guest@uscacsc.UUCP (guest) (07/12/87)
With this VERY LONG message I'd like to take you to the underworld of Amiga computing: the world of Amiga Pirate Boards. A bunch of criminals that are killing lots of software companies like ours that believe that copy protection is a hassle to the user, but that given what follows will either introduce copy protection, or get out of the Amiga software business altogether. This message will contain name, telephone number, address and picture of one of these criminals. A few weeks ago we were tipped by a user that had reached a BBS in Illinois, named 1984. What we found in there was astonishing. Basically a software library larger than Go Amigo. Any non-copy protected program for the Amiga was there. More than 150 titles. Programs that were unreleased (Online! 2.0) were alreday there. We downloaded a list of the available software, who runs the BBS, a list of the 10 Best Pirate Boards in the USA, and a picture of the 1984 SYSOP, Ken Van Kley. All of these are included in this message. The picture of Mr. Van Kley is uuencoded. uudecode and then use your favourite IFF reader. As it turns out this is a crime that falls through the cracks. For the local police it is "too big". For the FBI it is "too small", they want proof that more than $ 500,000 are involved. These are fast boards (mostly 2400 bauds) and ARC all the commercial packages (and their documentation), so it probably takes 5 to 10 minutes for an average software package. The only option is to sue them. Unfortunately most current Amiga developers are < 5 people operations and definitely cannot afford that. Only the few medium-sized companies involved with the Amiga have a legal department that can try to do something. The list that follows has the "Top 10 Amiga Pirate Boards". We checked a few of them and they all have mostly the same 100-200 commercial titles in there. Rumor has it that there are about 50 Amiga Pirate boards up and running. But let's give out some names and addresses. The jerk that runs 1984 lives at: -1984- BBS c/o Ken Van Kley 625 Sheridan Dolton, IL 60419 (312) 841-2401 Feel free to call him and let him know what you think about piracy. Let me also point out that the "people" that download commercial software are as criminals as Mr. Van Kley. No question about it. Maybe in another message I'll post the list of names and addresses (some of these people leave their "real" names and addresses in there). Some of them are also on Usenet. Sorry if we remain anonymous, but these guys can be VERY mean. What follows are three things. A list of the top ten Pirate Boards. The list of commercial software on 1984 and a picture of Mr. Van Kley. After seeing this, all this talk about copy protection vs. non-copy protection seems just like bullshit to me. ------ Unedited downloads THE TOP TEN IN THE AMIGA PIRATING BOARD WORLD --------------------------------------------- Darth Vader's Pirate Board List ------------------------------- April 17,1987 Listed in order of rating ------------------------- 1)The Portal (614) 237-0285 This board runs at 2400 baud and has 64 MEGS of storage space and runs on BBS-PC!. This board is VERY active and an EXCELLENT board in terms of files. The messages are very plentiful and they get the new stuff FAST. In my opinion, the best pirate board in the country. 2)The Black Chamber (714) 646-2723 This board runs at 2400 baud and has 20 MEGS of storage space and runs on BBS-PC!. This board is active but dying FAST. The files have slackened off considerably. Although many files are posted each day, they are mostly old and out of date files. The message base doesn't have anything interesting going on. Maybe this board will pick up, but from the looks of it probably not. Oh well, you have to topple sometime. 3)1984 (312) 841-2401 This board set up an Amiga pirate section a few weeks ago and is doing GREAT! It has 43 MEGS of storage space and runs at 2400 baud on BBS-PC!. This board gets MANY good files a day and the message base is certainly active. With a nice sysop, it makes this board complete. The only reason this board is not #2, is that it lacks as much time as the Black Chamber has had and subsequently less files BUT the new files are up there FAST. An excellent board. Give this one a call. It rivals the Black Chamber and Portal easily. 4)Under*Worlde (614) 451-3622 This board runs at 2400 baud and has 20 MEGS of storage and runs on BBS-PC!. This board is improving quickly and is fairly active. Give it a call. It is NOT accessible via PC-Pursuit. The sysop is nice but however it is slackening off in files a bit. Not too many good uploads a day. 5)Magnolia (205) 854-6407 This board runs at 2400 baud with 60 MEGS of storage and runs on PC-BBS. This board is active and has many good pirate files. The sysop is EXTREMELY kind and I like her a lot. However, the files also seem to be slackening off. 6)San Antonio Amiga (512) 684-3433 This board runs at 1200 baud with 20 MEGS of storage and runs on BBS-PC!. This is fairly good and has quite a few pirated programs however the pirate section is a bit inactive. It is NOT accessible via PC-Pursuit. 