[comp.sys.apple2] Word Juggler deprotect

ART100@psuvm.psu.edu (Andy Tefft) (05/30/90)

A while ago I read something about how to deprotect word juggler. I didn't
have a use for it then, but now I want to put it on a 3.5" disk. Does anyone
have info on this handy?

Les_Ferch.@MTSG.UBC.CA (05/31/90)

>A while ago I read something about how to deprotect word juggler. I didn't
>have a use for it then, but now I want to put it on a 3.5" disk. Does anyone
>have info on this handy?
 
________________________________________________________________ 
 
Message: 1977680, Imported: 8:48pm PST, Sat Dec 30/89, 66 lines 
To: Info-Apple,crash!info-apple@BRL.MIL 
From: list-redistribution@relay.CDNnet.CA 
Subject: Word Juggler Crack 
 
 ._______________________________. 
 |                               | 
 | How to Crack Word Juggler //e | 
 |       and put it on           | 
 |  a hard drive, or 3.5" drive  | 
 !_______________________________! 
 
        Ok, someone posted a request for a crack to Word Juggler.  This is for 
the //e version, and it works great on my system.  If you want some more data 
on the protection code, drop me a line.  Here is the step-by-step method: 
 
        1\  Format a normal dos 3.3 disk and delete the hello program 
        2\  Format a ProDOS disk with a volume name of /wordj, or something 
            witty like that. 
        3\  Copy the PRODOS system file from the /USERS.DISK: 
        4\  Exit to BASIC.SYSTEM 
        5\  Create a system which will later be the main word juggler program. 
                ]CREATE /wordj/wj.system,tsys 
        6\  Insert your original world juggler disk and load the program 
 
            loader. 
                ]BLOAD /word.juggler/wj2e.system,tsys,a$2000 
        7\  Drop into the monitor and change the loader: 
                ]CALL -151 
        8\  Path the loader to exit to the monitor AFTER it has loaded the 
            main program: 
                *21F0:8D 81 C0 4C 59 FF 
        9\  Kill a checksum routine (12 NOP'S): 
                *242C:EA EA EA EA EA EA EA EA EA EA EA EA 
        10\ Execute the loader: 
                *2000G 
        11\ Insert your DOS 3.3 slave diskette and reboot. 
                *C600G 
        12\ Save the main word juggler program as a dos 3.3 file: 
                ]BSAVE WJ.BINARY,A$2000,L$6900 
        13\ Insert /USERS.DISK and reboot. 
        14\ Goto the convert program, and convert wj.binary from DOS to ProDOS 
            (/worj/wj.binary). 
        15\ Quit to Basic.system 
        16\ Copy wj.binary to wj.system: 
                ]BLOAD WJ.BINARY,A$2000 
                ]BSAVE /WORDJ/WJ.SYSTEM,TSYS,A$2000,L$6900 
                ]DELETE WJ.BINARY 
        17\ Now run copy // plus, or FILER, and copy all files from your 
            original word juggler disk to your 'new' word juggler disk except 
            for the following files:  WJ.2E.C, AND WJ.2E.SYSTEM. 
        18\ Now rename the volume name from /wordj, to /word.juggler 
 
Now, to put it on a hard drive, or 3 and 1/2" drive, do the following: 
 
        1\  Create a directory on your hard drive, such as /a/wordj/, 
            or format a 3 and 1/2" drive with whatever prefix you like. 
        2\  Put your unportected copy in drive 1, and boot it up. Go to 
            the text editor, and hit solid-apple-1. 
        3\  "Define the exteernal procedure path", and when prompted, give 
your 
            created directory (ie: /a/wordj/, or just /wordj.3.5/). 
        4\  Exit to utilities so that the info is stored on the 5.25 disk. 
        5\  Now, use copy // plus, or whatever, and copy all necessary files 
 
            from your deprotected disk to the respective directory.  Now, you 
            can also copy your lexicheck dictionary to the same directory. 
 
        Now, this should work.  If you have any problems, lemme know. 
                Alank@pro-beagle 
 

TSEMM@ALASKA.BITNET ("Ed 'Apple Guru' Moore") (06/01/90)

Hello.  On a simular note, is there any good place on Internet or BitNET
to find deprotects for II and IIGS software?

TSEMM@ALASKA.BITNET