'Individual protection schemes'
Author:Displacer (registered user: 14 posts )
Date: Tue, Nov 09th, 2010 @ 08:59 ( . )

Hi! with the exception of a few, there doesn't seem to be any in depth information on the individual copy protections. Is there a place to post info of a detailed nature? I'm about 95% through the protection on Demon Stalkers, have a complete disassembly of the code and just need to finish up commenting it. Anyway let me know if you have somewhere to post it when I'm finished.


REPLY: [With No Quote] --- [With Quoted Text]

'Individual protection schemes'
Author:Pete Rittwage (registered user: 558 posts )
Date: Tue, Nov 09th, 2010 @ 11:34 ( . )

Hi Displacer,

I'd be happy to put it up as an article or as a specific protection description, whichever is more appropriate. Just let me know when you are finished.

At some point over the holidays, I may convert some of the site over to a public "wiki" so that it can be better managed by publishers such as yourself.

Pete


REPLY: [With No Quote] --- [With Quoted Text]

'Individual protection schemes'
Author:Displacer (registered user: 14 posts )
Date: Tue, Nov 09th, 2010 @ 11:53 ( . )

Thanks. I'll let you know when I get it done. It uses Pirateslayer for protection, and it's been a nightmare to slog through all the encryptions. This particular version uses the byte check for $D7 $D7 $EB $CC $AD on track 2, but it also looks for another byte pattern just after that: $55 $AE $9B $55 $AD $55 $CB $AE $6B $AB $AD $AF


REPLY: [With No Quote] --- [With Quoted Text]

'Individual protection schemes'
Author:Fungus (registered user: 20 posts )
Date: Thu, Dec 02nd, 2010 @ 08:05 ( . )

I can provide disassemblies and notes for several vesions of Pirate Busters/Slayer if you would like some help on the article. It was used not only on EA games, but also a few by access. Later it changed a bunch and became ProDos, but most versions of that use a similar if not the same format of the key track.

The key track varies from disk to disk, early version of it (called pirate busters) had 2 key tracks located on tracks 36 and 37, with 2 slightly different keys.

the most common (track 2) is constructed like so.

track contruction

track formatted by writing $3000 * $55

$44F * $D7
$EB
$200 * $CC $AD
$AD $55 $AE $9B $55 $AD $55 $CB $AE $6B $AB $AD $AF $AB $AD $AD

repeated 3 times

sometimes a block of $100 to $400 $00 written (weak bits) after

creates pattern $11 $22 $44 $88 when read back

1541 when reading 00's always creates pattern %00010001 when reading, and clock desynchronization shifts the bit pattern to the left after a few bytes, usually 8.


REPLY: [With No Quote] --- [With Quoted Text]


--- 0 Users Online --- 0 Recent Unique Posters

Q60=1716115706 - Threads: / 1716115706