7)Amiga Connection (301) 445-3777 This board runs at 1200 baud with 20 MEGS of storage and runs on BBS-PC! This board shows some potential. It has an anarchy section but is hardly improving. This board is accessible by PC-Pursuit. You now require to upload Sign.txt found on 1984 and other boards. The board is SLOW in files. Only about 1 file every 2 days. 8)Amiga Central (801) 943-2011 This board runs at 1200 baud with only 2 drives of storage and runs on BBS-PC! The board seems to be dying the past week or so. Files are getting up slowly there and there really is not much anymore. Maybe when he gets 20 MEGS with 2400 baud things will pick up. Who knows? 9)Pulsar (213) 325-8925 This board runs at 2400 baud and has 40 MEGS of storage and runs on P-BBS. All in all, this board stinks. I am mentioning cause the sysop is taking it down May 1 and will put it back up late summer (I am sure we will all forget about it by then). Anyway the files are terrible. They upload one part of a two part program and don't upload the other part or the files were badly uploaded and not deleted! The sysop take terrible care of the files. The message is DEAD. Nothing. We can all forget about this board for a LONG while. 10)The New Age (213) 559-4948 DON'T call this board. I am mentioning it cause the sysop asked me to tell everyone that he is DELETING all pirates that try to log on. However he just got a 150 MEG hard drive (WOW!) and will set up a section shortly. However until further notice is posted DON't call. Frankly, this month has been pretty poor in boards. The only two that are doing well and keeping up the standard (or improving) are 1984 and Portal. The Black Chamber seems dying as well as others. Hopefully things will pick up but who knows? Anyway, so call the two most active boards in the country at the moment, Portal and 1984. PLEASE PLEASE pass this file around for the sake of the the New Age. Thank you. I will update this regularly. Greats of the Pirating World ---------------------------- The Fed - Co-sysop of 1984 Big Brother - Sysop of 1984 Sysop of Portal The Cure - Co-sysop of Amiga Central Southern Star - Sysop of Magnolia Nemesis - Sysop of Underworlde Data Bandit - Sysop of Amiga Central Tapper Losers of the Pirating World ---------------------------- Fast Scan - once sysop of Antartica Wayne Hoover - sysop of Pulsar Disk Rigger - co-sysop of Black Chamber Natural list of files - XX-JUN-87 XX:YY PM SURGEON.ARC 13-APR-87 61824-B Cracked main file - No word check! CSBASEBALL.D 13-APR-87 1920-T MUCH BETTER docs for Champ. Baseball! DEVPACAM.ARC 22-MAY-87 78720-B HiSoft Assemble/editor/debooger... HACK2DOC.ARC 06-MAY-87 21632-B HACKER II DOCS BOMBS2.TXT 21-MAY-87 16512-T BIGGER BOMBS-DANGEROUS PLEASE BE CAREFUL LINT2.0.ARC 05-MAY-87 82944-B Amiga Lint version 2.0 GOLF.ARC 02-MAY-87 331008-B gamestar golf CLTD-HD.ARC 04-MAY-87 57600-B Cltd fast HD routine for 1.3 beta JDKFONTS.ARC 30-APR-87 114688-B NON-TRACKERED video fonts - see msg 2011 GRID-NFL.ARC 01-JUN-87 231552-B Gridiron team data disk M-SCOPE.ARC 05-MAY-87 20864-B Memory utilities CONVENTIONS. 29-APR-87 10496-T Conventions for ARCing - PLEASE READ FLIPSIDE.ARC 29-APR-87 68224-B Commercial util. to print sideways MAFDOCUD.ARC 28-APR-87 13824-B MiAmigaFile IIsgOg DOC Update ROADWAR2000. 12-JUN-87 299136-B SSI Roadwar 2000 There BEST YET! HIJINX.ARC 27-APR-87 115584-B Infocom Hollywood Hijinx DMP101.ARC 27-APR-87 4736-B PatchNEW DeluxeMusic to BREAK it! DIAL1.ARC 21-MAY-87 18688-B phreaking program, code scanner CALCRAFT.ARC 30-APR-87 85120-B Spreadsheet (not as good as Analyze!) DOMINO.ARC 21-APR-87 65024-B Dominoes from Polyglot Software M18HELL.ARC 21-APR-87 67200-B Golf in Hell courses for Mean 18 - hard CMON.ARC 21-APR-87 26368-B assembler/de-assembler from Germany EARL3.ARC 31-MAY-87 172928-B Earl Weaver Baseball (Part 3) *Lucifer* EARL2.ARC 30-MAY-87 138112-B Part 2 of Earl Weaver Baseball SOUNDSCAPE.A 14-APR-87 558080-B Soundscape Sequencer 1.4 - arc & tracker SACREATOR.AR 14-APR-87 4736-B Creates screens for Stoneage ROCKY.ARC 20-APR-87 15360-B Rocky Horror for DMCS GIZMOZ2.ARC 26-APR-87 61056-B UPDATE FILES FOR GIZMOZ 2.0 ROUND.ARC 20-APR-87 8832-B Roundabout by Yes DMCS SPLITTER.ARC 20-APR-87 11648-B Splits and unsplits large files for tran LIGHT2.ARC 13-APR-87 107648-B Another great Light Circle Demo! FACC.ARC 02-JUN-87 21760-B Floppy Drive Accelerator-ASDG -Lucifer- SSPICS.ARC 20-APR-87 9472-B Pictures of ships for Silent Service DEJAVU.ARC 04-JUN-87 479872-B Deja-Vu w/hints just arc'ed DP2_DOCS.ARC 13-APR-87 21888-B Deluxe Paint II docs DME122.ARC 13-APR-87 35968-B Editor... nice SD.ARC 31-MAY-87 65536-B SuperDisk - nice disk hacker ZKEYSDOC.ARC 02-JUN-87 41728-B Doc for Zing Keys in Scribble format FFF.ARC 21-MAY-87 161408-B Flesh For Fantasy - Read Msg #2465 NEWOUT.ARC 