home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hacks & Cracks
/
Hacks_and_Cracks.iso
/
vol1
/
ucfhs117.zip
/
HS.DOC
< prev
next >
Wrap
Text File
|
1997-05-04
|
37KB
|
858 lines
USER MANUAL
HACKSTOP
─══[ 1 HACKSTOP (HS) ]═════════════════════════════════════════─
Synopsis: HackStop (HS) protects DOS COM and EXE files against
hacking, analysis, reverse engineering and unpacking. HackStop
additionally encrypts COM files! HackStop uses a variety of dif-
ferent anti-debugging tricks to prevent hacking of HackStopped
programs. HackStop is distributed as Shareware.
■ Have you ever written a program, then found out the next day
that your program had been cracked or hacked and uploaded to
all the BBB's across the world?
■ Have you ever invested lots of time and money developing a
program which you released as Shareware with a registration
option? Just to find out that someone made a generic "key"
registration program to register your current and future
versions of that software?
■ Have you ever invest money in purchasing a copy-protection
product like a key-disk or a dongle plug protection to pro-
tect your software from being copied by everyone? Then disco-
vering the next day a cracked copy of your program on a BBS -
even though it was "protected"?
IF YOU ANSWERED YES TO ANY OF THE ABOVE, THEN
THIS IS WHAT YOU SHOULD TEST:
HACKSTOP
As you know, everything can be cracked with time. Someday, some
wizard out there will figure a way to trace through HackStop's
protection. After spending some years, he might find a by-pass
method ;-). But all you need to do is request a updated version
of HackStop and you will put him back to square one! - He will
have to forget everything he did and restart from scratch, because
all the routines would be different.
We are all sick of those hackers and crackers who steal our soft-
ware investments, it's time to do something about it. This program
was not written to make money (you can not do this with a share-
ware like HackStop), it was written to help the hard working com-
puter programmers like yourselves. The registration costs are
very low, for the amount of time it took me to develop HackStop.
HS.DOC Documentation for HackStop Page 1
1.1 Table Of Contents
1 HackStop (HS)...........................................1
1.1 Table Of Contents...................................2
1.2 Why Should I Choose HackStop?.......................3
1.3 How To Use HackStop?................................3
1.4 Files That Can't Be HackStopped.....................4
1.5 Commandline-Parameters..............................4
1.6 Why Should I Use HackStop?..........................5
2 Technical Notes.........................................5
2.1 How Does An Unpacker Work?..........................5
2.2 How Does HackStop Work?.............................6
2.3 Requirements........................................6
2.4 About HackStop......................................6
2.5 On-Line Compressors.................................7
2.6 More Protection?....................................7
2.7 Protection Against Viruses?.........................7
3 Legal Terms And Disclaimer..............................8
3.1 Disclaimer..........................................8
3.2 Documentation.......................................8
3.3 License - Shareware.................................8
3.4 Distribution Restrictions...........................9
4 Closing................................................10
4.1 Registration.......................................10
4.2 Personalised Versions Of HS........................10
4.3 Updates............................................11
4.4 How to get the newest version of HackStop..........11
4.5 My Address.........................................11
4.6 Enhancements In Future Versions....................11
4.7 Some technical stuff...............................12
4.8 Credits............................................12
HS.DOC Documentation for HackStop Page 2
1.2 Why Should I Choose HackStop?
HackStop is designed to encrypt and secure your executable program
files by placing a special security envelope around them.
To protect a specific file, simply run HackStop on it, and you and
your users will never know that it's there unless somebody tries
to hack or analyse it. Do not expect to be able to easily trace
through HackStop's security envelope with a debugger - advanced
debug traps help destroy this option. Furthermore HackStop has
different levels of encryption to stop tracing or analysing at-
tempts on protected programs. HackStop is the most advanced exe-
cutable protection program of its type that you can buy to keep
your programs from being altered or reverse engineered!
HackStop was written because all the other programs I know have
security holes (see below). HackStop is very popular in the under-
ground and very often used.
To disable any tool that will use a simple 'XOR' technique Hack-
Stop has included a simple "mini mutation engine" to ensure that
the encryption keys are unique! HackStop uses "memory encryption"
- only the current running procedure is unencrypted! After finish-
ing that procedure it will be encrypted again with a different
key! In the current version HackStop has five (5) layers of en-
cryption. HackStop has included code against all popular hacking
tools like:
» Generic Unpackers (TRON -p, CUP, UNP, XO, CUP386, X-Tract)
» AutoHack, SnapShot, Intruder, CUNP, TEU & UPC
1.3 How To Use HackStop?
The command-line syntax for HackStop is the following:
hs filespec [-/options]
For example to protect all your COM files in the current direc-
tory:
hs *.com
To protect all EXECUTABLE (COM & EXE) files in the current di-
rectory type:
hs *.*
HackStop will only protect files ending with "COM" and "EXE"!
