HELP for the TOP Unprotect Library I. Welcome to the TOP Unprotect Library. This Library has been setup with V. Buergs LIST Program for Convenience. It is a collection of Unprotects that the group Tired of Protection has done. Tired of Protection has put many long hours of work into cracking these programs. II. CONTENTS. I. - Welcome. II. - Contents. III. - Getting Started. IV. - Using LIST. V. - The Setup. VI. - General Format of the Unprotects. VII. - Editors. VIII. - General Method. IX. - Problems. X. - Bye. III. GETTING STARTED. You already have! IV. USING LIST. In using V. Buergs LIST program there are a few commands of note. H - Help inside V. Buergs list # - Jump to a certain Line number HOME - Begining of the File END - End of the File PgUp - Jump up one Unprotect/Page PgDn - Jump Down one Unprotect/Page Arrows - guess..:->. ESC - Quit V. THE SETUP. The Unprotect library is setup on a PAGE by PAGE basis. The First Page is an introduction. The Second page and possible Third page is a Table of Contents. The Last page is a final note per Library. The Pages in between are Unprotects that have been done. Each Page is numbered and the line numbers are put in the table of contents. To get to any specific Unprotect you would then use the '#' key and jump to the correct page. To scroll through the unprotects just press PgUp or PgDn or Enter. If you have any trouble finding a Unprotect, there is an Alphabatized listing of the unprotects and in which library they may be found. VI. GENERAL FORMAT OF THE UNPROTECTS. The Unprotects are setup using a general format to make unprotecting files easier. The Format is as follows NAME OF THE PROGRAM USING: <- This field tells you what editors to use to unprotect the program. FILE TO SEARCH: <- This tells you what file the changes need to be done to. SEARCH STRING: <- This tells you what to search for in the File using the editors. CHANGE: <- This tells you the byte to change TO: <- This tells you what to change the bytes to. NOTES: <- This is just some notes concerning the unprotection schemes. Special Notes: There are loaders that we just cannot make into byte cracks at the time of the unprotection. We have included them in ZIP form so you can run the program without any trouble. We will switch them to byte form if possible! The Note field will have the name of the ZIP file in which the loader is found. UNLZEXE and UNLITE(PKUNLITE) are programs designed to help you in making a change. The Note section will alert you to thier use. These programs will decompress .EXE files into the original form which then allows you to easily apply the crack. You can run the program in it's uncompressed form. VII. EDITORS. 1. PCTOOLS/PCSHELL. This Program is most commonly used. It is put out by Central Point Software. Enter the PCSHELL and Highlight the file you are going to edit based on information in this Library. Type ALT-F S F9 Then you input your string. When the String has been found you hit F8 and enter the HEX editor. You then make the changes and F5 to save it. You are done. - Other Editors that HEX edit are: DISKEDIT NORTONS some Shareware stuff around. 2. DEBUG. Debug is an old way of cracking thing and you will rarely come up with this one. Debug is included with your DOS system. Information will be provided to deal with unprotection of files that the unprotect was done in debug. VIII. GENERAL METHOD. 1. !!!Make BACKUPS of your ORIGINALS!!! 2. Find the correct unprotect in this library and jot down important information. 3. Enter the Editor and apply the crack. 4. Run the program. 5. Finished. IX. PROBLEMS The Main problem you should have now is that the unprotect did not work or messed up the program. This is why you MADE a BACKUP right? Software Companies, in order to prevent unprotection, sometimes puts out multiple releases of a file with changes in the protection scheme. We cannot find every file and alert you to this. Another Problem is you may have made a wrong byte change. RE-READ the Unprotect strings.. Zeros and Eights look a Lot Alike! Try this again. X. BYE The Unprotects were done using Soft-Ice, Turbo Debugger, Debug, Codeview and a few misc debuggers. Enjoy the Library! We are Tired of Protection. Aren't YOU? End of TOP Unprotect Library Help