02-JUN-87 36864-B Newest version Outline from PAR CITYDEF.ARC 24-APR-87 10368-B City Defense Demo... smallest ware ever AREATIMER.AR 12-APR-87 14464-B This adds up your fone bill will you cal WL.ARC 02-JUN-87 12032-B White Light. copier - fast format nice BARDSMAP.PIC 11-MAR-87 17920-B Map of Skara Brae... IFF MINDWALK.DOC 11-MAR-87 7168-T Mind Walker docs ARENA.DOC 11-MAR-87 14848-T Docs to Arena GHOST!.ARC 30-MAY-87 290304-B Text/Graphics Adventure - Read Msg 2512 CARD.TXT 20-APR-87 9472-T More info on carding MIRROR.DOC 20-APR-87 11776-T Docs to the Hacker Mirror Package PIRATE.BOARD 19-APR-87 4992-T The TOP TEN Pirate boards - READ!!!! PUZPICS.ARC 18-APR-87 43776-B MagicPicturePuzzle Pics-2 of 2-Not Req'd LGOP.SOL 17-APR-87 44928-T Leather Goddesses Solution (Detailed!) M18.ARC 16-MAR-87 133760-B Mean 18 Greatest Golf Courses Vol. 2 REFLECT3.ARC 13-MAR-87 3840-B Reflector3.. copies recent mirror TEMPLAAN.ARC 13-MAR-87 39936-B Templates for Analyze! PAWN.TXT 13-MAR-87 33792-B Docs/hints for the Pawn BARDS.DOC 16-MAR-87 74624-T Complete docs to Bard's Tale EARL1.ARC 30-MAY-87 62080-B Earl Weaver Baseball - Read Msg 2513 SILENT1.ARC 13-MAR-87 184064-B part 1 of 2 of Silent Service SILENT2.ARC 13-MAR-87 145152-B part 2 of 2 of Silent Service TCPLUS.ARC 14-MAR-87 257920-B Text Craft Plus (ok) EXPLORER.ARC 12-APR-87 37120-B New editor utility CLITUTOR.ARC 12-APR-87 7296-B Help utility for CLI UN2.ARC 16-APR-87 252800-B Uninvited - part 2 of 2 AF_CHAR.ARC 24-JUN-87 8832-B Great AlienFires character!!! EARL4.ARC 31-MAY-87 2304-B Last part of Earl Weaver Baseball PASCAL.ARC 23-JUN-87 147200-B metacomco pascal (real nice language) ONLINE2.ARC 24-JUN-87 131072-B Online! 2.0 Main files. LISP.ARC 14-APR-87 187520-B Cambridge LISP - for seriousrogrammers NOUT.ARC 22-JUN-87 38144-B Third update of PAR's Outline MAXICOM3.ARC 22-JUN-87 61056-B Maxicom version 3.0 STONE-C.ARC 22-JUN-87 74496-B C version of StoneAge-fast w/digi sound EMPIRE.ARC 21-JUN-87 155648-B Empire...the game. D2D2.0.ARC 21-JUN-87 41088-B Disk to Disk version 2.0. MAF2SG.ARC 21-JUN-87 101120-B MiAmiga (aka Softwood) File IIsg KAMP3.ARC 20-JUN-87 3200-B Kampfgruppe. Missing File -- works -- KAMP2.ARC 20-JUN-87 111488-B Kamfgruppe. Part 2 of 3 SILENTRAM.AR 19-JUN-87 17152-B Sets up Silent Service to run from Ram: CHALLENGE.AR 19-JUN-87 238592-B Challenge, better then Zeycude. FIIF.ARC 19-JUN-87 25088-B Fruit II Friend, Apple II -> Amiga R/W/F O_MASTER.ARC 03-JUN-87 64000-B Othello Master - from the New Age HOLLYFIX.ARC 18-JUN-87 31744-B Fix for corrupt Hollywood Poker picture ZINGKEYS.ARC 18-JUN-87 164352-B Zingkeys macro utility. HARDHAT.ARC 17-JUN-87 48512-B Commercial HD backup program NOUTLINE.ARC 17-JUN-87 36864-B Lates version of outline from PAR ZKEYDOC.ARC 16-JUN-87 41728-B Complete Docs for Zing Keys!! D2D16.ARC 16-JUN-87 21632-B DOS 2 DOS v1.6 - does ST disks as well KAMPF.TXT 16-JUN-87 7424-T Codes for Kampfgruppe ALIEN.DOCS 16-JUN-87 8064-T Set of docs for Alien Fires AFCHAR.ARC 16-JUN-87 8832-B Superman type character for AlienFires! DRAWDAT1.ARC 15-JUN-87 156800-B Aegis Draw data disk - part 1 of 2 DRAWDAT2.ARC 15-JUN-87 109312-B Aegis Draw data disk - part 2 of 2 PROVIDEO.ARC 15-JUN-87 182400-B CGI provideo character generator TXED.ARC 15-JUN-87 18048-B text editor for amiga. very good. FTM.ARC 22-MAY-87 136448-B Financial Time Machine stock game. AC-BASIC.ARC 14-JUN-87 233088-B AmigaBasic Compiler. Better than TrueBas NEWPRISM.ARC 13-JUN-87 92032-B Prism version 2.0 ALIEN1.ARC 13-JUN-87 416512-B Re-upload of Alien Fires. Part 1 of 3. ALIEN2.ARC 13-JUN-87 337024-B Alien Fires. Part 2 of 3 ALIEN3.ARC 13-JUN-87 252544-B Alien Fires. Part 3 of 3 UN1.ARC 16-APR-87 251904-B Uninvited - Part 1 of 2. DIGAREDIAL 15-APR-87 256-T Script commands for redialing w/ Diga HOLLY4.ARC 12-JUN-87 196736-B Hollywood Strip Poker - Part 4 HOLLY3.ARC 12-JUN-87 177024-B Hollywood Strip Poker part 3 HOLLY2.ARC 12-JUN-87 190208-B Part 2 of Hollywood Strip Poker HOLLY1.ARC 12-JUN-87 150144-B Hollywood Strip Poker pt1-Read msg 2765 BUTCHDOC.ARC 21-MAY-87 8704-B Full documentation for The Butcher AESOP.ARC 11-JUN-87 315648-B Aesop's Fables - not bad for kids DIGA.ZOO 30-MAY-87 331776-B Release version of Diga! DISKPRO.ARC 22-MAY-87 71168-B Compress Decompress prg to save dsk room SINBAD-D.ARC 10-APR-87 197888-B Sinbad part 4 of 4 disk 2 SKETRM2.ARC 10-APR-87 111744-B sketerm v2.0 NOT BAD!! Macros,REDIAL BOBACK.ARC 10-APR-87 21376-B Fix for bad file in World Games MANX34P3.ARC 11-APR-87 7552-B Latest bug fixes for Aztec 3.4a -a must STARFLEET.DO 10-APR-87 10880-T Starfleet docs MINDSHAD.SOL 10-APR-87 4864-T Mindshadow solution BOP.DOC 10-APR-87 26496-T Docs for Balance of Power GUILD2.ARC 09-JUN-87 468224-B GUILD OF THIEVES - better than THE PAWN GUILD1.ARC 09-JUN-87 2304-B GUILD OF THIEVES - sequel to THE PAWN DSK2DSK.ARC 07-MAY-87 39296-B TRANSFER C-64/128 FILE]S TO AMIGA CALLIG.ARC 07-MAY-87 106880-B Calligrapher font editor - impressive MDEBUG.ARC 07-MAY-87 