Please note that a file CANNOT be expanded after being protected
with HackStop (you can probably think why). So please preserve a
backup file until you are sure that the protected file runs cor-
rectly. Some incompatibilities may possibly arise with certain
files, especially with overlaid EXE programs.
For this reason, HackStop can create backup files, see section
"Parameters". To make backup files invoke HS with the additionally
option "-b". Example:
hs *.* -b
HS.DOC Documentation for HackStop Page 3
This is all that you need to know before you can really start pro-
tecting your program files with HackStop.
1.4 Files That Can't Be HackStopped
Files smaller than 68 bytes and COM files larger than approxi-
mately 62000 bytes, Windows and OS/2 files cannot be protected by
HackStop. The reason for this is that a Windows or OS/2 program is
basically a small DOS program that says something like "This pro-
gram requires Windows" with a pointer to the actual Windows
program. HackStop will automatically detect if a file has a
Windows, OS/2 or a linear executable header and does not waste
your time trying to protect it. Also -due to the structure of
HackStop- files larger than the 600 KB neighbourhood cannot be
HackStopped because the entire file has to be able to fit in the
memory once when it loads. Please note that files with overlays
cannot be HackStopped because the "Load Window" of DOS could now
be too small for this file. Also, files with a weird EXE header
will not be protected by HackStop for your own safety.
Hint: Try to compress such files before HackStop'ing them! If
you can compress and run them, you should be able to
protect them with HackStop afterwards!
You can technically protect files like COMMAND.COM but in my opi-
nion it makes no sense to protect DOS system files.
1.5 Commandline-Parameters
HackStop can be invoked with the following additional commandline
parameters:
Parameter Meaning
-? -h Display a short help, how to use HackStop.
-^ Show HS internal compiler information.
-b Make a backup file with the extension ".BAK".
Warning, old backup files are overwritten! If
you have files with the same filename, but dif-
ferent extension, you should use the "-bh" op-
tion instead!
-bh Make a backup file with the extension ".EHS" for
EXE files and ".CHS" for COM files. Warning, old
backup files are overwritten!
-i Shows a little intro with greetings and other
nice stuff - now with Adlib sound!
-k Kills the "HSxxMsDos" signature at the end of
HackStopped files. You can use this option to
fool unpacker tools. This option is only avail-
able in the registered version!
HS.DOC Documentation for HackStop Page 4
-p Show the release number and the personalised
text of HS.
Remark: Options are not case sensitive. You can use "-", "/" and
"," to introduce an option!
Examples:
hs -?
hs /^
hs *.com ,bh
hs *.exe -k
hs -i
1.6 Why Should I Use HackStop?
HackStop's first concern is security. Do you think compressing
your files with PKLITE or something similar is protection enough?
A hacker can also decompress a program compressed with PKLITE or
LZEXE quite easily. Even if a program is compressed with the sup-
posedly "invincible" -E option of the professional version of
PKLITE or the "pu" option of WWPack.
There are a lot of tools which can do this. I have at least about
30 different unpackers which can unpack PKLITE or LZEXE. I have a
batch file (!) which is able to remove protection from COM files
added by most of the popular protection tools! This batch file
works with all protection programs I have access to, except with
HackStop and RCRYPT!
After decompressing a compressed program, any hacker can change
your program (remove copyright screens, disassemble code, etc...),
compress it again, and spread it around. Fortunately, hacking is
not quite that rampant, but it still is a possibility and a risk,
and it is much better to pay a few "DM" up-front to be safe than
to be sorry in the future. Thinking NO software protection program
is 100% fool-proof, I am pretty sure this program is a good choice
for protecting your programs.
This is the main reason, why I first developed RCRYPT for COM
files, ROSETINY for EXE files (which requires TinyProg) and then
HackStop. ROSETINY is the predecessor of HS, using only one (!)
debugger trap and has NO encryption at all! ROSETINY is yet -after
being over three years out in the wild- unpackable by any unpacker
I know. You can do this by hand, but it's a hard job!
