[comp.sys.amiga] Amiga software piracy

guest@uscacsc.UUCP (guest) (07/12/87)

With this VERY LONG message I'd like to take you to the underworld of Amiga
computing:  the world of Amiga Pirate Boards.  A bunch of criminals that are
killing lots of software companies like ours that believe that copy protection
is a hassle to the user, but that given what follows will either introduce
copy protection, or get out of the Amiga software business altogether.

This message will contain name, telephone number, address and picture of one
of these criminals.

A few weeks ago we were tipped by a user that had reached a BBS in Illinois,
named 1984.  What we found in there was astonishing. Basically a software
library larger than Go Amigo.  Any non-copy protected program for the Amiga
was there. More than 150 titles.  Programs that were unreleased (Online! 2.0)
were alreday there.  We downloaded a list of the available software, who runs
the BBS, a list of the 10 Best Pirate Boards in the USA, and a picture of
the 1984 SYSOP, Ken Van Kley. All of these are included in this message.
The picture of Mr. Van Kley is uuencoded.  uudecode and then use your
favourite IFF reader.  As it turns out this is a crime that falls through
the cracks.  For the local police it is "too big". For the FBI it is "too
small", they want proof that more than $ 500,000 are involved.  These are
fast boards (mostly 2400 bauds) and ARC all the commercial packages (and
their documentation), so it probably takes 5 to 10 minutes for an average
software package.  The only option is to sue them.  Unfortunately most
current Amiga developers are < 5 people operations and definitely cannot
afford that.  Only the few medium-sized companies involved with the Amiga
have a legal department that can try to do something.  The list that follows
has the "Top 10 Amiga Pirate Boards". We checked a few of them and they all
have mostly the same 100-200 commercial titles in there.  Rumor has it that
there are about 50 Amiga Pirate boards up and running. 

But let's give out some names and addresses. The jerk that runs 1984 lives
at:

-1984- BBS
c/o Ken Van Kley
625 Sheridan
Dolton, IL 60419
(312) 841-2401

Feel free to call him and let him know what you think about piracy.  Let me
also point out that the "people" that download commercial software are as
criminals as Mr. Van Kley.  No question about it.  Maybe in another message
I'll post the list of names and addresses (some of these people leave their
"real" names and addresses in there).  Some of them are also on Usenet.

Sorry if we remain anonymous, but these guys can be VERY mean.

What follows are three things. A list of the top ten Pirate Boards.  The
list of commercial software on 1984 and a picture of Mr. Van Kley.  After
seeing this, all this talk about copy protection vs. non-copy protection
seems just like bullshit to me.

------ Unedited downloads

               THE TOP TEN IN THE AMIGA PIRATING BOARD WORLD
               ---------------------------------------------

                      Darth Vader's Pirate Board List
                      -------------------------------
                              April 17,1987

Listed in order of rating
-------------------------

1)The Portal (614) 237-0285
This board runs at 2400 baud and has 64 MEGS of storage space and runs on
BBS-PC!.  This board is VERY active and an EXCELLENT board in terms of
files.  The messages are very plentiful and they get the new stuff FAST.  In
my opinion, the best pirate board in the country.

2)The Black Chamber (714) 646-2723
This board runs at 2400 baud and has 20 MEGS of storage space and runs on
BBS-PC!.  This board is active but dying FAST.  The files have slackened off
considerably.  Although many files are posted each day, they are mostly old
and out of date files.  The message base doesn't have anything interesting
going on.  Maybe this board will pick up, but from the looks of it probably
not.  Oh well, you have to topple sometime.

3)1984 (312) 841-2401
This board set up an Amiga pirate section a few weeks ago and is doing
GREAT!  It has 43 MEGS of storage space and runs at 2400 baud on BBS-PC!.
This board gets MANY good files a day and the message base is certainly
active.  With a nice sysop, it makes this board complete.  The only reason
this board is not #2, is that it lacks as much time as the Black Chamber has
had and subsequently less files BUT the new files are up there FAST.  An
excellent board.  Give this one a call.  It rivals the Black Chamber and
Portal easily.

4)Under*Worlde (614) 451-3622
This board runs at 2400 baud and has 20 MEGS of storage and runs on BBS-PC!.
This board is improving quickly and is fairly active.  Give it a call.  It
is NOT accessible via PC-Pursuit.  The sysop is nice but however it is
slackening off in files a bit.  Not too many good uploads a day.

5)Magnolia (205) 854-6407
This board runs at 2400 baud with 60 MEGS of storage and runs on
PC-BBS.  This board is active and has many good pirate files.  The sysop is
EXTREMELY kind and I like her a lot.  However, the files also seem to be
slackening off.

6)San Antonio Amiga (512) 684-3433
This board runs at 1200 baud with 20 MEGS of storage and runs on BBS-PC!.
This is fairly good and has quite a few pirated programs however the pirate
section is a bit inactive.  It is NOT accessible via PC-Pursuit.

7)Amiga Connection (301) 445-3777
This board runs at 1200 baud with 20 MEGS of storage and runs on BBS-PC!
This board shows some potential.  It has an anarchy section but is hardly
improving.  This board is accessible by PC-Pursuit.  You now require to
upload Sign.txt found on 1984 and other boards.  The board is SLOW in files.
Only about 1 file every 2 days.

8)Amiga Central (801) 943-2011
This board runs at 1200 baud with only 2 drives of storage and runs on
BBS-PC!  The board seems to be dying the past week or so.  Files are getting
up slowly there and there really is not much anymore.  Maybe when he gets 20
MEGS with 2400 baud things will pick up.  Who knows?

9)Pulsar (213) 325-8925
This board runs at 2400 baud and has 40 MEGS of storage and runs on P-BBS.
All in all, this board stinks.  I am mentioning cause the sysop is taking it
down May 1 and will put it back up late summer (I am sure we will all forget
about it by then).  Anyway the files are terrible.  They upload one part of
a two part program and don't upload the other part or the files were badly
uploaded and not deleted!  The sysop take terrible care of the files.  The
message is DEAD.  Nothing.  We can all forget about this board for a LONG
while.

10)The New Age (213) 559-4948
DON'T call this board.  I am mentioning it cause the sysop asked me to tell
everyone that he is DELETING all pirates that try to log on.  However he
just got a 150 MEG hard drive (WOW!) and will set up a section shortly.
However until further notice is posted DON't call.

Frankly, this month has been pretty poor in boards.
The only two that are doing well and keeping up the standard (or improving)
are 1984 and Portal.  The Black Chamber seems dying as well as others.
Hopefully things will pick up but who knows?  Anyway, so call the two most
active boards in the country at the moment, Portal and 1984.  PLEASE PLEASE
pass this file around for the sake of the the New Age.  Thank you.  I will
update this regularly.