21120-B MetaComco Debug Utilities for SeriousPro FAERY.DOC 09-MAY-87 10624-B complete docs to faery tale BUREA.DOC 09-MAY-87 9088-T Bureacracy Docs. GRABBIT.ARC 09-MAY-87 107392-B Grabbit Utilities, WYSIWYG. DIGIVIEW.ARC 10-MAY-87 124672-B Digi-view software version 2.0. HOTMISS.ARC 08-JUN-87 50176-B Scramble like game-Hotline Mission FAERY.DOCS 10-MAY-87 10880-B docs to fairy tale FATALE.ARC 10-MAY-87 35968-B COMPLETE DOCS & MAP.PIC FAERY TALE ADVEN BAZBO.ARC 10-MAY-87 11008-B Copy Program from Israel-Commercial-OK DIMMER!.ARC 08-JUN-87 26240-B Screen Dimmer- Par FPIC.ARC 10-MAY-87 77568-B another drawing pro. SWOOPER.ARC 08-JUN-87 217216-B GALAGA TYPE SPACE GAME WITH NICE SOUNDS ALIENFIRES.D 07-JUN-87 8064-T Short docs to Alien Fires 2199 AD LUVQUEST.ARC 11-MAY-87 122752-B Love Quest - find your mate GALILEO.ARC 11-MAY-87 190080-B Galileo - Astronomy program FDOCMAP.ARC 12-MAY-87 36224-B QUALITY MAP!! AND DOCS FOR FAERY TALE!!! D2D.DOC 13-MAY-87 6272-T DOCS TO DISK TO DISK HOLIDAY.ARC 13-MAY-87 140416-B ELECTRONICS ARTS GRAPHICS DISK NET.ARC 08-JUN-87 65024-B Networking software for Amiga DIAGNOST.ARC 06-JUN-87 34560-B Amiga Diagnostics-Commercial Release NEWFF.ARC 02-JUN-87 41728-B Newest version of Fast Fonts CUSTSCRN.ARC 06-JUN-87 94720-B Custom Screens- Commercial Release GALILEO.TXT 14-MAY-87 1408-T MOST OF THE CODES FOR GALILEO DOS2DOS.ARC 14-MAY-87 40832-B IBM <==> Amiga. Not a bad program MAR2CODE.ARC 14-MAY-87 21376-B Marauder II 1.0c AUTO-Codefinder KAMP1.ARC 06-JUN-87 81152-B First part of SSI's Kampgruppe NPRISM.ARC 16-MAY-87 92032-B New Prism Converts Pics when Loaded LITTLE.TXT 06-JUN-87 3456-T Mini-docs for Little Computer People SCRIBBLE!.TX 06-JUN-87 4736-B Small help file for Scribble! INFOTATOR.TX 06-JUN-87 3584-B Infotator needed for Sorcerer BARDMAPS.ARC 17-MAY-87 26112-B Maps to Bards Tale BARDMAP2.ARC 17-MAY-87 35840-B Underground maps to Bards Tale SUPERHUEY.DO 06-JUN-87 8704-B Docs to Superhuey ATALKPLUS.AR 18-MAY-87 90624-B A-Talk Plus - Term/Tektronix Emulator BOMBS.TXT 20-MAY-87 11264-T HHOW TRO MAKE LITTLE BOMBS AND M-80'S SETKEY.ARC 05-JUN-87 54784-B Makes Keymaps. Strings for funkeys must! 157 File(s) listed begin 644 vankley.uue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end
mwm@eris.BERKELEY.EDU (Mike (My watch has windows) Meyer) (07/13/87)
In article <240@uscacsc.UUCP> do.not.reply writes:
<
<With this VERY LONG message I'd like to take you to the underworld of Amiga
<computing: the world of Amiga Pirate Boards.
Thanx for providing some hard data for us to look at. Some comments
follow.
<A few weeks ago we were tipped by a user that had reached a BBS in Illinois,
<named 1984. What we found in there was astonishing. Basically a software
<library larger than Go Amigo. Any non-copy protected program for the Amiga
<was there. More than 150 titles.
I think you're stretching the count a little. There were 157 *FILES*.
Some *titles* stretched across 3 or more files. Some of the stuff was
*not* pirated software, but stuff they could legally pass on. Other
stuff was DMCS files for songs - which carry copyrights, so that them
being publicly available is illegal, but they don't constitute
software titles.
You also forgot to point out that a fair number of the titles were
copy protected. Including some of the EA titles which Mitsu claimed
couldn't be pirated. There was also some "look up the word in the
manual" type stuff.
Anyone interested in an exact rundown for the entire list? I'd be
willing to do it.
<As it turns out this is a crime that falls through
<the cracks. For the local police it is "too big". For the FBI it is "too
<small", they want proof that more than $ 500,000 are involved.
Have you tried contating the state-level police forces? Some states
have a <state> Bureau of Investigation. These kind of thing should be
right up their alley.
<The list that follows has the "Top 10 Amiga Pirate Boards".
I'm rather relieved that the "Top 10 Amiga Pirate Boards" reached
"going away" and "do not call" boards before it got to the end. I'd
figured that there should be at least 20-30 serious pirate boards
around. Then again, this may just reflect the general low level of
interest in the Amiga.
<Feel free to call him and let him know what you think about piracy.
Uh, what you've just recommended is called "harassment." It's as
illegal as stealing software. It's also the kind of things that gets
uucp connections yanked. I mean, you might as well recommend that
people put him in their uucp L.sys file, and then send mail to him at
4am.
Although what you're recommending is done so for a good cause, it's not
a good idea. The government frowns on people taking the law into their
own hands.
<After seeing this, all this talk about copy protection vs. non-copy
<protection seems just like bullshit to me.
Yup. Considering that every form of copy protection I'm familiar with
was used for one or more of the programs in the list, I'd agree that
copy protection was so much bullshit.
