Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP
Path: utzoo!mnetor!seismo!rutgers!sri-unix!hplabs!cae780!amdcad!sun!dlb!plx!zaphod!steveb
From: steveb@zaphod.UUCP (Steve Brozosky)
Newsgroups: comp.sys.ibm.pc
Subject: Re: A dream about breaking copy protection !
Message-ID: <459@zaphod.UUCP>
Date: Fri, 19-Dec-86 22:27:34 EST
Article-I.D.: zaphod.459
Posted: Fri Dec 19 22:27:34 1986
Date-Received: Tue, 23-Dec-86 00:30:33 EST
References: <161@tiger.Princeton.EDU>
Organization: Plexus Computers, San Jose, CA.
Lines: 7
Keywords: copy protection
Summary: Not that simple


The copy protection methods are not that simple.  First they are usually
encrypted thus making it dificult to disasemble.  In addition, most of
the copy protection methods now take some of their code and put it inside
the "key" of the floppy.  When the program is run it takes the code out
of the "key" and puts it into the program.  Without that code the program
would not work.