─══[ 2 TECHNICAL NOTES ]═══════════════════════════════════════─
2.1 How Does An Unpacker Work?
When an unprotection utility (such as X-Tract, TPCX, CUP, XOPEN,
UNP or TRON) unprotects a file, it creates a virtual DOS environ-
ment for the file to run in until the file finishes decrypting or
unpacking itself. When this is done, the unprotect utility
"simply" writes what is in memory back to disk. Now you have your
unprotected file. The program may use a highly sophisticated
HS.DOC Documentation for HackStop Page 5
decryption every time, but all the unprotecting program has to do,
is just trace through the decryptor until it gets to the entry
point of the host program. Then all encryption is for naught. One
of the tricks for fooling unprotection utilities and debuggers
lies in the fact that the unprotector must always have control
over the HackStopped program in order to stop it when it is de-
crypted in memory. If you remove the unprotector's control and
subvert it without harming the operating system, you are one step
ahead in protecting your programs.
2.2 How Does HackStop Work?
To fool unpackers or generic cracking/disinfection programs you
must *ONLY* disable single step tracing and breakpoints, that's
all! HackStop uses a variety of different anti-debugging tech-
niques, therefore ANY unpacker I know will crash when trying to
trace through HackStopped programs. This is so effective that even
TRON and UNP will crash if they ONLY TRY to determine the type of
packer used. For this reason any HackStopped program header looks
like ordinary code to confuse all tracing programs like RVK, DE-
COM, TBCLEAN, TRON or UNP and all virus scanners using heuristic
search methods! The second part of the HackStop header is multiple
encrypted to disable setting breakpoints or to disassemble the
code.
In my opinion it is NOT possible to trace HackStopped programs
with a real-mode software program! Additionally HackStop uses op-
code and normal encryption, so it could take days to disassemble
the code! If you have a program with is able to remove the protec-
tion added by HackStop, please send me the program and I will send
you an enhanced version of HackStop!
2.3 Requirements
The requirements to run HackStop are basically zero: DOS 3.30, an
IBM PC with 128 KB, etc... I can run this program on my 8 MHz XT
and I have done much testing of HackStop on even this lowest com-
mon denominator type of machine, to make sure that HackStop will
run on every type of computer from 8088 to Pentium Pro and beyond.
2.4 About HackStop
HackStop is written entirely in assembly language (MASM 6.0 +
macros + ASM libraries). I have written and tested HackStop on my
Pentium 90, 486 DX 4/100, 486 DX/50, 386 DX/40, 386 SX/16 and on
my 4.77/8 MHz "turbo" XT. Furthermore I have tested HackStop on
more than 30 different machines with different DOS and Windows
versions. HackStop's anti-debugging techniques (which uses the
same anti-debugger macros like ROSETINY, CHKPC or HMS) has been
around for over five years, with many people pitching in ideas to
make it more secure. If you have any suggestions, questions, com-
ments etc. about HackStop, you can contact me. See address below.
HackStop adds something in the neighbourhood of 2300 bytes to the
average, depending on the program type (COM or EXE) and released
version. If you ever have programmed in assembler you will know
that more than 2 kilobyte of anti-debugger code is a lot of stuff
to trace through!
HS.DOC Documentation for HackStop Page 6
Note that HackStopped programs require DOS 3.30 or better (is
there anybody using DOS 2.x?). HackStop keeps the time and date
stamp of the files the same after HackStop'ing as it was be-
forehand.
2.5 On-Line Compressors
You do not need to have an on-line compressor, but you are
STRONGLY recommended to use one because it garbles the program and
makes it harder to modify or to patch. Please note that Hack-
Stopped COM files normally are no longer compressible due to the
strong encryption! I strongly recommend to compress COM files be-
fore they are HackStopped. This makes it harder to attack them af-
terwards. COM files are generally easy to hack, because they fit
into one segment and have no relocations.
If you have the choice between COM and EXE file type, choose EXE
files, they are safer! For this reason an additional program
(COM2EXE) is included in this package to convert COM files to EXE.
You can protect COM files with HackStop - convert them with
COM2EXE and protect them again with HackStop. This adds a two-
level security envelope around your file which makes the hacking a
little bit harder.
2.6 More Protection?
I suggest first to compress your program with your favourite com-
pressor and then protect it with HackStop (see above). All utili-
ties to check files for compression will fail on COM files because
they are encrypted! I have not encounter a program with is able to
recognise compression on HackStopped EXE files...
