{"id":22155,"date":"2019-01-29T10:38:35","date_gmt":"2019-01-29T15:38:35","guid":{"rendered":"http:\/\/www.megalextoria.com\/wordpress\/?p=22155"},"modified":"2019-02-05T10:33:56","modified_gmt":"2019-02-05T15:33:56","slug":"hardcore-computist-issue-number-3","status":"publish","type":"post","link":"http:\/\/www.megalextoria.com\/wordpress\/index.php\/2019\/01\/29\/hardcore-computist-issue-number-3\/","title":{"rendered":"Hardcore Computist &#8211; Issue Number 3"},"content":{"rendered":"<p><script async src=\"https:\/\/epnt.ebay.com\/static\/epn-smart-tools.js\"><\/script><br \/>\n<a href=\"http:\/\/www.megalextoria.com\/magazines\/index.php?twg_album=Computer_Magazines%2FHardcore_Computist%2Fissue03&amp;twg_show=Cover-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-22156\" src=\"http:\/\/www.megalextoria.com\/wordpress\/wp-content\/uploads\/2019\/01\/Cover-1-1.jpg\" alt=\"cover-1\" width=\"1238\" height=\"1606\" \/><\/a><\/p>\n<p class=\"raindrops-press-this\">Source: <em><a href=\"http:\/\/www.megalextoria.com\/magazines\/index.php?twg_album=Computer_Magazines%2FHardcore_Computist%2Fissue03&amp;twg_show=Cover-1.jpg\">Hardcore Computist &#8211; Issue Number 3<\/a><\/em><\/p>\n<p>Hardcore Computist was a long running magazine dedicated to the Apple II. It was relatively technical in content and was especially known for publishing details for circumventing disk based copy protection. Issue Number 3 includes:<\/p>\n<ul>\n<li>Follow-Up<\/li>\n<ul>\n<li><b>No More Bugs: The Sequel<\/b> &#8211; A few glitches and some suggestions for improvement were incorporated into this article, which clarifies how to use SoftKey&#8217;s checksums.<\/li>\n<\/ul>\n<li>Reader&#8217;s Softkey and Copy Exchange<\/li>\n<ul>\n<li>Backing Up Visiplot\/Visitrend<\/li>\n<li>Copy Tip for Sneakers<\/li>\n<li>Copying Wizardry with Locksmith<\/li>\n<\/ul>\n<li>Softkey<\/li>\n<ul>\n<li>Bag of Tricks<\/li>\n<\/ul>\n<li>Advanced Applications<\/li>\n<ul>\n<li>Hidden Locations Revealed<\/li>\n<\/ul>\n<li>Softkey<\/li>\n<ul>\n<li>More on Multiplan<\/li>\n<\/ul>\n<li>Parameters<\/li>\n<ul>\n<li>More Parms for Copy II Plus<\/li>\n<\/ul>\n<li>Advanced Playing Techniques<\/li>\n<ul>\n<li>Choplifter<\/li>\n<\/ul>\n<li>Adventure Tips<\/li>\n<ul>\n<li>Cranston Manor and Strange Odyssey<\/li>\n<\/ul>\n<li>Special Feature<\/li>\n<ul>\n<li>Map Maker<\/li>\n<\/ul>\n<li>Departments<\/li>\n<ul>\n<li>Note to Subscribers<\/li>\n<li>Letters<\/li>\n<li>Advertising Index<\/li>\n<\/ul>\n<li>Program Index<\/li>\n<ul>\n<li>Make Tables<\/li>\n<li>Editor<\/li>\n<li>Display Map (Hex Dump)<\/li>\n<li>Editor.C<\/li>\n<li>Display Map.S<\/li>\n<li>Clear<\/li>\n<li>Clear.Obj (Hex Dump)<\/li>\n<\/ul>\n<li>Checksum Index<\/li>\n<ul>\n<li>Start Checksoft<\/li>\n<li>Checkbin<\/li>\n<li>Make Tables<\/li>\n<li>Editor<\/li>\n<li>Display Map<\/li>\n<li>Editor.C<\/li>\n<li>Clear.Obj<\/li>\n<\/ul>\n<\/ul>\n<p>&#8230;and more!<\/p>\n<p><center><br \/>\n<ins class=\"epn-placement\" data-config-id=\"5c02b1b8891ea32ba88b6a7c\"><\/ins><br \/>\n<\/center><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Source: Hardcore Computist &#8211; Issue Number 3 Hardcore Computist was a long running magazine dedicated to the Apple II. It was relatively technical in content and was especially known for publishing details for circumventing disk based copy protection. Issue Number 3 includes: Follow-Up No More Bugs: The Sequel &#8211; A few glitches and some suggestions for improvement were incorporated into this article, which clarifies how to use SoftKey&#8217;s checksums. Reader&#8217;s Softkey and Copy Exchange Backing Up Visiplot\/Visitrend Copy Tip for Sneakers Copying Wizardry with Locksmith Softkey Bag of Tricks Advanced Applications Hidden Locations Revealed Softkey More on Multiplan Parameters More Parms for Copy II Plus Advanced Playing Techniques Choplifter Adventure Tips Cranston Manor and Strange Odyssey Special Feature Map Maker Departments Note to Subscribers Letters Advertising Index Program Index Make Tables Editor Display Map (Hex Dump) Editor.C Display Map.S Clear Clear.Obj (Hex Dump) Checksum Index Start Checksoft Checkbin Make Tables Editor Display Map Editor.C Clear.Obj &#8230;and more!<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,4],"tags":[194,195,196,2362],"class_list":["post-22155","post","type-post","status-publish","format-standard","hentry","category-apple","category-computer-arcana","tag-apple","tag-apple-2","tag-apple-ii","tag-retrocomputing"],"_links":{"self":[{"href":"http:\/\/www.megalextoria.com\/wordpress\/index.php\/wp-json\/wp\/v2\/posts\/22155","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.megalextoria.com\/wordpress\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.megalextoria.com\/wordpress\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.megalextoria.com\/wordpress\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.megalextoria.com\/wordpress\/index.php\/wp-json\/wp\/v2\/comments?post=22155"}],"version-history":[{"count":0,"href":"http:\/\/www.megalextoria.com\/wordpress\/index.php\/wp-json\/wp\/v2\/posts\/22155\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.megalextoria.com\/wordpress\/index.php\/wp-json\/wp\/v2\/media?parent=22155"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.megalextoria.com\/wordpress\/index.php\/wp-json\/wp\/v2\/categories?post=22155"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.megalextoria.com\/wordpress\/index.php\/wp-json\/wp\/v2\/tags?post=22155"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}