Greats of the Pirating World
----------------------------
The Fed - Co-sysop of 1984
Big Brother - Sysop of 1984
Sysop of Portal
The Cure - Co-sysop of Amiga Central
Southern Star - Sysop of Magnolia
Nemesis - Sysop of Underworlde
Data Bandit - Sysop of Amiga Central
Tapper

Losers of the Pirating World
----------------------------
Fast Scan - once sysop of Antartica
Wayne Hoover - sysop of Pulsar
Disk Rigger - co-sysop of Black Chamber


Natural list of files - XX-JUN-87  XX:YY PM

SURGEON.ARC     13-APR-87  61824-B  Cracked main file - No word check!
CSBASEBALL.D    13-APR-87   1920-T  MUCH BETTER docs for Champ. Baseball!
DEVPACAM.ARC    22-MAY-87  78720-B  HiSoft Assemble/editor/debooger...
HACK2DOC.ARC    06-MAY-87  21632-B  HACKER II DOCS
BOMBS2.TXT      21-MAY-87  16512-T  BIGGER BOMBS-DANGEROUS PLEASE BE CAREFUL
LINT2.0.ARC     05-MAY-87  82944-B  Amiga Lint version 2.0
GOLF.ARC        02-MAY-87 331008-B  gamestar golf
CLTD-HD.ARC     04-MAY-87  57600-B  Cltd fast HD routine for 1.3 beta
JDKFONTS.ARC    30-APR-87 114688-B  NON-TRACKERED video fonts - see msg 2011
GRID-NFL.ARC    01-JUN-87 231552-B  Gridiron team data disk
M-SCOPE.ARC     05-MAY-87  20864-B  Memory utilities
CONVENTIONS.    29-APR-87  10496-T  Conventions for ARCing - PLEASE READ
FLIPSIDE.ARC    29-APR-87  68224-B  Commercial util. to print sideways
MAFDOCUD.ARC    28-APR-87  13824-B  MiAmigaFile IIsgOg DOC Update
ROADWAR2000.    12-JUN-87 299136-B  SSI Roadwar 2000 There BEST YET!
HIJINX.ARC      27-APR-87 115584-B  Infocom Hollywood Hijinx
DMP101.ARC      27-APR-87   4736-B  PatchNEW DeluxeMusic to BREAK it!
DIAL1.ARC       21-MAY-87  18688-B  phreaking program, code scanner
CALCRAFT.ARC    30-APR-87  85120-B  Spreadsheet (not as good as Analyze!)
DOMINO.ARC      21-APR-87  65024-B  Dominoes from Polyglot Software
M18HELL.ARC     21-APR-87  67200-B  Golf in Hell courses for Mean 18 - hard
CMON.ARC        21-APR-87  26368-B  assembler/de-assembler from Germany
EARL3.ARC       31-MAY-87 172928-B  Earl Weaver Baseball (Part 3) *Lucifer*
EARL2.ARC       30-MAY-87 138112-B  Part 2 of Earl Weaver Baseball
SOUNDSCAPE.A    14-APR-87 558080-B  Soundscape Sequencer 1.4 - arc & tracker
SACREATOR.AR    14-APR-87   4736-B  Creates screens for Stoneage
ROCKY.ARC       20-APR-87  15360-B  Rocky Horror for DMCS
GIZMOZ2.ARC     26-APR-87  61056-B  UPDATE FILES FOR GIZMOZ 2.0
ROUND.ARC       20-APR-87   8832-B  Roundabout by Yes DMCS
SPLITTER.ARC    20-APR-87  11648-B  Splits and unsplits large files for tran
LIGHT2.ARC      13-APR-87 107648-B  Another great Light Circle Demo!
FACC.ARC        02-JUN-87  21760-B  Floppy Drive Accelerator-ASDG -Lucifer-
SSPICS.ARC      20-APR-87   9472-B  Pictures of ships for Silent Service
DEJAVU.ARC      04-JUN-87 479872-B  Deja-Vu w/hints  just arc'ed
DP2_DOCS.ARC    13-APR-87  21888-B  Deluxe Paint II docs
DME122.ARC      13-APR-87  35968-B  Editor... nice
SD.ARC          31-MAY-87  65536-B  SuperDisk - nice disk hacker
ZKEYSDOC.ARC    02-JUN-87  41728-B  Doc for Zing Keys in Scribble format
FFF.ARC         21-MAY-87 161408-B  Flesh For Fantasy - Read Msg #2465
NEWOUT.ARC      02-JUN-87  36864-B  Newest version Outline from PAR
CITYDEF.ARC     24-APR-87  10368-B  City Defense Demo... smallest ware ever
AREATIMER.AR    12-APR-87  14464-B  This adds up your fone bill will you cal
WL.ARC          02-JUN-87  12032-B  White Light. copier - fast format nice
BARDSMAP.PIC    11-MAR-87  17920-B  Map of Skara Brae... IFF
MINDWALK.DOC    11-MAR-87   7168-T  Mind Walker docs
ARENA.DOC       11-MAR-87  14848-T  Docs to Arena
GHOST!.ARC      30-MAY-87 290304-B  Text/Graphics Adventure - Read Msg 2512
CARD.TXT        20-APR-87   9472-T  More info on carding
MIRROR.DOC      20-APR-87  11776-T  Docs to the Hacker Mirror Package
PIRATE.BOARD    19-APR-87   4992-T  The TOP TEN Pirate boards - READ!!!!
PUZPICS.ARC     18-APR-87  43776-B  MagicPicturePuzzle Pics-2 of 2-Not Req'd
LGOP.SOL        17-APR-87  44928-T  Leather Goddesses Solution (Detailed!)
M18.ARC         16-MAR-87 133760-B  Mean 18 Greatest Golf Courses Vol. 2
REFLECT3.ARC    13-MAR-87   3840-B  Reflector3.. copies recent mirror
TEMPLAAN.ARC    13-MAR-87  39936-B  Templates for Analyze!
PAWN.TXT        13-MAR-87  33792-B  Docs/hints for the Pawn
BARDS.DOC       16-MAR-87  74624-T  Complete docs to Bard's Tale
EARL1.ARC       30-MAY-87  62080-B  Earl Weaver Baseball - Read Msg 2513
SILENT1.ARC     13-MAR-87 184064-B  part 1 of 2 of Silent Service
SILENT2.ARC     13-MAR-87 145152-B  part 2 of 2 of Silent Service
TCPLUS.ARC      14-MAR-87 257920-B  Text Craft Plus (ok)
EXPLORER.ARC    12-APR-87  37120-B  New editor utility
CLITUTOR.ARC    12-APR-87   7296-B  Help utility for CLI
UN2.ARC         16-APR-87 252800-B  Uninvited - part 2 of 2
AF_CHAR.ARC     24-JUN-87   8832-B  Great AlienFires character!!!
EARL4.ARC       31-MAY-87   2304-B  Last part of Earl Weaver Baseball
PASCAL.ARC      23-JUN-87 147200-B  metacomco pascal   (real nice language)
ONLINE2.ARC     24-JUN-87 131072-B  Online! 2.0 Main files.
LISP.ARC        14-APR-87 187520-B  Cambridge LISP - for seriousrogrammers
NOUT.ARC        22-JUN-87  38144-B  Third update of PAR's Outline
MAXICOM3.ARC    22-JUN-87  61056-B  Maxicom version 3.0
STONE-C.ARC     22-JUN-87  74496-B  C version of StoneAge-fast w/digi sound
EMPIRE.ARC      21-JUN-87 155648-B  Empire...the game.
D2D2.0.ARC      21-JUN-87  41088-B  Disk to Disk version 2.0.
MAF2SG.ARC      21-JUN-87 101120-B  MiAmiga (aka Softwood) File IIsg
KAMP3.ARC       20-JUN-87   3200-B  Kampfgruppe. Missing File -- works --