BTW, some popular online compressors like WWPack, Pklite, LZEXE or
Diet put a signature into the exe-header. If HackStop finds this
signature it will replace it with "HS".
I think COM files do not need ANY further protection, because COM
files are encrypted too! EXE files can be compressed and scrambled
using ROSETINY. ROSETINY is yet unpackable/unhackable! After Hack-
Stop'ing them you can be sure NOBODY is able to debug or hack your
programs!
2.7 Protection Against Viruses?
HackStopped programs are immunised against the standard Jerusalem
(1808) virus family (for this reason all hackstopped programs end
with the sign "MsDos"). Additionally tracing viruses like
Happy_Shiny or DAME:Trigger will hang the system if they are try-
ing to infect programs protected with HackStop. If you need addi-
tional protection use a file shield like VSS, F-Xlock or
FileShield. The basic idea behind this philosophy is that you are
able to protect, scramble or compress HackStopped programs fur-
thermore after adding HackStop to them.
It may be possible for a protected program to set off some anti-
viral programs that have heuristic abilities. This has not hap-
pened to my knowledge (they cannot seem to trace through the de-
HS.DOC Documentation for HackStop Page 7
cryption algorithm) but some are (AVP, Suspicious and Toolkit) set
to alert the user if they detect a decryption algorithm at the be-
ginning of a file's execution. So far, however, none of the
heuristic programs I have tested seem to be able to identify the
decryption algorithm as being such. TBSCAN did not indicate any
heuristic flag!
─══[ 3 LEGAL TERMS AND DISCLAIMER ]════════════════════════════─
3.1 Disclaimer
HackStop basically has no legal guarantee and warranty because I
do not want to get sued over it, and should be used "as is." Here
is the official disclaimer:
HackStop ("program") does alter executable files and may
have or cause compatibility problems with them (that is
why YOU should keep a backup file, in case of
incompatibility with a particular file) in certain cir-
cumstances. Under no circumstances may ROSE, Ralph Roth
("author") be held liable or accountable for any damage
to system files, executable files, data files, or any
other system or data damage due to use or misuse of his
program. The author also may not be held accountable for
loss of profits or for any other damages incurred by the
use or misuse of his program. The author has forewarned
any users that damage to files may occur with use or
misuse of his program, and in executing the program, the
user fully understands these risks and this disclaimer.
3.2 Documentation
Information in the documentation is subject to change without no-
tice and does not represent a commitment on the part of ROSE.
3.3 License - Shareware
The supplied software contains NO public domain program(s). The
program and all accompanying documentation are Copyright (c) 1994-
97 by ROSE. All rights reserved.
This software and accompanying documentation is protected by the
Copyright laws of Germany. Any use of this software in violation
of Copyright law or the terms of this limited licence will be
prosecuted to the best of our ability. The conditions under which
you may copy this software and documentation are clearly outlined
below under 'Distribution Restrictions'.
HackStop is distributed as SHAREWARE. You may use HackStop for the
purposes of evaluating it (after understanding the disclaimer and
the documentation) for 60 days. No files protected by HackStop
during this trial period may be distributed to OTHER computers at
all, commercially or non-commercially. If you find HackStop to be
of use to you, you must register HackStop with the author.
HS.DOC Documentation for HackStop Page 8
ROSE hereby guarantees you a limited licence to use this software
for evaluation purposes for a period not to exceed sixty (60)
days. If you intend to continue using this software (and/or its
documentation) after the sixty (60) day evaluation period, you
must make a registration payment to ROSE. Using this software af-
ter the sixty (60) day evaluation period without registering the
software is a violation of the terms of this limited licence!
You shall not use, copy, emulate, clone, rent, lease, sell, mo-
dify, decompile, disassemble, otherwise reverse engineer, or
transfer the program, or any subset of the program, except as pro-
vided for in this agreement. Any such unauthorised use shall re-
sult in immediate and automatic termination of this licence. All
rights not expressly granted here are reserved by ROSE.
3.4 Distribution Restrictions
As the copyright holder, ROSE authorises distribution by indi-
viduals only in accordance with the following restrictions.
The package is defined as the entire file either as 'self ex-
tracting executable' or an 'archive' as distributed by ROSE. The
authenticity of the package can be verified by contacting ROSE or
using the program CrCheck. The original archive is packed by RAR,
using its AV check. If the package is changed in any way, the dis-
tribution is forbidden. Please contact ROSE to obtain a complete
package suitable for distribution. You are hereby granted per-
mission by ROSE to copy the package for your own use or for others
to evaluate, ONLY when the following conditions are met:
■ The package - including all related program files and doc-
umentation files - CANNOT be modified in any way and must be
distributed as a complete unchanged package, without excep-
tion. Small supplements to the package, such as the introduc-
tory or installation batch files are acceptable. This should
always be done by supplying EXTRA files, never by altering
the package (file) as distributed by ROSE.
