PK ‰C–IFDí€ÁÁ& CopyProtectionFacts4am_archive.torrentUT £Ž[X£Ž[Xd8:announce36:http://bt1.archive.org:6969/announce13:announce-listll36:http://bt1.archive.org:6969/announceel36:http://bt2.archive.org:6969/announceee7:comment646:This content hosted at the Internet Archive at https://archive.org/details/CopyProtectionFacts4am Files may have changed, which prevents torrents from downloading correctly or completely; please check for an updated torrent at https://archive.org/download/CopyProtectionFacts4am/CopyProtectionFacts4am_archive.torrent Note: retrieval usually requires a client that supports webseeding (GetRight style). Note: many Internet Archive torrents contain a 'pad file' directory. This directory and the files within it may be erased once retrieval completes. Note: the file CopyProtectionFacts4am_meta.xml contains metadata about this torrent's contents.10:created by15:ia_make_torrent13:creation datei1480985797e4:infod11:collectionsl34:org.archive.CopyProtectionFacts4ame5:filesld5:crc328:bad09f2f6:lengthi8192e3:md532:af6fbabb4a491a284788221f82c87a195:mtime10:14809857954:pathl34:CopyProtectionFacts4am_meta.sqlitee4:sha140:a89d0c29b6f2e22e8d98e94d16a72a0731493550ed5:crc328:0f9256056:lengthi763e3:md532:c1559106e749babc83a3c522631547405:mtime10:14809857874:pathl31:CopyProtectionFacts4am_meta.xmle4:sha140:6784b6e0f59dfa46a551d76c0e0c47ed08eb99eeed5:crc328:bd3c8e5f6:lengthi4517e3:md532:a254c9c7bef5364dae10faff7aa216055:mtime10:14809857924:pathl9:facts.txte4:sha140:7fc980578c1fcb5d01153ef19c6c5b09e9ece90bee4:name22:CopyProtectionFacts4am12:piece lengthi524288e6:pieces20:À6ôºŠû<}íçû‘‰Úò,På.e6:locale2:en5:title22:CopyProtectionFacts4am8:url-listl29:https://archive.org/download/40:http://ia601501.us.archive.org/30/items/40:http://ia801501.us.archive.org/30/items/eePK ‰C–IV’ûû CopyProtectionFacts4am_meta.xmlUT £Ž[X£Ž[X CopyProtectionFacts4am apple_ii_library_4am 2016-12-05 A collection of facts about Apple II copy protection, originally posted to Twitter and collected here for posterity. Internet Archive Python library 0.8.0 apple2 Copy Protection Facts 4am crack 2016-12-06 00:56:11 data a2_4am@sent.com 2016-12-06 00:56:11 softwarelibrary_apple softwarelibrary PK ‰C–Iý£—Ì–– CopyProtectionFacts4am_files.xmlUT £Ž[X£Ž[X c299af26b3d267dbe9d56bfa2599a0191c91025a 1480985797 1729 ddb074dfef7e214244d50dd6e4ee8df0 80ed4446 ebfe04ac9f15ed0a45ce10ccb033c8516e310cb1 Archive BitTorrent Metadata 3ec3a26b1bb319488fd918f9d455394b 1480985795 8192 Metadata af6fbabb4a491a284788221f82c87a19 bad09f2f a89d0c29b6f2e22e8d98e94d16a72a0731493550 1480985787 763 c1559106e749babc83a3c52263154740 0f925605 6784b6e0f59dfa46a551d76c0e0c47ed08eb99ee Metadata 1480985792 4517 Text a254c9c7bef5364dae10faff7aa21605 bd3c8e5f 7fc980578c1fcb5d01153ef19c6c5b09e9ece90b PK ‰C–I_Ž<½¥¥ facts.txtUT £Ž[X£Ž[XThanks for signing up for Copy Protection Facts! You will now receive fun daily facts about COPY PROTECTION! >o< "Math Blaster" and "Ultima IV" share the same copy protection. "Elite" and "Ernie's Quiz" share the same copy protection. "Prince of Persia" has three separate E7 checks, but they all check the same bitstream in track 0 and can be defeated with a 12-byte patch. Later Davidson & Associates disks can be identified by a single corrupted sector on track $22 whose data checksum is $3F instead of 0. Once a floppy drive's motor is off, it always returns the same invalid value. Lady Tut polls it while off and reboots if the value changes! If "Transylvania" fails its protection check, it deletes a vital location from the map and the game is unwinnable. Activision games derive a magic value from the protection check and use it to calculate disk read parameters. The magic value is always $55. To protect against memory capture cards, "Burgertime" checksums all peripherals during boot, then again in-game, and reboots on a mismatch. "Spell It!" and "Autoduel" share the same copy protection. "Impossible Mission II" has an encrypted bootloader. The 64-bit decryption key is part of the uncopyable E7 bitstream on track 0. ProDOS-based Sunburst disks cycle through 4 RWTS variants on boot until one works. Each variant requires a different pattern of timing bits. "Wavy Navy" tries to determine if ROM is writeable, to out-fake hardware modifications that lie about whether ROM or RAM is active at $F800. "Spy's Demise" uses the disk volume number to initialize an unrelated (but critical) index variable in its disk read (POSTNIBBLE) routine. "County Fair" RWTS ignores the RWTS parameter table, loads one sector that overwrites the caller in memory, and returns to a new bootloader. The disk format of "Karateka" is