<mike
--
But I'll survive, no you won't catch me, Mike Meyer
I'll resist the urge that is tempting me, ucbvax!mwm
I'll avert my eyes, keep you off my knee, mwm@berkeley.edu
But it feels so good when you talk to me. mwm@ucbjade.BITNET
mjp@spice.cs.cmu.edu (Michael Portuesi) (07/13/87)
Keywords: Re: Amiga Software Piracy (names, addresses, numbers and pictures) guest@uscacsc.UUCP (guest) (and with good reason, too) writes: > What follows are three things. A list of the top ten Pirate Boards. The > list of commercial software on 1984 and a picture of Mr. Van Kley. After > seeing this, all this talk about copy protection vs. non-copy protection > seems just like bullshit to me. I'm interested in hearing how some of the software developers feel after seeing this. Some of the software on that list comes from people here on the net -- Infinity Software, Felsina Software, and ASDG, to name a few. I have a few points I'd like to make: 1) All copy protection schemes can be broken. I noticed that Silent Service was there -- wasn't that copy protected so well that the original didn't work? I'll put myself in the position of a commercial software developer for a moment. I am now the president of MegaWare, Ltd. My entire operation is < 5 people. Developing some far-out copy protection scheme will cost me a lot of money, and they're going to pirate my software just the same. Why should I copy protect something if I stand to lose even more money from it? Dropping out of the Amiga software market won't help me...there are pirates for every computer. Dropping out of the market entirely doesn't help me...then I make no income at all. Perhaps RMS had it right in the first place. Maybe I don't want to make an income from my software, but produce software for the benefit of other software in return. 2) I didn't see either the Lattice or the Manx compiler in that list. Perhaps that's because they're unusable without the documentation, and the documentation is much too difficult to duplicate. That's the reason why Borland publishes the Turbo Pascal manual as a small paperbound book -- It's damn hard to duplicate it in that form (won't fit in the sheet feeder), and using TP is pretty difficult without it. Of course, not every application is unusable without the manual. 3) Too bad we don't all have Digi-Views...I'd like to see what some of the faces behind the message headers look like. --M -- Mike Portuesi / Carnegie-Mellon University Computer Science Department ARPA: mjp@spice.cs.cmu.edu UUCP: {backbone-site}!spice.cs.cmu.edu!mjp BITNET: rainwalker@drycas (a uVax-1 run by CMU Computer Club...tons o' fun) "Paradise is exactly like where you are right now...only much, much better" --Laurie Anderson, "Lanugage is a Virus"
spencer@eris.UUCP (07/14/87)
In article <1234@spice.cs.cmu.edu> mjp@spice.cs.cmu.edu (Michael Portuesi) writes: > >I'm interested in hearing how some of the software developers feel >after seeing this. Some of the software on that list comes from >people here on the net -- Infinity Software, Felsina Software, and >ASDG, to name a few. I have a few points I'd like to make: > Well to be honest I was somewhat shocked by the list, but I kind of expected it. I have lots of friends who just "like" to pirate software. They don't do it to rip off people, they just feel that they have completed something. I have the same tendancy. I will go the the newstand and see the new issue of Byte, not finding anything good in the issue I will still buy it. I just want to have ALL of the issues. I think this is the same thing with pirates. Kind of like baseball cards. So Galileo is out there for free, I don't know that alot of people who get it from there :'( would have gone out and bought our program anyway. We didn't loose much money and there is the possibility that someone will hear about our program that wouldn't have otherwise. Of course, Mike (powered by M & M's) Smithwick is also on this net, he wrote the program, I don't know how he feels... What I really feel is a shame is that FACC is there already. I have seen it in too many homes already of people who didn't purchase it. I have been really happy with it (I have four disk drives on my 2000). What really struck most strongly was on the back of the FACC disk box it says "This disk is not copy protected. ASDG has served the Amiga community well (remember the ASDG Recoverable Ram Disk); please don't pirate our software." Boy that line was better than any copy protection. I just kept remembering that stupid $10 that I ment to send in for that RRD that I never ended up doing. Boy, I haven't even let people SEE my FACC disk, let alone copy it. I sure wish that Infinity could afford to ship programs with NO protection, at least our new DeskTop Publishing program isn't protected. >3) Too bad we don't all have Digi-Views...I'd like to see what some of >the faces behind the message headers look like. > What happened? I recently did a "Bay Area" posting of the photo that Arthur Abrahams took of the BADGE meeting with the ALive and I have only gotten one reply. I want mail from everyone who got my posting or I am going to post it to the entire state! >Mike Portuesi / Carnegie-Mellon University Computer Science Department -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Randy Spencer P.O. Box 4542 Berkeley CA 94704 (415)284-4740 I N F I N I T Y BBS: (415)283-5469 Now working for |||||||||||::::... . . BUD-LINX But in no way |||||||||||||||::::.. .. . Officially representing ||||||||||||:::::... .. ....ucbvax!mica!spencer s o f t w a r e spencer@mica.berkeley.edu -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
dclemans@mntgfx.MENTOR.COM (Dave Clemans) (07/15/87)
Note that you don't have to find these kind of criminals alone. As an example, about a year or a year and a half ago, a group of Atari ST software publishers (representing about 75-80% of the Atari ST market) got together with ADAPSO (?) against a similar pirate BBS. They won their court fight easily. If I remember right, I think a telephone hotline was set up (at ADAPSO?) for people to anonymously report other such boards. I imagine that part of the attraction of attacking pirates as a group is that there is no single individual or entity that other pirates can go after. On other peoples comments about the reliability of copy protection on the Amiga; there has definitely been serious reliability problems. I know of one local dealer that was experiencing a 50-60% "immediate" failure rate on copy-protected Amiga products. (By "immediate" I mean that the customer would find that the program wouldn't work right out of the box because of the copy protection, or would stop working after being loaded once or twice). Since they had a policy of not forcing their customers to not wait a couple of weeks for replacement disks after they've already bought a product, they let customers trade if possible (thus depleting the stores inventory), or if that wasn't possible and they had a good copy of that program with the information to allow it to be copied by a "copy" program, they would rewrite the users master disk.
keithd@cadovax.UUCP (Keith Doyle) (07/16/87)