■ No price or other compensation may be charged for the pack-
age. A distribution cost may be charged for the cost of the
diskette, shipping and handling, as long as the total (per
disk) does not exceed US$ 10. The package CANNOT be sold as
part of some other inclusive package, nor can it be included
in any commercial or non-commercial software packaging offer,
without a written agreement from ROSE.
■ ROSE prohibits the distribution of outdated versions of the
package, without written permission from ROSE. If the version
you have obtained is over twelve (12) months old, please con-
tact ROSE to ensure that you have the most current version.
■ The package, program(s) or documentation cannot be 'rented'
or 'leased' to others. If you wish to add any of our packages
to a CD-ROM or other collection, please check the release
date of the version you have. If the version is over twelve
(12) months old then please contact ROSE to ensure that you
have the most current version.
■ If you would like to distribute the package as a 'Disk-of-
the-Month', or as part of a subscription or monthly service,
then you must contact ROSE in advance to ensure that you have
the most current version of the software. Only current ver-
sions may be shipped as 'Disk-of-the-Month' disks.
HS.DOC Documentation for HackStop Page 9
■ You may not list any of my products in advertisements, ca-
talogues, or other literature that describes this product as
'FREE SOFTWARE'. This is 'Try-Before-You-Buy' software, it is
not free!
─══[ 4 CLOSING ]═══════════════════════════════════════════════─
There is no doubt that HackStop can save you time, effort, energy
and money. There are NO "run-time fees", "royalties" or anything
of the type attached to the cost of HackStop. You can protect and
distribute as many files as you want with HackStop ONCE YOU REGIS-
TER. The cost is DM 30,-- per copy of HackStop. Please use the
file REGISTER.DOC to order a registered version of HackStop!
Please send the register form to my address, even if you have
transferred the money to my bank account, because our address will
often be unreadable on checks!
4.1 Registration
There is almost no difference between the registered and unreg-
istered version of HackStop except for the "beg remark" and the
ASCII remark in HackStopped programs, saying that it is an UN-
REGISTERED SHAREWARE version. The registered version of HackStop
has a different 'data offset',other antidebugging macros and dif-
ferent protector length, so programs protected with the Shareware
version will always differ from the registered versions!
Additionally the registered version of HackStop supports the
switch "-k" to remove the HackStop signature. Along with register-
ing HackStop you will receive the newest currently available ver-
sion of HackStop! To register your copy of HackStop please print
out the file REGISTER.DOC.
Additionally with the registered version of HackStop you will re-
ceive the newest versions of ROSE COM Crypt/286, ROSE EXE Cryptor
(REC) and ROSETINY (Freeware) as well as beta versions of HackStop
or other file protection tools, if available! German users will
additionally receive some bonus antivirus programs in German writ-
ten by ROSE Softwareentwicklung. I always try to put as many pro-
grams as possible (packed with RAR) on the disc containing
HackStop...
4.2 Personalised Versions Of HS
You can obtain a so called "personalised" version of HS. The dif-
ference between the normal version and this version is that your
copy of HS carries your name and address or an advertising slogan.
For this reason personalised HS versions will produce hackstopped
programs with a different length and a different offset that means
that they are harder to attack than the registered (standard) or
Shareware version. COMMERCIAL USE OF HACKSTOP REQUIRES A
REGISTRATION!
Please note: Some user want to have a "personalised" string like:
(C) by SuperSoft etc. Please do not use "(C) by" or "Copyright by"
because this is confusing who has developed HackStop. :-) If you
want, you can include up to 6-10 lines of text into your person-
alised version! You can send us your text logo to be included in
HS.DOC Documentation for HackStop Page 10
HS.EXE. There is also a version available with no text. This makes
the envelope a little bit smaller and harder to detect.
4.3 Updates
I am sure that I will make enhancements to HS in further releases.
You, as a registered user, can order then the newest version of HS
for half price.
4.4 How to get the newest version of HackStop
First take a look at the file ROSEBBS.TXT - it contains BBS
addresses providing new HackStop version for downloading.
There is the possibility to get the newest Shareware version of
HackStop directly from ROSE Softwareentwicklung. How does it work?