KAMP2.ARC       20-JUN-87 111488-B  Kamfgruppe.  Part 2 of 3
SILENTRAM.AR    19-JUN-87  17152-B  Sets up Silent Service to run from Ram:
CHALLENGE.AR    19-JUN-87 238592-B  Challenge, better then Zeycude.
FIIF.ARC        19-JUN-87  25088-B  Fruit II Friend, Apple II -> Amiga R/W/F
O_MASTER.ARC    03-JUN-87  64000-B  Othello Master - from the New Age
HOLLYFIX.ARC    18-JUN-87  31744-B  Fix for corrupt Hollywood Poker picture
ZINGKEYS.ARC    18-JUN-87 164352-B  Zingkeys macro utility.
HARDHAT.ARC     17-JUN-87  48512-B  Commercial HD backup program
NOUTLINE.ARC    17-JUN-87  36864-B  Lates version of outline from PAR
ZKEYDOC.ARC     16-JUN-87  41728-B  Complete Docs for Zing Keys!!
D2D16.ARC       16-JUN-87  21632-B  DOS 2 DOS v1.6 - does ST disks as well
KAMPF.TXT       16-JUN-87   7424-T  Codes for Kampfgruppe
ALIEN.DOCS      16-JUN-87   8064-T  Set of docs for Alien Fires
AFCHAR.ARC      16-JUN-87   8832-B  Superman type character for AlienFires!
DRAWDAT1.ARC    15-JUN-87 156800-B  Aegis Draw data disk - part 1 of 2
DRAWDAT2.ARC    15-JUN-87 109312-B  Aegis Draw data disk - part 2 of 2
PROVIDEO.ARC    15-JUN-87 182400-B  CGI provideo character generator
TXED.ARC        15-JUN-87  18048-B  text editor for amiga. very good.
FTM.ARC         22-MAY-87 136448-B  Financial Time Machine stock game.
AC-BASIC.ARC    14-JUN-87 233088-B  AmigaBasic Compiler. Better than TrueBas
NEWPRISM.ARC    13-JUN-87  92032-B  Prism version 2.0
ALIEN1.ARC      13-JUN-87 416512-B  Re-upload of Alien Fires. Part 1 of 3.
ALIEN2.ARC      13-JUN-87 337024-B  Alien Fires. Part 2 of 3
ALIEN3.ARC      13-JUN-87 252544-B  Alien Fires. Part 3 of 3
UN1.ARC         16-APR-87 251904-B  Uninvited - Part 1 of 2.
DIGAREDIAL      15-APR-87    256-T  Script commands for redialing w/ Diga
HOLLY4.ARC      12-JUN-87 196736-B  Hollywood Strip Poker - Part 4
HOLLY3.ARC      12-JUN-87 177024-B  Hollywood Strip Poker part 3
HOLLY2.ARC      12-JUN-87 190208-B  Part 2 of Hollywood Strip Poker
HOLLY1.ARC      12-JUN-87 150144-B  Hollywood Strip Poker pt1-Read msg 2765
BUTCHDOC.ARC    21-MAY-87   8704-B  Full documentation for The Butcher
AESOP.ARC       11-JUN-87 315648-B  Aesop's Fables - not bad for kids
DIGA.ZOO        30-MAY-87 331776-B  Release version of Diga!
DISKPRO.ARC     22-MAY-87  71168-B  Compress Decompress prg to save dsk room
SINBAD-D.ARC    10-APR-87 197888-B  Sinbad part 4 of 4   disk 2
SKETRM2.ARC     10-APR-87 111744-B  sketerm v2.0  NOT BAD!! Macros,REDIAL
BOBACK.ARC      10-APR-87  21376-B  Fix for bad file in World Games
MANX34P3.ARC    11-APR-87   7552-B  Latest bug fixes for Aztec 3.4a -a must
STARFLEET.DO    10-APR-87  10880-T  Starfleet docs
MINDSHAD.SOL    10-APR-87   4864-T  Mindshadow solution
BOP.DOC         10-APR-87  26496-T  Docs for Balance of Power
GUILD2.ARC      09-JUN-87 468224-B  GUILD OF THIEVES - better than THE PAWN
GUILD1.ARC      09-JUN-87   2304-B  GUILD OF THIEVES - sequel to THE PAWN
DSK2DSK.ARC     07-MAY-87  39296-B  TRANSFER C-64/128 FILE]S TO AMIGA
CALLIG.ARC      07-MAY-87 106880-B  Calligrapher font editor - impressive
MDEBUG.ARC      07-MAY-87  21120-B  MetaComco Debug Utilities for SeriousPro
FAERY.DOC       09-MAY-87  10624-B  complete docs to faery tale
BUREA.DOC       09-MAY-87   9088-T  Bureacracy Docs.
GRABBIT.ARC     09-MAY-87 107392-B  Grabbit Utilities, WYSIWYG.
DIGIVIEW.ARC    10-MAY-87 124672-B  Digi-view software version 2.0.
HOTMISS.ARC     08-JUN-87  50176-B  Scramble like game-Hotline Mission
FAERY.DOCS      10-MAY-87  10880-B  docs to fairy tale
FATALE.ARC      10-MAY-87  35968-B  COMPLETE DOCS & MAP.PIC FAERY TALE ADVEN
BAZBO.ARC       10-MAY-87  11008-B  Copy Program from Israel-Commercial-OK
DIMMER!.ARC     08-JUN-87  26240-B  Screen Dimmer- Par
FPIC.ARC        10-MAY-87  77568-B  another drawing pro.
SWOOPER.ARC     08-JUN-87 217216-B  GALAGA TYPE SPACE GAME WITH NICE SOUNDS
ALIENFIRES.D    07-JUN-87   8064-T  Short docs to Alien Fires 2199 AD
LUVQUEST.ARC    11-MAY-87 122752-B  Love Quest - find your mate
GALILEO.ARC     11-MAY-87 190080-B  Galileo - Astronomy program
FDOCMAP.ARC     12-MAY-87  36224-B  QUALITY MAP!! AND DOCS FOR FAERY TALE!!!
D2D.DOC         13-MAY-87   6272-T  DOCS TO DISK TO DISK
HOLIDAY.ARC     13-MAY-87 140416-B  ELECTRONICS ARTS GRAPHICS DISK
NET.ARC         08-JUN-87  65024-B  Networking software for Amiga
DIAGNOST.ARC    06-JUN-87  34560-B  Amiga Diagnostics-Commercial Release
NEWFF.ARC       02-JUN-87  41728-B  Newest version of Fast Fonts
CUSTSCRN.ARC    06-JUN-87  94720-B  Custom Screens- Commercial Release
GALILEO.TXT     14-MAY-87   1408-T  MOST OF THE CODES FOR GALILEO
DOS2DOS.ARC     14-MAY-87  40832-B  IBM <==> Amiga. Not a bad program
MAR2CODE.ARC    14-MAY-87  21376-B  Marauder II 1.0c AUTO-Codefinder
KAMP1.ARC       06-JUN-87  81152-B  First part of SSI's Kampgruppe
NPRISM.ARC      16-MAY-87  92032-B  New Prism Converts Pics when Loaded
LITTLE.TXT      06-JUN-87   3456-T  Mini-docs for Little Computer People
SCRIBBLE!.TX    06-JUN-87   4736-B  Small help file for Scribble!
INFOTATOR.TX    06-JUN-87   3584-B  Infotator needed for Sorcerer
BARDMAPS.ARC    17-MAY-87  26112-B  Maps to Bards Tale
BARDMAP2.ARC    17-MAY-87  35840-B  Underground maps to Bards Tale
SUPERHUEY.DO    06-JUN-87   8704-B  Docs to Superhuey
ATALKPLUS.AR    18-MAY-87  90624-B  A-Talk Plus - Term/Tektronix Emulator
BOMBS.TXT       20-MAY-87  11264-T  HHOW TRO MAKE LITTLE BOMBS AND M-80'S
SETKEY.ARC      05-JUN-87  54784-B  Makes Keymaps. Strings for funkeys must!

