Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP Path: utzoo!decvax!wivax!linus!philabs!seismo!hao!hplabs!sri-unix!BRACKENRIDGE@USC-ISIB From: BRACKENRIDGE%USC-ISIB@sri-unix.UUCP Newsgroups: net.micro.pc Subject: Re: Norton Book & Protected BASIC Message-ID: <1586@sri-arpa.UUCP> Date: Tue, 24-May-83 12:58:00 EDT Article-I.D.: sri-arpa.1586 Posted: Tue May 24 12:58:00 1983 Date-Received: Fri, 3-Jun-83 05:41:40 EDT Lines: 29 From: BillyA recipe for using BLOAD to mung the protected program byte was given in Vol 1 Issue 33 of INFO-IBMPC: "Run Basic or Basica and enter: BSAVE "TROJAN.HRS",1124,1 You need do this only once to create this file and can use the file later as often as you want. Now load in your protected program with the LOAD command. You will not be able to list this file. Enter: BLOAD "TROJAN.HRS" Your file is now unprotected and can be listed or modified and saved in ASCII form." One thing that wasn't mentioned is that this byte moves around depending on what parameters you have set on loading BASIC. If you specify a non standard number of buffers as an option the byte will have moved. It may move if another program is loaded in memory before BASIC runs. Perhaps your clock routine caused this location to move. The great thing about all this is that you get all the comments when a program becomes unprotected. I have a copy of Championship Blackjack. It is great fun to read the comments around the code that writes bad tracks to the diskette in a futile attempt at copy protection.