Sector: 00 <20>
|
|||
|
123456789ABCDEF012345678ABCDEF0123456789 <20> T H S N Stat % <20>
|
|||
|
Head 0: ................Window #1............... <20> <20>
|
|||
|
Head 1: ........................................ <20> 00 0 1 2 0000 09 <20>
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ĵ 00 0 2 2 0000 09 <20>
|
|||
|
[0000] 0 1 2 3 4 5 6 7 8 9 A B C D E F<> 00 0 3 2 0000 11 <20>
|
|||
|
0000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<30> 00 0 4 2 0000 -11 <20>
|
|||
|
0010 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<30> 00 0 5 2 0000 12 <20>
|
|||
|
0020 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<30> 00 0 6 2 0000 14 <20>
|
|||
|
0030 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<30> 00 0 7 2 0000 00 <20>
|
|||
|
0040 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<30> 00 0 8 2 0000 -02 <20>
|
|||
|
0050 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<30> 00 0 9 2 0000 11 <20>
|
|||
|
0060 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<30> 00 0 A 2 0000 29 <20>
|
|||
|
0070 W i n d o w # 3 <20> <20>
|
|||
|
0080 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<30> <20>
|
|||
|
0090 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<30> <20>
|
|||
|
00A0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<30> <20>
|
|||
|
00B0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<30> <20>
|
|||
|
00C0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<30> Window #2 <20>
|
|||
|
00D0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<30> <20>
|
|||
|
00E0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<30> <20>
|
|||
|
00F0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<30> <20>
|
|||
|
|
|||
|
|
|||
|
Status Line - This line show all messages from Locksmith. I give discriptions
|
|||
|
In the main and secondary menu modes.
|
|||
|
|
|||
|
Drives: A: > B: - The first letter [A:] is the Source drive and the second
|
|||
|
letter is the Target drive
|
|||
|
|
|||
|
Drive - Change Drive information
|
|||
|
Letter - Change the Source & Target drives
|
|||
|
Controller - Change the FDC control codes
|
|||
|
|
|||
|
Track - Track Utilitys
|
|||
|
Analyze - Analyze the selected track showing their N value and
|
|||
|
any Errors.
|
|||
|
Backup - Copy selected track from Source to Target drives
|
|||
|
Format - Format selected track in Regular/IrRegular formats
|
|||
|
Erase - Erase selected track to the Fill Byte
|
|||
|
Hidden - Search for irregular sector sizes and number
|
|||
|
Read - Read in a selected track
|
|||
|
Write - Write out a selected track
|
|||
|
Compare - Compare tracks with information in BUFFER
|
|||
|
Print - Print out Track Buffer
|
|||
|
|
|||
|
Secoter - Sector Utilitys
|
|||
|
Backup - Fast copy [35 sec.]
|
|||
|
Read - Read in sectors
|
|||
|
Write - Write out sectors
|
|||
|
Compare - Compare sectors with memory
|
|||
|
|
|||
|
Options - Set up Locksmith's parameters
|
|||
|
|
|||
|
Misc - Misc. Functions
|
|||
|
Reset - Reset all information to Default
|
|||
|
PrintSetup - Redefine the print tables
|
|||
|
Search - Define a string to Search for
|
|||
|
|
|||
|
Quit - Quit to DOS [A>]
|
|||
|
|
|||
|
|
|||
|
Window #1: Current Track Window. This window is used for selecting what
|
|||
|
Tracks are to be used. To get to this window press the [F1] key.
|
|||
|
If a number (Track) has a "." under it then it is to be used.
|
|||
|
The SPACEBAR is used to toggle a single Track. The "+" key is
|
|||
|
used to toggle the whole side of a disk. Left and Right Arrows
|
|||
|
keys are used to move the cursor.
|
|||
|
|
|||
|
Window #2: This is the Sector window. Here you will find the Size (N) and
|
|||
|
the Error in the sector if any and the percent of the track taken up
|
|||
|
by that sector. By examine the sector's number you can find out how
|
|||
|
how the sectors are really numbered because some protection schemes
|
|||
|
use abnormal sector numbering. HOME will take you to the top of the
|
|||
|
screen to the Number of sectors [SECTORS: 00] prompt. This is used
|
|||
|
in creating your own protection schemes which will be explained in
|
|||
|
the next issue of KRACK: [F2] get this window
|
|||
|
|
|||
|
Window #3: The data window can be used to examine, edit and create data to
|
|||
|
be written out to the disk. So protection schemes need certain
|
|||
|
bytes to be changed. [F3] get you here while [F9] toggle Ascii/Hex
|
|||
|
display. If a search string has been entered then [F10] will start
|
|||
|
the search.
|
|||
|
|
|||
|
Copying something with locksmith is pretty easy. If the disk is unprotected
|
|||
|
then use the BACKUP in the SECTOR utilitys. If the disk is protected then
|
|||
|
you must use the BACKUP in the TRACK utilitys. The best way to copy a
|
|||
|
protected diskette is the first to Slow Copy the whole disk [TRACK utilitys]
|
|||
|
then write down any odd tracks (more sectors than the other errors etc.).
|
|||
|
Use Fast copy [SECTOR utilitys] to copy similar track then use Slow copy to
|
|||
|
copy the Fuckup tracks.
|
|||
|
|
|||
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-LockSmith Parameters-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
|
|||
|
Lotus 123: Slow Copy Side 0 tracks 3,7 and Side 1 track 4. Fast copy the rest
|
|||
|
Harvard Project Manager v 1.1: Fast Copy all track the Analyze side 1 track 1A
|
|||
|
Edit buffer and change address 0F46 to 01
|
|||
|
Office Writer: Fast copy all track. Copy tracks 28,29 both sides
|
|||
|
Super Cala: Fast Copy all Tracks
|
|||
|
Infocom: Slow copy all tracks
|
|||
|
WordStar 2000: Fast copy all tracks
|
|||
|
XYWrite II: Fast copy all tracks
|
|||
|
|
|||
|
|
|||
|
+----------------------------------------------------------------------------+
|
|||
|
| |
|
|||
|
| Official KRACK Boards |
|
|||
|
| |
|
|||
|
+----------------------------------------------------------------------------+
|
|||
|
Do you want your board to be an official Krack board. Just leave a message
|
|||
|
on one of the current Krack Boards.
|
|||
|
|
|||
|
Spectrum 007 [24 hours]........................................[914]-338-8837
|
|||
|
Outer Limit [24 hours]........................................[914]-462-0363
|
|||
|
Thief World [Midnight-6am]....................................[914]-462-2256
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Cap' Quazmo
|
|||
|
|
|||
|
P.S. Call Ninja's Palace (914)297-0334
|
|||
|
300/1200 baud
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
-By Underground #2
|
|||
|
|