157 File(s) listed


begin 644 vankley.uue
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(&AH:&AH:&AH!
 
end

mwm@eris.BERKELEY.EDU (Mike (My watch has windows) Meyer) (07/13/87)

In article <240@uscacsc.UUCP> do.not.reply writes:
<
<With this VERY LONG message I'd like to take you to the underworld of Amiga
<computing:  the world of Amiga Pirate Boards.

Thanx for providing some hard data for us to look at. Some comments
follow.

<A few weeks ago we were tipped by a user that had reached a BBS in Illinois,
<named 1984.  What we found in there was astonishing. Basically a software
<library larger than Go Amigo.  Any non-copy protected program for the Amiga
<was there. More than 150 titles.

I think you're stretching the count a little. There were 157 *FILES*.
Some *titles* stretched across 3 or more files. Some of the stuff was
*not* pirated software, but stuff they could legally pass on. Other
stuff was DMCS files for songs - which carry copyrights, so that them
being publicly available is illegal, but they don't constitute
software titles.

You also forgot to point out that a fair number of the titles were
copy protected. Including some of the EA titles which Mitsu claimed
couldn't be pirated. There was also some "look up the word in the
manual" type stuff.

Anyone interested in an exact rundown for the entire list? I'd be
willing to do it.

<As it turns out this is a crime that falls through
<the cracks.  For the local police it is "too big". For the FBI it is "too
<small", they want proof that more than $ 500,000 are involved.

Have you tried contating the state-level police forces? Some states
have a <state> Bureau of Investigation. These kind of thing should be
right up their alley.

<The list that follows has the "Top 10 Amiga Pirate Boards".

I'm rather relieved that the "Top 10 Amiga Pirate Boards" reached
"going away" and "do not call" boards before it got to the end. I'd
figured that there should be at least 20-30 serious pirate boards
around. Then again, this may just reflect the general low level of
interest in the Amiga.

<Feel free to call him and let him know what you think about piracy.

Uh, what you've just recommended is called "harassment." It's as
illegal as stealing software. It's also the kind of things that gets
uucp connections yanked. I mean, you might as well recommend that
people put him in their uucp L.sys file, and then send mail to him at
4am.

Although what you're recommending is done so for a good cause, it's not
a good idea. The government frowns on people taking the law into their
own hands.

<After seeing this, all this talk about copy protection vs. non-copy
<protection seems just like bullshit to me.

Yup. Considering that every form of copy protection I'm familiar with
was used for one or more of the programs in the list, I'd agree that
copy protection was so much bullshit.

	<mike
--
But I'll survive, no you won't catch me,		Mike Meyer
I'll resist the urge that is tempting me,		ucbvax!mwm
I'll avert my eyes, keep you off my knee,		mwm@berkeley.edu
But it feels so good when you talk to me.		mwm@ucbjade.BITNET

mjp@spice.cs.cmu.edu (Michael Portuesi) (07/13/87)

Keywords:


Re: Amiga Software Piracy (names, addresses, numbers and pictures)

guest@uscacsc.UUCP (guest) (and with good reason, too) writes:

> What follows are three things. A list of the top ten Pirate Boards.  The
> list of commercial software on 1984 and a picture of Mr. Van Kley.  After
> seeing this, all this talk about copy protection vs. non-copy protection
> seems just like bullshit to me.

I'm interested in hearing how some of the software developers feel
after seeing this.  Some of the software on that list comes from
people here on the net -- Infinity Software, Felsina Software, and
ASDG, to name a few.  I have a few points I'd like to make:

1) All copy protection schemes can be broken.  I noticed that Silent
Service was there -- wasn't that copy protected so well that the
original didn't work?  I'll put myself in the position of a commercial
software developer for a moment.  I am now the president of MegaWare,
Ltd.  My entire operation is < 5 people.  Developing some far-out copy
protection scheme will cost me a lot of money, and they're going to
pirate my software just the same.  Why should I copy protect something
if I stand to lose even more money from it?  Dropping out of the Amiga
software market won't help me...there are pirates for every computer.
Dropping out of the market entirely doesn't help me...then I make no
income at all.  Perhaps RMS had it right in the first place.  Maybe I
don't want to make an income from my software, but produce software
for the benefit of other software in return.

2) I didn't see either the Lattice or the Manx compiler in that list.
Perhaps that's because they're unusable without the documentation, and
the documentation is much too difficult to duplicate.  That's the
reason why Borland publishes the Turbo Pascal manual as a small
paperbound book -- It's damn hard to duplicate it in that form (won't
fit in the sheet feeder), and using TP is pretty difficult without it.
Of course, not every application is unusable without the manual.

