This was an interest article found in TPUG magazine. Which stood for the Toronto PET User Group. I don’t know how many issues there were, but I have 25 issues from Feb 1984 to Aug-Sept 1986.
Unveiling the Pirate Part 3
This is part #3 in this article from The Transactor in 1984.
The Legal Issue:
Copyrights and how they apply to you
Legal Avenues to Take
DOWNLOAD the PDF here: Unveiling-Part3
Unveiling the Pirate Part 2
This is part #2 in this article from The Transactor in 1984.
This article is about the new and improved ways to add confusion and pain to the lives of pirates everywhere.
DOWNLOAD this PDF here: Unveiling-Part2
Auto check for Protection: CHRGET
USR Function Jump
Hardware Interrupt Vector
Break Interrupt Vector
NMI Interrupt Vector
Test STOP Vector
Many many more
Unveiling the Pirate Part 1
This was a three part article from ‘The Transactor’ in 1984
This is a very interesting article about copy protection.
It lists the five methods commonly used to protect software as:
l – Diskette protection
2 – Dongle Protection
3 – ROM Protection
4 – Program In ROM Pack
5 – No Protection
DOWNLOAD the four page PDF here: Unveiling-Part1
Program Piracy and Personal Ethics by Jim Butterfield
This is from TPUG magazine in 1984.
A number of isolated thoughts relating to piracy, copyright, legality and ethics.
I try not to sound as if I’m preaching on the subject of program piracy.
If a school student rips off a program that is sold commercially, it won’t cause me to
lose any sleep. But maybe it should cause him or her to lose a little sleep.
If someone steals a program and then feels rather tacky about it, that seems to
me to be an appropriate state of mind. With thousands of free programs
available, why liit one in the first place? But here’s what baffles me: I can’t
understand the types who steal programs and then seem to think that the theft
makes them the smartest people on earth. That’s smart?
It can be interesting and educational to look into protection mechanisms to see
how the trick is done. The area doesn’t interest me personally, but one can look
into inner workings of computers and disk systems, and learn things about their
mechanisms and logic. If someone tells me,”Hey … I figured out how Galactic
Zappers does their protection system”, I’m likely to reply, “Good detective work:
I bet you had fun doing it”.
If the same person tells me that a backup was produced, I’m still not too
worried. But when I hear about copies made for friends and relatives, I tend to
lose interest in the conversation and move away. ‘the annoying thing is that
such people seem to be expecting congratulations for performing an action to
help mankind. They see themselves as Robin Hood.