In article <1234@spice.cs.cmu.edu> mjp@spice.cs.cmu.edu (Michael Portuesi) writes: >Re: Amiga Software Piracy (names, addresses, numbers and pictures) >1) All copy protection schemes can be broken. I noticed that Silent >Service was there -- wasn't that copy protected so well that the >original didn't work? Yeah, the cracked copy probably works better than the original. This is the kind of thing that really rankles my ass. That pirate bbs had a cracked copy of SoundScape 1.4. I've been trying to backup my legit copy for months with everybodies copy routine with no success. I'm scared stiff that I'll be doing something great on it or be planning to demo it to a large crowd just as the disk bytes the dust. And here's some pirates that have it broken. Do I have to go to someone like them to get piece of mind for my compositions? SoundScape is not a game program. If you don't have a MIDI interface, a keyboard and/or synth, and THE MANUAL, it's not very useful. Star Wars copy-protection on a program like that is nothing but pure irritation. >2) I didn't see either the Lattice or the Manx compiler in that list. >Perhaps that's because they're unusable without the documentation, and >the documentation is much too difficult to duplicate. AHA! Developers please note! But at the same time, creating a game program that needs documentation just for the sake of needing documentation makes for some pretty dull games. Fortunately for me, the Amiga is the first computer I've owned (and I've had 8 or 9 in the last 8 years) that is so much more useful in non-game ways, that I NEVER find the time or inclination to play games on it. But really, mightn't it be a good idea to publish a list of the top 10 NON-PIRATE boards? Keith Doyle # {ucbvax,ihnp4,decvax}!trwrb!cadovax!keithd # cadovax!keithd@ucla-locus.arpa Contel Business Systems 213-323-8170
mike@ames.arpa (Mike Smithwick) (07/17/87)
[mmmmmm] (a bunch of stuff, Randy, you're too wordy :-) >possibility that someone will hear about our program that wouldn't >have otherwise. Of course, Mike (powered by M & M's) Smithwick is >also on this net, he wrote the program, I don't know how he feels... I think I'll shoot myself. Seriously, I'm wondering if I should be flattered that my program is being pirated. One of the attractions of collecting pirated software is the collector mentality ("Gee, you have only 123 titles, I've got 451!"). Baseball cards are an appropriate analogy. I was very upset when Randy first told me of this place, but I do realize that just because some slimeball pirates a program doesn't mean that he would've bought it in the first place. I'll be the first to admit that I've done my share of bootlegging with the 64 a few years back and the Apple ][. Out of the couple of hundred programs I had, were about 4 or 5 that I would've bought, the rest never interested me whatsoever, except in the way I could boast about the numbers or new titles. One way to discourage this whole business in the first place is to have nothing to do with anyone who pirates stuff. Don't swap new fish disks with them, ignore them on the streets, don't let your kids play with theirs, don't sit on the same side of the church that they do. In general, let them know that they are not welcome. Oh well. . . -- *** mike (powered by M&Ms) smithwick *** "ever felt like life was a game, and someone gave you the wrong instruction book?" [discalimer : nope, I don't work for NASA, I take full blame for my ideas]
peter@sugar.UUCP (Peter da Silva) (07/19/87)
That's pretty impressive. I'd like to know how you can possibly support copy protection after seeing all your protected programs cracked and uploaded to a pirate bulletin board before they even come out. It's pretty obvious to me that your protection isn't doing any good. Actually, there are a couple of programs I'd like to download. The one to unprotect DMCS (so I don't have to worry about my key disk giving out) sounds pretty useful. (Yes, I know I can upgrade to the non copy-protected version for another 20 bucks, but it galls me to pay $20 to remove something that wasn't there in the first place. I regard DMCS as a utility, not a game, and as such it shouldn't be protected. Oh well, I know you won't agree with me, and everyone already has their own opinion on this subject already (my mind's made up... don't bother me with facts... I'm sure your mind is too). This is my one and only copy protection posting. Perhaps Commodore can do something, or get the cops to do something. Perhaps you can sue them. It worked with the KKK. -- -- Peter da Silva `-_-' ...!seismo!soma!uhnix1!sugar!peter (I said, NO PHOTOS!)
gary@eddie.MIT.EDU (Gary Samad) (07/24/87)
I don't believe that I haven't seen a single response to this pirate bbs listing that said "I'm outraged!" Well, consider this one! I'M OUTRAGED! The appropriate response to copy protected software is "Don't buy it." NOT "Because they didn't trust me, I'm going to steal their product!" Pirate bbs are an outrage! I hope these guys are sued and shut down! Does anyone know the ADAPSO "software piracy" phone number? Irked, Gary By the way, I'm surprised that noone noticed that many of these files were MANUALS! These guys are actually typing in the manuals!
mreed@leah.Albany.Edu ( Mike Reed) (07/24/87)
I've seen lot's of discussion about how people should just let these slime run their pirate boards, because the pirate boards are probably not doing too much damage to sales. I saw one of my applications on that board's filelist. An application that just came out, which has good utility, and is easy to use. It was designed so that one could use it without constantly looking at the manual. So now I see my program pirated by some slime, AND the user community just says, "well, its not damaging OUR sales". I know now what my next program is going to be. It's going to unprotect, and subsequently delete, every file on every storage device attached to the machine it's run on. THEN i'll name it something cute, like "DPAINT III beta", and upload it to one of those &@_^^#%* boards. Hack + Destroy
conklin@msudoc.ee.mich-state.edu (Terry Conklin) (07/27/87)
This marks to date the most offense posting I have ever seen on the net. While software piracy is certainly a problem in search of a solution, this posters crime has LONG SINCE been solved - with jail! A long time ago, there was a theory to the effect "End doesn't justify the means." So I sure as hell wont allow this attempt to 'combat piracy' justify it's _blatant_ illegality! For the a** that put this up, let me clue you in on a few things about the U.S. For one, people are "innocent until proven guilty." And strange as it may seem, one of the reasons that's so is to prevent SLANDER. Publishing someone's name to the net constitute EPIC misuse of the net. You're not kidding it was smart to be "guest," but not because the pirates will get you, anyone with a sense of law is out to get you too! Here's another mystic concept for you. "The accused has a right to know his accuser." That too is prevent slander and self crowned vigilantes. And to prevent every crook from phoning in 'anonymous tips' on someone they aren't happy with. But criminals prefer to be anonymous... But perhaps the lowest thing of all is the inclusion of a photograph. You have NO way of knowing that's legit. It could be a picture of ANYONE, from anywhere. Not only might the pirate board have used someone else's picture, YOU could have used someone else's picture. Pirates aren't stupid! They're NOT going to have THEIR picture up there! You have utterly NO way of gaurenteeing that person's innocence, and you have posted his picture to tens of thousands of sites as a THIEF. Well theives may be, but I am far more concerned with putting a legal rapist like you behind bars. And yet, it seem unimaginable that any honest person would be so flagrant and vile. My guess is that you ARE a pirate, perhaps one of the "losers," trying to get back at other legit boards or pirate friends who shunned you. And now that you've posted these numbers to the net, any that are pirate will do 10 times the distribution they did before! 10 TIMES the damage. Who are you trying to kid?! How many number are people homes? Just stay off the net and let us stick to legal answers to piracy. Terry Conklin ihnp4!msudoc!conklin conklin@cps.msu.edu
scotty@l5comp.UUCP (Scott Turner) (07/27/87)