3) Too bad we don't all have Digi-Views...I'd like to see what some of
the faces behind the message headers look like.

				--M

-- 

Mike Portuesi / Carnegie-Mellon University Computer Science Department
ARPA:	mjp@spice.cs.cmu.edu	UUCP: {backbone-site}!spice.cs.cmu.edu!mjp
BITNET:	rainwalker@drycas (a uVax-1 run by CMU Computer Club...tons o' fun)

"Paradise is exactly like where you are right now...only much, much better"
			--Laurie Anderson, "Lanugage is a Virus"

spencer@eris.UUCP (07/14/87)

In article <1234@spice.cs.cmu.edu> mjp@spice.cs.cmu.edu (Michael Portuesi) writes:
>
>I'm interested in hearing how some of the software developers feel
>after seeing this.  Some of the software on that list comes from
>people here on the net -- Infinity Software, Felsina Software, and
>ASDG, to name a few.  I have a few points I'd like to make:
>
 Well to be honest I was somewhat shocked by the list, but I kind of
expected it.  I have lots of friends who just "like" to pirate software.
They don't do it to rip off people, they just feel that they have
completed something.  I have the same tendancy.  I will go the the
newstand and see the new issue of Byte, not finding anything good in
the issue I will still buy it.  I just want to have ALL of the issues.
I think this is the same thing with pirates.  Kind of like baseball
cards.  So Galileo is out there for free, I don't know that alot of
people who get it from there :'( would have gone out and bought our
program anyway.  We didn't loose much money and there is the
possibility that someone will hear about our program that wouldn't
have otherwise.  Of course, Mike (powered by M & M's) Smithwick is
also on this net, he wrote the program, I don't know how he feels...

What I really feel is a shame is that FACC is there already.  I have
seen it in too many homes already of people who didn't purchase it.  I
have been really happy with it (I have four disk drives on my 2000).
What really struck most strongly was on the back of the FACC disk box
it says "This disk is not copy protected.  ASDG has served the Amiga
community well (remember the ASDG Recoverable Ram Disk); please don't
pirate our software." Boy that line was better than any copy
protection.  I just kept remembering that stupid $10 that I ment to
send in for that RRD that I never ended up doing.  Boy, I haven't even
let people SEE my FACC disk, let alone copy it.

I sure wish that Infinity could afford to ship programs with NO
protection, at least our new DeskTop Publishing program isn't protected.

>3) Too bad we don't all have Digi-Views...I'd like to see what some of
>the faces behind the message headers look like.
>
What happened?  I recently did a "Bay Area" posting of the photo that
Arthur Abrahams took of the BADGE meeting with the ALive and I have
only gotten one reply.  I want mail from everyone who got my posting
or I am going to post it to the entire state! 

>Mike Portuesi / Carnegie-Mellon University Computer Science Department
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Randy Spencer      P.O. Box 4542   Berkeley  CA  94704        (415)284-4740 
                         I N F I N I T Y                 BBS: (415)283-5469
Now working for          |||||||||||::::... . .                    BUD-LINX
But in no way            |||||||||||||||::::.. .. .
Officially representing  ||||||||||||:::::... ..    ....ucbvax!mica!spencer
                         s o f t w a r e          spencer@mica.berkeley.edu
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

dclemans@mntgfx.MENTOR.COM (Dave Clemans) (07/15/87)

Note that you don't have to find these kind of criminals alone.

As an example, about a year or a year and a half ago, a group of Atari ST
software publishers (representing about 75-80% of the Atari ST market)
got together with ADAPSO (?)  against a similar pirate BBS.  They won their
court fight easily.  If I remember right, I think a telephone hotline was
set up (at ADAPSO?) for people to anonymously report other such boards.

I imagine that part of the attraction of attacking pirates as a group is
that there is no single individual or entity that other pirates can go after.

On other peoples comments about the reliability of copy protection on the
Amiga; there has definitely been serious reliability problems.  I know of
one local dealer that was experiencing a 50-60% "immediate" failure rate
on copy-protected Amiga products.  (By "immediate" I mean that the customer
would find that the program wouldn't work right out of the box because of
the copy protection, or would stop working after being loaded once or twice).
Since they had a policy of not forcing their customers to not wait a couple
of weeks for replacement disks after they've already bought a product,
they let customers trade if possible (thus depleting the stores inventory),
or if that wasn't possible and they had a good copy of that program with
the information to allow it to be copied by a "copy" program, they would
rewrite the users master disk.

keithd@cadovax.UUCP (Keith Doyle) (07/16/87)

In article <1234@spice.cs.cmu.edu> mjp@spice.cs.cmu.edu (Michael Portuesi) writes:
>Re: Amiga Software Piracy (names, addresses, numbers and pictures)
>1) All copy protection schemes can be broken.  I noticed that Silent
>Service was there -- wasn't that copy protected so well that the
>original didn't work?

Yeah, the cracked copy probably works better than the original.  This is
the kind of thing that really rankles my ass.  That pirate bbs had
a cracked copy of SoundScape 1.4.  I've been trying to backup my
legit copy for months with everybodies copy routine with no success.
I'm scared stiff that I'll be doing something great on it or be planning
to demo it to a large crowd just as the disk bytes the dust.  And here's
some pirates that have it broken.  Do I have to go to someone like them
to get piece of mind for my compositions?  SoundScape is not a game
program.  If you don't have a MIDI interface, a keyboard and/or synth,
and THE MANUAL, it's not very useful.  Star Wars copy-protection on a
program like that is nothing but pure irritation.

>2) I didn't see either the Lattice or the Manx compiler in that list.
>Perhaps that's because they're unusable without the documentation, and
>the documentation is much too difficult to duplicate.

AHA! Developers please note!  But at the same time, creating a game program
that needs documentation just for the sake of needing documentation makes
for some pretty dull games.  Fortunately for me, the Amiga is the first
computer I've owned (and I've had 8 or 9 in the last 8 years) that is
so much more useful in non-game ways, that I NEVER find the time or
inclination to play games on it.  


But really, mightn't it be a good idea to publish a list
of the top 10 NON-PIRATE boards?

Keith Doyle
#  {ucbvax,ihnp4,decvax}!trwrb!cadovax!keithd
#  cadovax!keithd@ucla-locus.arpa  Contel Business Systems 213-323-8170

mike@ames.arpa (Mike Smithwick) (07/17/87)

[mmmmmm]

(a bunch of stuff, Randy, you're too wordy :-)

>possibility that someone will hear about our program that wouldn't
>have otherwise.  Of course, Mike (powered by M & M's) Smithwick is
>also on this net, he wrote the program, I don't know how he feels...

I think I'll shoot myself.

Seriously, I'm wondering if I should be flattered that my program is being
pirated. 

