Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP Path: utzoo!mnetor!seismo!rutgers!sri-unix!hplabs!cae780!amdcad!sun!dlb!plx!zaphod!steveb From: steveb@zaphod.UUCP (Steve Brozosky) Newsgroups: comp.sys.ibm.pc Subject: Re: A dream about breaking copy protection ! Message-ID: <459@zaphod.UUCP> Date: Fri, 19-Dec-86 22:27:34 EST Article-I.D.: zaphod.459 Posted: Fri Dec 19 22:27:34 1986 Date-Received: Tue, 23-Dec-86 00:30:33 EST References: <161@tiger.Princeton.EDU> Organization: Plexus Computers, San Jose, CA. Lines: 7 Keywords: copy protection Summary: Not that simple The copy protection methods are not that simple. First they are usually encrypted thus making it dificult to disasemble. In addition, most of the copy protection methods now take some of their code and put it inside the "key" of the floppy. When the program is run it takes the code out of the "key" and puts it into the program. Without that code the program would not work.