Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP
Path: utzoo!mnetor!seismo!husc6!rutgers!clyde!cuae2!ihnp4!inuxc!pur-ee!uiucdcs!uxc.cso.uiuc.edu!crimmins
From: crimmins@uxc.cso.uiuc.edu
Newsgroups: comp.sys.ibm.pc
Subject: Re: 'BASIC' PROGRAMMING QUESTIONS.
Message-ID: <174200016@uxc.cso.uiuc.edu>
Date: Fri, 19-Dec-86 12:14:00 EST
Article-I.D.: uxc.174200016
Posted: Fri Dec 19 12:14:00 1986
Date-Received: Wed, 24-Dec-86 21:47:08 EST
References: <3448@pesnta.UUCP>
Lines: 65
Nf-ID: #R:pesnta.UUCP:3448:uxc.cso.uiuc.edu:174200016:000:2483
Nf-From: uxc.cso.uiuc.edu!crimmins Dec 19 11:14:00 1986
/* Written 7:04 pm Dec 17, 1986 by tonk@pesnta.UUCP in uxc.cso.uiuc.edu:comp.sys.ibm.pc */
> 1. Can anyone please tell me how to 'hide' a program
> which should be executable through the autoexec.bat?
Here are two small programs, called hide.com and unhide.com, that will
hide or unhide any file or directory. If an executable file is hidden,
It will still be found. I have hidden my autoexec.bat, config.sys, and
command.com in the root directory without any problems.
========== CUT HERE ==========
begin 644 hide.com
M#A^[@``NB@<*P'06F`/80R[&!P"Z@@"X`4.Y`@#-(>L,D(S(CMBZ,@&T"`T*"@L,D(S(CMBZ,@&T"'AX#0H*!R0`````````````````````````````````````````
`
end
========== END UNHIDE.COM ====
These are in standard uuencoded format. uuencode and uudecode should
be available on your system. If they are not, they were posted to
net.sources not too long ago.
> 2. I just bought a program called "Mind Prober" from
> The Human Edge.
> I put it on my hard disk (copy a:*.* c:), but when
> I start this program from the hard disk, the program
> in the opening screen looks at the a: drive.
> Obviously it can't find it, and tells me that the
> program (on the hard disk) is an illegal copy.
.
.
> Now, my question is: Can anyone please tell me how to do
> this in basic? I'm not interested in unraveling this
> program, but I would like to use this routine in my
> own programs.
This is a copy protection scheme, and it is looking for a "key" disk
in drive A:. These disks are physically marked with a "signature" area,
so making a copy of the disk won't help (as you found out). These
floppies are available at your local computer store in small quantities (2?)
so you can protect your own programs.
You may find that protecting your software is not beneficial. Think
about how your users will react to having to use a key disk on a hard-
disk based system before you make a mistake.
----
Dan Crimmins
University of Illinois at Urbana-Champaign
Computing Services Office - Micro Consulting Dept.
ARPA: crimmins@uiucuxc.cso.uiuc.edu
BITNET: crimmins@uiucuxc.bitnet
CSNET: crimmins@uiucuxc.csnet
UUCP: {ihnp4,pur-ee,convex}!uiucdcs!uiucuxc!crimmins