One of the attractions of collecting pirated software is the collector
mentality ("Gee, you have only 123 titles, I've got 451!"). 
Baseball cards are an appropriate analogy. I was very upset when Randy first told me of this place, but I do realize that just because some slimeball pirates  
a program doesn't mean that he would've bought it in the first place. 

I'll be the first to admit that I've done my share of bootlegging with
the 64 a few years back and the Apple ][. Out of the couple of hundred
programs I had, were about 4 or 5 that I would've bought, the rest never
interested me whatsoever, except in the way I could boast about the 
numbers or new titles.

One way to discourage this whole business in the first place is to have
nothing to do with anyone who pirates stuff. Don't swap new fish disks with 
them, ignore them on the streets, don't let your kids play with theirs, don't 
sit on the same side of the church that they do. In general, let them 
know that they are not welcome.

Oh well. . .



-- 
				   *** mike (powered by M&Ms) smithwick ***
"ever felt like life was a game, and 
someone gave you the wrong instruction book?"
[discalimer : nope, I don't work for NASA, I take full blame for my ideas]

peter@sugar.UUCP (Peter da Silva) (07/19/87)

That's pretty impressive. I'd like to know how you can possibly support
copy protection after seeing all your protected programs cracked and uploaded
to a pirate bulletin board before they even come out. It's pretty obvious
to me that your protection isn't doing any good.

Actually, there are a couple of programs I'd like to download. The one to
unprotect DMCS (so I don't have to worry about my key disk giving out) sounds
pretty useful. (Yes, I know I can upgrade to the non copy-protected version
for another 20 bucks, but it galls me to pay $20 to remove something that
wasn't there in the first place. I regard DMCS as a utility, not a game, and
as such it shouldn't be protected.

Oh well, I know you won't agree with me, and everyone already has their own
opinion on this subject already (my mind's made up... don't bother me with
facts... I'm sure your mind is too). This is my one and only copy protection
posting.

Perhaps Commodore can do something, or get the cops to do something. Perhaps
you can sue them. It worked with the KKK.
-- 
-- Peter da Silva `-_-' ...!seismo!soma!uhnix1!sugar!peter (I said, NO PHOTOS!)

gary@eddie.MIT.EDU (Gary Samad) (07/24/87)

I don't believe that I haven't seen a single response to this pirate bbs
listing that said "I'm outraged!"

Well, consider this one!  I'M OUTRAGED!

The appropriate response to copy protected software is "Don't buy it."
NOT "Because they didn't trust me, I'm going to steal their product!"

Pirate bbs are an outrage!  I hope these guys are sued and shut down!

Does anyone know the ADAPSO "software piracy" phone number?

	Irked,
	  Gary

By the way, I'm surprised that noone noticed that many of these files
were MANUALS!  These guys are actually typing in the manuals!

mreed@leah.Albany.Edu ( Mike Reed) (07/24/87)

  I've seen lot's of discussion about how people should just let these
slime run their pirate boards, because the pirate boards are probably
not doing too much damage to sales.

  I saw one of my applications on that board's filelist. An application
that just came out, which has good utility, and is easy to use. It
was designed so that one could use it without constantly looking at the
manual. 

  So now I see my program pirated by some slime, AND the user community
just says, "well, its not damaging OUR sales".

  I know now what my next program is going to be. It's going to 
unprotect, and subsequently delete, every file on every storage device
attached to the machine it's run on. THEN i'll name it something cute,
like "DPAINT III beta", and upload it to one of those &@_^^#%* boards.

	Hack
	 +
      Destroy

conklin@msudoc.ee.mich-state.edu (Terry Conklin) (07/27/87)

This marks to date the most offense posting I have ever seen on the net.
While software piracy is certainly a problem in search of a solution,
this posters crime has LONG SINCE been solved - with jail!

A long time ago, there was a theory to the effect "End doesn't justify
the means." So I sure as hell wont allow this attempt to 'combat piracy'
justify it's _blatant_ illegality!

For the a** that put this up, let me clue you in on a few things about
the U.S. For one, people are "innocent until proven guilty." And strange
as it may seem, one of the reasons that's so is to prevent SLANDER.
Publishing someone's name to the net constitute EPIC misuse of the net.
You're not kidding it was smart to be "guest," but not because the
pirates will get you, anyone with a sense of law is out to get you too!

Here's another mystic concept for you. "The accused has a right to know
his accuser." That too is prevent slander and self crowned vigilantes.
And to prevent every crook from phoning in 'anonymous tips' on someone
they aren't happy with. But criminals prefer to be anonymous...

But perhaps the lowest thing of all is the inclusion of a photograph.
You have NO way of knowing that's legit.  It could be a picture of
ANYONE, from anywhere. Not only might the pirate board have used someone
else's picture, YOU could have used someone else's picture. Pirates
aren't stupid! They're NOT going to have THEIR picture up there! You have
utterly NO way of gaurenteeing that person's innocence, and you have
posted his picture to tens of thousands of sites as a THIEF.

Well theives may be, but I am far more concerned with putting a legal
rapist like you behind bars. And yet, it seem unimaginable that any
honest person would be so flagrant and vile. My guess is that you ARE a
pirate, perhaps one of the "losers," trying to get back at other legit
boards or pirate friends who shunned you.

And now that you've posted these numbers to the net, any that are pirate
will do 10 times the distribution they did before! 10 TIMES the damage.
Who are you trying to kid?! How many number are people homes?

Just stay off the net and let us stick to legal answers to piracy.

Terry Conklin
ihnp4!msudoc!conklin
conklin@cps.msu.edu

scotty@l5comp.UUCP (Scott Turner) (07/27/87)

In article <451@leah.Albany.Edu> mreed@leah.Albany.Edu ( Mike Reed) writes:
>  So now I see my program pirated by some slime, AND the user community
>just says, "well, its not damaging OUR sales".
>
>  I know now what my next program is going to be. It's going to 
>unprotect, and subsequently delete, every file on every storage device
>attached to the machine it's run on. THEN i'll name it something cute,
>like "DPAINT III beta", and upload it to one of those &@_^^#%* boards.
Just when I think there is hope for man kind I see a NEANDERTHAL message
like the above. "Your dog pissed on my bushes, I'm gonna kill your dog."

Wouldn't it be wonderful if the world were that simple again? Anarchy at
it's best. Something offends you, you go out and blast it. As the ultra-
feminists would say "A red-meat eating macho-male's fantasy realized".

The world however isn't that simple anymore. Take for example the following
thoughts...

FIRST these "pirates" are not raping/killing/mad dog animals. People like
to make them out as such, which is dangerous. If one of these people is
caught and brought to trial and it turns out he/she is a 16 year old bright
computer phreak who was just fooling around... You get what we have over in
comp.sys.mac. You should go read it, it's sure to really make your blood
boil over. There's an article in there from France trying to drum up
support for a CONVICTED "pirate"! They want to raise money etc to appeal
his conviction even though they freely admit he is a "pirate". But hey, the
guy wasn't doing it to hurt anyone etc etc etc...