In article <451@leah.Albany.Edu> mreed@leah.Albany.Edu ( Mike Reed) writes: > So now I see my program pirated by some slime, AND the user community >just says, "well, its not damaging OUR sales". > > I know now what my next program is going to be. It's going to >unprotect, and subsequently delete, every file on every storage device >attached to the machine it's run on. THEN i'll name it something cute, >like "DPAINT III beta", and upload it to one of those &@_^^#%* boards. Just when I think there is hope for man kind I see a NEANDERTHAL message like the above. "Your dog pissed on my bushes, I'm gonna kill your dog." Wouldn't it be wonderful if the world were that simple again? Anarchy at it's best. Something offends you, you go out and blast it. As the ultra- feminists would say "A red-meat eating macho-male's fantasy realized". The world however isn't that simple anymore. Take for example the following thoughts... FIRST these "pirates" are not raping/killing/mad dog animals. People like to make them out as such, which is dangerous. If one of these people is caught and brought to trial and it turns out he/she is a 16 year old bright computer phreak who was just fooling around... You get what we have over in comp.sys.mac. You should go read it, it's sure to really make your blood boil over. There's an article in there from France trying to drum up support for a CONVICTED "pirate"! They want to raise money etc to appeal his conviction even though they freely admit he is a "pirate". But hey, the guy wasn't doing it to hurt anyone etc etc etc... SECOND these "pirates" provide a "service" that more than a few people value highly, the removal of user traps from software. They actually have people who support them because they're doing something they like. Sort of like how we support the "Contras" because we want a democratic govt down there, even though no one would want to live with a "Contra". The ol' "Sure they may be doing XXX, which I personally don't agree with, but they're also doing YYY which I do appreciate!" I can see the bumper sticker now: "Support your local pirate, the program he breaks may be one you use!" THIRD copyright law is damn tricky from what I understand. Let's try a few "fer instances" and see what you make of them: What if the software on a board raided was purchased by the sysop? What could be done about the sysop of that board? After all it would be the people USING the board that violated the copyright law. What could be done to the downloaders of software from these boards if they already owned legal copies of the software they were downloading? Say they were downloading a DMCS minus the user traps? And even worse, what if the boards were to get "savvy" and post a banner on their BBS saying: "You can only download items off this BBS if you already own a legitimate copy of the software you download. This BBS is run to provide people with a) current revisions of programs b) de-trapped versions of programs. Proceeding beyond this banner means you agree with the terms stated." Sort of like the "All models over the age of 18" or "By my signature I indicate the materials I've ordered will not violate the 'community standards' of my area" clauses that allowed smut pushers to go almost legit. Wouldn't is be a howl to see a software vendor try to skewer a "pirate" for operating a board under the above "shrink wrap license"? :) They might bag the "pirate" only to leave themselves open for lawsuits under their newly invalidated licenses. But enough about the "pirates", back to your stated line of macho-male-ego salve. I think the term "murder" describes what you intend to do with your little program. While the "pirates" may have people willing to stand up and defend some of their actions, I don't know of many people who would stand up and support a "murderer". If all you did was bag a few pirates there would be those who would stand up and say "They drove him over the edge!", but if your program bagged a few "innocent" people you'd become public enemy # 1. How could that happen? After all I'm sure you're asking "But anyone calling that BBS to download that program would HAVE to be a pirate!" THINK! What would a pirate do with such a program? Why more than likely he/she would take it and start uploading it elsewhere, say CI$, GEnie, Usenet, local non- pirate BBSes... I'm sure you get the picture. Or maybe they'll get "smart" and use it to deflect attention from themselves by saying "Hey look! There's a mad dog running loose writing programs that could murder your computer! Let's go get him/her!!" I hope you are willing to face the firing squad/mob if you carry out your plans. Maybe you should cool off and think of a better way to go after these people? And for those that might read all the above and say I'm pro-Pirate. BS, I'm pro-THINKING! I'm anti-NEANDERTHAL thinking. And I'm sure as hell anti-Trojan horse. Scott Turner -- UUCP-stick: stride!l5comp!scotty | If you want to injure my goldfish just make UUCP-auto: scotty@l5comp.UUCP | sure I don't run up a vet bill. GEnie: JST | "The bombs drop in 5 minutes" R. Reagan Disclaimer? I own L5 Computing. Isn't that enough?
sbmueller@watmath.UUCP (07/28/87)
In article <451@leah.Albany.Edu> mreed@leah.Albany.Edu ( Mike Reed) writes: > > I know now what my next program is going to be. It's going to >unprotect, and subsequently delete, every file on every storage device >attached to the machine it's run on. THEN i'll name it something cute, >like "DPAINT III beta", and upload it to one of those &@_^^#%* boards. Warning: wrist-slapping ahead. Disclaimer: I didn't see no smiley, so I assume you mean it. Trojan horses are not a new idea. The MS-DOS world (for once :-) is ahead of us (we?) Amigans. Anybody got a copy of ARC v5.14 for their PC? Suffice it to say that people get more pissed off by having their entire hard disk erased than by any form of copy-protection (except of course if the copy protection involves erasing their hard disk :-). Yeah, sure, you're only gonna upload it to slime boards. Some slime is going to put it on a disk with public domain stuff, and the rest of us will have to deal with it too. Also, despite all the EA bashing, nobody's gonna tell me DPAINT ain't a great program. Is it fair to associate EA with disk trashing? (I mean, when it isn't their fault :-) End of wrist-slap zone. You may now resume your reading. BTW I have opinions on copy protection. I even have some points I believe haven't been mentioned before. I am, however, not going to inflict them on anyone. (Just thot you'd like to know :-) Other irrelevant facts (which I just have to mention): I get all my software from Fred Fish. Thanks Fred. As soon as I start my next work term, Perry and others are getting mail from me. (Yes, with checks in the envelopes) Given quantity of :-)'s in this posting, mayB I shud x-post to rec.humor? Have a nice day. > > Hack > + > Destroy ^^^^^^^ I always thot it was Hack & Slash. APD: ||~ (all purpose disclaimer: Or Not) -------------------------------------------------------------------------------- "Na na na naaa" - The Beatles Amiga (TM?) "Who Ha, Whoha" - FGTH This space // Bizarre/Design "Aah, aah" - Queen currently // Twisted/Fate under \\ // DY/DX "Has anyone seen my marbles?" construction. \// Body/Fisher - SBMUELLER@WATMATH.UUCP Freak --------------------------------------------@-#$--!@#$--$----#$%^&* parity error
mreed@leah.Albany.Edu ( Mike Reed) (07/29/87)
After all those nasty responses... OK OKOKOKOK....I was wrong to discuss (mention?) writing disk-trashing software to upload to pirate boards; It was written in the extreme heat and anger caused by realizing that efforts to make the software easy to use (a very large effort), were helping those slime. It is a poor idea, etc. , etc. BUT....THEN I read what someone else posted to the net in response to my posting. YES, he noted that I was wrong (which was OK), AND THEN tried to speak of the HELPFUL SERVICES those pirates do, such as helping to de-bug software before the public has to, and other such wonderful things. Luckily, I've calmed down about the whole issue. I think i'll post my next program to pirate boards for beta- test.... Hack + Employ Michael