so complicated that Copy II Plus added Karateka-only code to parse it. Karateka's disk read routine intentionally crosses a page boundary, thus requiring every 256th nibble on disk to have an extra bit after it! Karateka for iOS ships with an Apple II emulator and a cracked copy of the original disk because no emulator can handle the copy protection. If "Tycoon" fails its protection check, it will overwrite the boot sector with garbage, rendering the disk unbootable. After a game ends, "Beer Run" does a pointless JSR $0578 (part of the text screen) to an "RTS" instruction left in memory by the bootloader. Sector 0 of "Mr. Do" contains a message from the protection developer, Jim Ratcliff: DON'T WASTE YOUR TIME, ORIGINALS ARE INEXPENSIVE.JCR Sector 0 of my "Mr. Do" crack contains a response: TIME SPENT IN THE SERVICE OF HISTORY IS NEVER WASTED.4AM "Match It!" DOS redefines INIT as a no-op, then calls it on launch. Booting from another disk and launching the game will format your disk. "Deathsword" and "Audubon Grizzly Bears: Wildlife Adventures" share the same copy protection. If "Computer Discovery" fails its protection check, it prints "ERROR CODE 593 -- CALL SRA FOR ASSISTANCE". Pro-tip: do not actually do that. "Microzine 1" used a 34-bit address prologue -- 4 nibbles and 2 unusually placed timing bits -- that made it impervious to bit copiers. Up'N Down sector 1: HELLO THERE THIS IS THE CREATOR OF U&D. THIS SECTOR ON THE DISK IS OF NO VALUE AND THERE IS NO SENSE EVEN LOOKING AT IT. "Classifying Animals with Backbones" DOS decrypts BASIC programs on the fly. Booting another disk and LOADing them will lock up your Apple. "Spanish Grammar Review" contains a track specifically designed to trigger a bad code path in the timing bit detection routine of Copy II+. "The Observatory" has 6 wildly different disk read routines. One of them reads one sector each from 32 consecutive half tracks (not a typo). If "Weather Forecasting" fails its protection check, it says "You are experiencing operating difficulty" in a nice hi-res graphical font. "Gulp and Frenzy" pre-checks if its copy protection would fail on an original, says THE DRIVE YOU ARE USING IS OPERATING AT AN UNSAFE SPEED "Video Title Shop" and "Tomahawk" share the same copy protection. If you modify the self-decrypting protection check in "BC's Quest For Tires," a separate tamper check freezes the game at the title screen. In "Sammy Lightfoot," if you disable the tamper check for the self-decrypting protection check, the game starts but level 1 is unwinnable. Marauder's second tamper check checksums every even byte, to defeat a well known two-byte patch that fooled the first tamper check. PK ‰C–I/ŸÐº " CopyProtectionFacts4am_meta.sqliteUT £Ž[X£Ž[XSQLite format 3@ -æ  ÈäÈ facts.txtputAÖƒ0ŸãÞ facts.txtputAÖƒ-¡vÙ SS‡*Ž3 facts.txtETag: "a254c9c7bef5364dae10faff7aa21605" accept-encoding: identity authorization: LOW DZV5Ajm0NvehstlQ:REDACTED_BY_IA_S3 connection: close content-length: 4517 content-md5: a254c9c7bef5364dae10faff7aa21605 host: s3.us.archive.org x-archive-auto-make-bucket: 1 x-archive-meta00-collection: apple_ii_library_4am x-archive-meta00-date: 2016-12-05 x-archive-meta00-description: uri(A%20collection%20of%20facts%20about%20Apple%20II%20copy%20protection%2C%20originally%20posted%20to%20Twitter%20and%20collected%20here%20for%20posterity.) x-archive-meta00-mediatype: texts x-archive-meta00-scanner: uri(Internet%20Archive%20Python%20library%200.8.0) x-archive-meta00-subject: apple2 x-archive-meta00-title: uri(Copy%20Protection%20Facts) x-archive-meta01-subject: 4am x-archive-meta02-subject: crack x-archive-queue-derive: 0 x-archive-size-hint: 4517 x-ias3-encoded-key: facts.txt x-upload-date: 2016-12-06T00:56:32.000Z AÖƒ0uè› òò facts.txt HHpu³‚%99ƒetables3item_pending_changess3item_pending_changesCREATE TABLE s3item_pending_changes ( sequence_number INTEGER PRIMARY KEY ASC, op blob, args blob, time float, done int default 0 )‚))ƒ?tables3item_historys3item_historyCREATE TABLE s3item_history ( sequence_number INTEGER PRIMARY KEY ASC, key blob, op blob, data blob, time float )‚;99„tables3api_per_key_metadatas3api_per_key_metadataCREATE TABLE s3api_per_key_metadata ( s3key blob, headers blob, live_date real, old_version_of blob, primary key (s3key), unique (s3key) )K_9indexsqlite_autoindex_s3api_per_key_metadata_1s3api_per_key_metadataPK- ‰C–IFDí€ÁÁ& @CopyProtectionFacts4am_archive.torrentUT£Ž[XPK- ‰C–IV’ûû @CopyProtectionFacts4am_meta.xmlUT£Ž[XPK- ‰C–Iý£—Ì–– @W CopyProtectionFacts4am_files.xmlUT£Ž[XPK- ‰C–I_Ž<½¥¥ @8facts.txtUT£Ž[XPK- ‰C–I/ŸÐº " @"CopyProtectionFacts4am_meta.sqliteUT£Ž[XPK£^B