SECOND these "pirates" provide a "service" that more than a few people value
highly, the removal of user traps from software. They actually have people
who support them because they're doing something they like. Sort of like
how we support the "Contras" because we want a democratic govt down there,
even though no one would want to live with a "Contra". The ol' "Sure they
may be doing XXX, which I personally don't agree with, but they're also
doing YYY which I do appreciate!" I can see the bumper sticker now: "Support
your local pirate, the program he breaks may be one you use!"

THIRD copyright law is damn tricky from what I understand. Let's try a few
"fer instances" and see what you make of them:

What if the software on a board raided was purchased by the sysop? What could
be done about the sysop of that board? After all it would be the people USING
the board that violated the copyright law.

What could be done to the downloaders of software from these boards if they
already owned legal copies of the software they were downloading? Say they
were downloading a DMCS minus the user traps?

And even worse, what if the boards were to get "savvy" and post a banner on
their BBS saying:

	"You can only download items off this BBS if you already own a
	legitimate copy of the software you download. This BBS is run to
	provide people with a) current revisions of programs b)
	de-trapped versions of programs. Proceeding beyond this banner
	means you agree with the terms stated."

Sort of like the "All models over the age of 18" or "By my signature I indicate
the materials I've ordered will not violate the 'community standards' of my
area" clauses that allowed smut pushers to go almost legit.

Wouldn't is be a howl to see a software vendor try to skewer a "pirate" for
operating a board under the above "shrink wrap license"? :) They might bag
the "pirate" only to leave themselves open for lawsuits under their newly
invalidated licenses.

But enough about the "pirates", back to your stated line of macho-male-ego
salve.

I think the term "murder" describes what you intend to do with your little
program.

While the "pirates" may have people willing to stand up and defend some of
their actions, I don't know of many people who would stand up and support a
"murderer". If all you did was bag a few pirates there would be those who
would stand up and say "They drove him over the edge!", but if your program
bagged a few "innocent" people you'd become public enemy # 1.

How could that happen? After all I'm sure you're asking "But anyone calling
that BBS to download that program would HAVE to be a pirate!" THINK! What
would a pirate do with such a program? Why more than likely he/she would
take it and start uploading it elsewhere, say CI$, GEnie, Usenet, local non-
pirate BBSes... I'm sure you get the picture.

Or maybe they'll get "smart" and use it to deflect attention from themselves
by saying "Hey look! There's a mad dog running loose writing programs that
could murder your computer! Let's go get him/her!!"

I hope you are willing to face the firing squad/mob if you carry out your
plans.

Maybe you should cool off and think of a better way to go after these people?

And for those that might read all the above and say I'm pro-Pirate. BS, I'm
pro-THINKING! I'm anti-NEANDERTHAL thinking. And I'm sure as hell anti-Trojan
horse.

Scott Turner
-- 
UUCP-stick: stride!l5comp!scotty | If you want to injure my goldfish just make
UUCP-auto: scotty@l5comp.UUCP    | sure I don't run up a vet bill.
GEnie: JST			 | "The bombs drop in 5 minutes" R. Reagan
		Disclaimer? I own L5 Computing. Isn't that enough?

sbmueller@watmath.UUCP (07/28/87)

In article <451@leah.Albany.Edu> mreed@leah.Albany.Edu ( Mike Reed) writes:
>
>  I know now what my next program is going to be. It's going to 
>unprotect, and subsequently delete, every file on every storage device
>attached to the machine it's run on. THEN i'll name it something cute,
>like "DPAINT III beta", and upload it to one of those &@_^^#%* boards.

Warning: wrist-slapping ahead.
Disclaimer: I didn't see no smiley, so I assume you mean it.

Trojan horses are not a new idea.  The MS-DOS world (for once :-)
is ahead of us (we?) Amigans.  Anybody got a copy of ARC v5.14 for
their PC?  Suffice it to say that people get more pissed off by
having their entire hard disk erased than by any form of copy-protection
(except of course if the copy protection involves erasing their hard disk :-).
Yeah, sure, you're only gonna upload it to slime boards.  Some slime is going
to put it on a disk with public domain stuff, and the rest of us will have to
deal with it too.
Also, despite all the EA bashing, nobody's gonna tell me DPAINT ain't a great
program.  Is it fair to associate EA with disk trashing? (I mean, when it
isn't their fault :-)

End of wrist-slap zone.  You may now resume your reading.

BTW I have opinions on copy protection.  I even have some points I believe
haven't been mentioned before.  I am, however, not going to inflict them on
anyone.  (Just thot you'd like to know :-)  

Other irrelevant facts (which I just have to mention):
I get all my software from Fred Fish.  Thanks Fred.
As soon as I start my next work term, Perry and others are getting mail from
me. (Yes, with checks in the envelopes)

Given quantity of :-)'s in this posting, mayB I shud x-post to rec.humor?

Have a nice day.
>
>	Hack
>	 +
>      Destroy
       ^^^^^^^
I always thot it was Hack & Slash.

APD: ||~
(all purpose disclaimer: Or Not)

--------------------------------------------------------------------------------
"Na na na naaa" - The Beatles                        Amiga (TM?)                
"Who Ha, Whoha" - FGTH             This space               //    Bizarre/Design
"Aah, aah" - Queen                 currently               //       Twisted/Fate
                                   under               \\ //               DY/DX
"Has anyone seen my marbles?"      construction.        \//          Body/Fisher
  - SBMUELLER@WATMATH.UUCP                              Freak                   
--------------------------------------------@-#$--!@#$--$----#$%^&* parity error

mreed@leah.Albany.Edu ( Mike Reed) (07/29/87)

	After all those nasty responses... OK OKOKOKOK....I was wrong to
discuss (mention?) writing disk-trashing software to upload to pirate
boards; It was written in the extreme heat and anger caused by realizing
that efforts to make the software easy to use (a very large effort), were
helping those slime. It is a poor idea, etc. , etc.   


	BUT....THEN I read what someone else posted to the net in
response to my posting. YES, he noted that I was wrong (which was OK),
AND THEN tried to speak of the HELPFUL SERVICES those pirates do, such
as helping to de-bug software before the public has to, and other such
wonderful things. Luckily, I've calmed down about the whole issue. 

  	I think i'll post my next program to pirate boards for beta-
test....