scotty@l5comp.UUCP (Scott Turner) (08/02/87)
In article <10@nancy.UUCP> conklin@msudoc.UUCP writes: >But perhaps the lowest thing of all is the inclusion of a photograph. >You have NO way of knowing that's legit. It could be a picture of >ANYONE, from anywhere. Not only might the pirate board have used someone >else's picture, YOU could have used someone else's picture. Pirates >aren't stupid! They're NOT going to have THEIR picture up there! You have >utterly NO way of gaurenteeing that person's innocence, and you have >posted his picture to tens of thousands of sites as a THIEF. If you had taken the time to DL and uudecode the picture attached to that posting you MIGHT have noticed that it isn't real. It's a "composite" picture. Like the picture of "Big Brother" in the recent movie release of 1984. It's made up of bits and pieces from alot of people, but is not the picture of any single person. The symbolism of this picture and that of "Big Brother" is somewhat deep if you think about it. No single "pirate" broke all the software on that board that was posted, a whole bunch of people tossed in a program or two. Much like a bunch of people tossed in a ear or nose etc to the picture. I laughed my head off when I saw that picture. I laughed even harder when I saw your followup posting. Come on guys, how about a little research before we flame on around here? Your thoughts on posting the phone number and then suggesting everyone give the pirate a call are correct. If the poster of that message can be found by the pirate he could be taken to court over his actions. Would be silly to run around trying to bag the pirate only to wind up on the wrong side of the court room yourself. Scott Turner -- UUCP-stick: stride!l5comp!scotty | If you want to injure my goldfish just make UUCP-auto: scotty@l5comp.UUCP | sure I don't run up a vet bill. GEnie: JST | "The bombs drop in 5 minutes" R. Reagan "Pirated software? Just say *NO*!" S. Turner
scotty@l5comp.UUCP (Scott Turner) (08/08/87)
In article <453@leah.Albany.Edu> mreed@leah.Albany.Edu ( Mike Reed) writes: > I think i'll post my next program to pirate boards for beta- >test.... Now there's a thinking idea. You might even keep the pirates away when your product goes commercial by having them like you so much that they "take care of you". However, I think the "hardcore" pirates will see right through that. It'll be "Hey, nothing personal, BUT I'm a pirate. It's what I do ya know?" :) Scott Turner -- UUCP-stick: stride!l5comp!scotty | If you want to injure my goldfish just make UUCP-auto: scotty@l5comp.UUCP | sure I don't run up a vet bill. GEnie: JST | "The bombs drop in 5 minutes" R. Reagan "Pirated software? Just say *NO*!" S. Turner
petersen@uicsrd.csrd.uiuc.edu (12/10/88)
The 8-bit atari computers used the cartrige idea for game distribution. However it was not 100% successful, the main way to beak it was do make a dump of the cartrige onto a disk then run it from there. If the game had to be run from the cartrige address I think I remember some empty ram cartriges that it could be loaded into. (it's been about 5 years since I've seen it done) The only way that the current game machines get away with this kind of copy protection is because they don't have any writeable storage like a general purpose computer would have.
crewman@bucsb.UUCP (Jerry J. Shekhel) (12/16/88)
In article <42600045@uicsrd.csrd.uiuc.edu> petersen@uicsrd.csrd.uiuc.edu writes: > >The 8-bit atari computers used the cartrige idea for game distribution. >However it was not 100% successful, the main way to beak it was do make a >dump of the cartrige onto a disk then run it from there. > Absolutely true. Cartridges are not any better than any of the other protection schemes. In fact I believe there is no foolproof protection scheme. The point is that somewhere in the program there is code which checks for the protection. Disk-based software may have a bit of code that tests for the existence of some unreproducible media element, like an unusual track, etc., before allowing itself to be run. Cartridge-based software often checks that its code cannot be modified (i.e., it is ROM) before continuing. Find that bit of code, patch it out, and you've just cracked your first piece of software. I did this many years ago, almost by accident, on an 8-bit micro. A certain game I liked checked a bad sector on its disk very often, which made an annoying sound. After finding the code that did this and changing one byte on the disk, I made the bril- liant discovery that the game was now easily copiable. Of course, modern game software is much more prudently protected, but I cannot think of an absolutely safe protection method. > >The only way that the current game machines get >away with this kind of copy protection is because they don't have any >writeable storage like a general purpose computer would have. > Absolutely. -- JJS
andy@cbmvax.UUCP (Andy Finkel) (12/16/88)
In article <2318@bucsb.UUCP> crewman@bucsb.UUCP (Jerry J. Shekhel) writes: >Absolutely true. Cartridges are not any better than any of the other >protection schemes. In fact I believe there is no foolproof protection >scheme. The point is that somewhere in the program there is code which >checks for the protection. Disk-based software may have a bit of code >that tests for the existence of some unreproducible media element, like >an unusual track, etc., before allowing itself to be run. Cartridge-based >software often checks that its code cannot be modified (i.e., it is ROM) >before continuing. Find that bit of code, patch it out, and you've just Way back when I did cartridge games, I hit on a method that would allow a game to run *only* from cartridge (or write protected ram)... All my tests on the static data structures of the game were done using the rotate instructions on the rom. On the 6502, at least, the status flags and carry were set properly, and the data structure was left unmodified. If you ran the game from ram, however, you'd end up with rather strange results, as the game itself changed, depending on your actions. Since, as a media, roms are pretty safe, I didn't feel bad about it at all :-) -- andy finkel {uunet|rutgers|amiga}!cbmvax!andy Commodore-Amiga, Inc. "Possibly this is a new usage of the word 'compatible' with which I was previously unfamiliar" Any expressed opinions are mine; but feel free to share. I disclaim all responsibilities, all shapes, all sizes, all colors.
bryan@intvax.UUCP (Jon R Bryan) (12/21/88)
In article <5517@cbmvax.UUCP>, andy@cbmvax.UUCP (Andy Finkel) writes: > Way back when I did cartridge games, I hit on a method that would > allow a game to run *only* from cartridge (or write protected ram)... > > All my tests on the static data structures of the game were done using the > rotate instructions on the rom. On the 6502, at least, the status flags and Way back in '83 (those were the days) when I had a VIC-20, I added an expansion board to it. Each of the slots was de-selectable. I had a 16K RAM cartridge (those really _were_ the days!) that I added write-protect switches to. There were also some address switches, I forget. I could turn on the machine with a game cartridge plugged in and disabled, enable the cartridge and copy the contents. Then I'd load the game into the RAM cartridge, flip the write-protect switch, shuffle the addresses (when necessary) and hit the reset button. As I recall, Choplifter gave me a bit of trouble because it even had a latch built into it that used to change its own address (like swapping the two 8K halves). But I still got it to work.