If you want to get always the newest programs from me send an
email to rar@fh-albsig.de - Subject:
HS Dist. List - My handle: <an easy to
remember but unique handle>
I will send you then most of the new programs (all the English
ones plus my virus scanner VirScan Plus in German). Encoded is the
mail with uudecoded and packed with RAR 2.00. The RAR archives
should carry an AV marker signed by "ROSE Softwareentwicklung,
Ralph Roth, Germany". The email length is between 40 KB and 600
KB - remember this will not work with some email gateways,
especially with FIDO gateways. If you decide to leave the
automatic distribution list, you must send me another email -
Subject:
Remove me from the HS Dist. List - Your handle
The adding and removing from the HS Dist. List is done manually by
hand. So do not be surprised if you will not be added or removed
immediately! Please note that this email account is temporary -
from one day to the other it will not longer exist - so if you
want to send me normal mail first try my FIDO email address.
Address see below or you can find it in the files REGISTER.DOC and
ROSEBSS.TXT.
4.5 My Address
ROSE Softwareentwicklung
Dip.-Ing. (FH) Ralph Roth
Finkenweg 24
D 78658 Zimmern
Germany
E-Mail address, meanwhile invalid?: rar@fh-albsig.de
If you got NO response from that E-Mail address try my
Fido address:
Ralph_Roth@p2.f2101.n246.z2.fidonet.org
HS.DOC Documentation for HackStop Page 11
(Fido: Ralph Roth 2:246/2101.2)
Check the file REGISTER.DOC for my FAX address!
4.6 Enhancements In Future Versions
If there is enough interest (registrations!) in HackStop the fol-
lowing features could be implemented:
■ Relocation and encryption of your EXE files
(remember COM files are encrypted!). A prototype
already exists (REC) which I use to protect HS.EXE
and COM2EXE.EXE!
■ Enhanced encryption of the HackStop header using a
mutation engine. I think there is no need for this
- if you register you will get RCC (ROSE's COM
Crypt) which makes use of a mutation engine.
■ Virus selfchecking of COM and EXE files (optional).
■ Password protection of HackStopped COM and EXE
files (optional).
■ Optional 80386 checking of HackStopped programs.
80386 anti debugger code.
■ More traps and different debugging macros.
■ Handling of Win 3.x (NE) and Windows 95/Win-NT (PE)
EXE programs.
Thank you for evaluating HackStop and actually reading the
documentation! Happy HackStop'ing! All improvements and sugges-
tions will be welcome! If you can hack HackStop, please send me
the unpacked files back!
4.7 Some technical stuff
With version 1.11, HackStop adds a signature to programs protected
with HackStop. You will find at the last 9 bytes at the end of the
file the following code:
"HS", verhi, verlo, "MsDos"
"verhi" and "verlo" are the version numbers of the used HackStop
program. If you have used version 1.11 then verhi is 1 and verlo
is 11.
Some C code:
printf("Version used: %i.%02i", verhi, verlo);
Note that you can remove this signature with the "-k" switch in
the registered version of HackStop!
4.8 Credits
I would like to thank and send "greetings" to the following peo-
ples for pitching in ideas and doing beta testing of HS:
■ Ben Castricum (author of UNP)
■ Christian Ghisler (author of Win-Commander)
HS.DOC Documentation for HackStop Page 12
■ Marquis Soiree - Top hacker of UCF - Greetz dudes (contact
me)! Write a generic HS unpacker next time!
■ Peter Hubinsky (Sysop SAC BBS/SAC ftp) for being the first
distributor of HackStop world-wide.
■ Rafal Wierzbicki & Piotr Warezak (authors of WWPack & BSQ)
■ Ralph Biedermann (sysop of LionBox/Germany), all the sysops
distributing HackStop!
■ Stefan Kurtzhals (author of SSC)
■ VrtíkSoft - J. Války & L. Vrtík (authors of TraceLook). THX
guys for pitching in so many ideas in HackStop.
■ Willi Marquardt for antidebugging tricks and for hacking HS.
■ KA0T/Rand0m, X-Adi, UCF - Ohne Worte Jungs! Mehr dazu im
Intro!
■ Walter Gabor for correcting the docs.
■ Andreas Marx, J.H. Dinges & Grischa Brockhaus for finding
bugs.
■ All I have forgotten to mention: Run HS.EXE with the option
"-i"
/* the end */
HS.DOC Documentation for HackStop Page 13