Unveiling the Pirate Part 1
This was a three part article from ‘The Transactor’ in 1984
This is a very interesting article about copy protection.
It lists the five methods commonly used to protect software as:
l – Diskette protection
2 – Dongle Protection
3 – ROM Protection
4 – Program In ROM Pack
5 – No Protection
DOWNLOAD the four page PDF here: Unveiling-Part1
Program Piracy and Personal Ethics by Jim Butterfield
This is from TPUG magazine in 1984.
A number of isolated thoughts relating to piracy, copyright, legality and ethics.
I try not to sound as if I’m preaching on the subject of program piracy.
If a school student rips off a program that is sold commercially, it won’t cause me to
lose any sleep. But maybe it should cause him or her to lose a little sleep.
If someone steals a program and then feels rather tacky about it, that seems to
me to be an appropriate state of mind. With thousands of free programs
available, why liit one in the first place? But here’s what baffles me: I can’t
understand the types who steal programs and then seem to think that the theft
makes them the smartest people on earth. That’s smart?
It can be interesting and educational to look into protection mechanisms to see
how the trick is done. The area doesn’t interest me personally, but one can look
into inner workings of computers and disk systems, and learn things about their
mechanisms and logic. If someone tells me,”Hey … I figured out how Galactic
Zappers does their protection system”, I’m likely to reply, “Good detective work:
I bet you had fun doing it”.
If the same person tells me that a backup was produced, I’m still not too
worried. But when I hear about copies made for friends and relatives, I tend to
lose interest in the conversation and move away. ‘the annoying thing is that
such people seem to be expecting congratulations for performing an action to
help mankind. They see themselves as Robin Hood.
Here is an interesting article about game piracy and Mastertronics.
Quote: Mastertronic shouldn’t be troubled by piracy – the cost is so low that there is no incentive to wait for a pirate copy.
This is a short article about choosing a copy program.
Here is a short article about which copy program can copy it’s self. I’ve said it before I always judge copy programs this way BITD. I figure if the program can not even copy it’s self, then it can’t be that good.
Memory Dumpers for the C-64 is from a 1986 issue of AHOY magazine and is an interesting article to read. It covers the ISEPIC, SNAPSHOT 64 and CAPTURE