     Hack
      +
    Employ
				
					Michael

scotty@l5comp.UUCP (Scott Turner) (08/02/87)

In article <10@nancy.UUCP> conklin@msudoc.UUCP writes:
>But perhaps the lowest thing of all is the inclusion of a photograph.
>You have NO way of knowing that's legit.  It could be a picture of
>ANYONE, from anywhere. Not only might the pirate board have used someone
>else's picture, YOU could have used someone else's picture. Pirates
>aren't stupid! They're NOT going to have THEIR picture up there! You have
>utterly NO way of gaurenteeing that person's innocence, and you have
>posted his picture to tens of thousands of sites as a THIEF.
If you had taken the time to DL and uudecode the picture attached to that
posting you MIGHT have noticed that it isn't real.

It's a "composite" picture. Like the picture of "Big Brother" in the recent
movie release of 1984.

It's made up of bits and pieces from alot of people, but is not the picture of
any single person. The symbolism of this picture and that of "Big Brother" is
somewhat deep if you think about it. No single "pirate" broke all the software
on that board that was posted, a whole bunch of people tossed in a program or
two. Much like a bunch of people tossed in a ear or nose etc to the picture.

I laughed my head off when I saw that picture. I laughed even harder when I
saw your followup posting.

Come on guys, how about a little research before we flame on around here?

Your thoughts on posting the phone number and then suggesting everyone give
the pirate a call are correct. If the poster of that message can be found by
the pirate he could be taken to court over his actions. Would be silly to
run around trying to bag the pirate only to wind up on the wrong side of the
court room yourself.

Scott Turner
-- 
UUCP-stick: stride!l5comp!scotty | If you want to injure my goldfish just make
UUCP-auto: scotty@l5comp.UUCP    | sure I don't run up a vet bill.
GEnie: JST			 | "The bombs drop in 5 minutes" R. Reagan
		"Pirated software? Just say *NO*!" S. Turner

scotty@l5comp.UUCP (Scott Turner) (08/08/87)

In article <453@leah.Albany.Edu> mreed@leah.Albany.Edu ( Mike Reed) writes:
>  	I think i'll post my next program to pirate boards for beta-
>test....

Now there's a thinking idea.

You might even keep the pirates away when your product goes commercial by
having them like you so much that they "take care of you".

However, I think the "hardcore" pirates will see right through that. It'll
be "Hey, nothing personal, BUT I'm a pirate. It's what I do ya know?" :)

Scott Turner
-- 
UUCP-stick: stride!l5comp!scotty | If you want to injure my goldfish just make
UUCP-auto: scotty@l5comp.UUCP    | sure I don't run up a vet bill.
GEnie: JST			 | "The bombs drop in 5 minutes" R. Reagan
		"Pirated software? Just say *NO*!" S. Turner

petersen@uicsrd.csrd.uiuc.edu (12/10/88)

The 8-bit atari computers used the cartrige idea for game distribution. 
However it was not 100% successful, the main way to beak it was do make a
dump of the cartrige onto a disk then run it from there.  If the game had
to be run from the cartrige address I think I remember some empty ram
cartriges that it could be loaded into.  (it's been about 5 years since
I've seen it done)  The only way that the current game machines get
away with this kind of copy protection is because they don't have any
writeable storage like a general purpose computer would have.

crewman@bucsb.UUCP (Jerry J. Shekhel) (12/16/88)

In article <42600045@uicsrd.csrd.uiuc.edu> petersen@uicsrd.csrd.uiuc.edu writes:
>
>The 8-bit atari computers used the cartrige idea for game distribution. 
>However it was not 100% successful, the main way to beak it was do make a
>dump of the cartrige onto a disk then run it from there.
>

Absolutely true.  Cartridges are not any better than any of the other
protection schemes.  In fact I believe there is no foolproof protection
scheme.  The point is that somewhere in the program there is code which
checks for the protection.  Disk-based software may have a bit of code
that tests for the existence of some unreproducible media element, like
an unusual track, etc., before allowing itself to be run.  Cartridge-based
software often checks that its code cannot be modified (i.e., it is ROM)
before continuing.  Find that bit of code, patch it out, and you've just
cracked your first piece of software.  I did this many years ago, almost
by accident, on an 8-bit micro.  A certain game I liked checked a bad
sector on its disk very often, which made an annoying sound.  After finding
the code that did this and changing one byte on the disk, I made the bril-
liant discovery that the game was now easily copiable.  Of course, modern
game software is much more prudently protected, but I cannot think of
an absolutely safe protection method.

>
>The only way that the current game machines get
>away with this kind of copy protection is because they don't have any
>writeable storage like a general purpose computer would have.
>

Absolutely.

		-- JJS

andy@cbmvax.UUCP (Andy Finkel) (12/16/88)

In article <2318@bucsb.UUCP> crewman@bucsb.UUCP (Jerry J. Shekhel) writes:
>Absolutely true.  Cartridges are not any better than any of the other
>protection schemes.  In fact I believe there is no foolproof protection
>scheme.  The point is that somewhere in the program there is code which
>checks for the protection.  Disk-based software may have a bit of code
>that tests for the existence of some unreproducible media element, like
>an unusual track, etc., before allowing itself to be run.  Cartridge-based
>software often checks that its code cannot be modified (i.e., it is ROM)
>before continuing.  Find that bit of code, patch it out, and you've just

Way back when I did cartridge games, I hit on a method that would
allow a game to run *only* from cartridge (or write protected ram)...

All my tests on the static data structures of the game were done using the 
rotate instructions on the rom.  On the 6502, at least, the status flags and
carry were set properly, and the data structure was left unmodified.  If
you ran the game from ram, however, you'd end up with rather strange
results, as the game itself changed, depending on your actions.


Since, as a media, roms are pretty safe, I didn't feel bad about
it at all :-)
-- 
andy finkel		{uunet|rutgers|amiga}!cbmvax!andy
Commodore-Amiga, Inc.

"Possibly this is a new usage of the word 'compatible' with which
 I was previously unfamiliar"

Any expressed opinions are mine; but feel free to share.
I disclaim all responsibilities, all shapes, all sizes, all colors.

bryan@intvax.UUCP (Jon R Bryan) (12/21/88)

In article <5517@cbmvax.UUCP>, andy@cbmvax.UUCP (Andy Finkel) writes:
> Way back when I did cartridge games, I hit on a method that would
> allow a game to run *only* from cartridge (or write protected ram)...
> 
> All my tests on the static data structures of the game were done using the 
> rotate instructions on the rom.  On the 6502, at least, the status flags and

Way back in '83 (those were the days) when I had a VIC-20, I added an
expansion board to it.  Each of the slots was de-selectable.  I had a
16K RAM cartridge (those really _were_ the days!) that I added
write-protect switches to.  There were also some address switches, I
forget.  I could turn on the machine with a game cartridge plugged in
and disabled, enable the cartridge and copy the contents.  Then I'd load
the game into the RAM cartridge, flip the write-protect switch, shuffle
the addresses (when necessary) and hit the reset button.  As I recall,
Choplifter gave me a bit of trouble because it even had a latch built
into it that used to change its own address (like swapping the two 8K
halves).  But I still got it to work.