HELP for the TOP Unprotect Library I. Welcome to the TOP Unprotect Library. This Library has been setup with V. Buergs LIST Program for Convenience. It is a collection of Unprotects that the group Tired of Protection has done. Tired of Protection has put many long hours of work into cracking these programs. II. CONTENTS. I. - Welcome. II. - Contents. III. - Getting Started. IV. - Using LIST. V. - The Setup. VI. - General Format of the Unprotects. VII. - Editors. VIII. - General Method. IX. - Problems. X. - Bye. III. GETTING STARTED. You already have! IV. USING LIST. In using V. Buergs LIST program there are a few commands of note. H - Help inside V. Buergs list # - Jump to a certain Line number HOME - Begining of the File END - End of the File PgUp - Jump up one Unprotect/Page PgDn - Jump Down one Unprotect/Page Arrows - guess..:->. ESC - Quit V. THE SETUP. The Unprotect library is setup on a PAGE by PAGE basis. The First Page is an introduction. The Second page and possible Third page is a Table of Contents. The Last page is a Final note per Library. The Pages in between are Unprotects that have been done. Each Page is numbered and the line numbers are put in the table of contents. To get to any specific Unprotect you would then use the '#' key and jump to the correct page. To scroll through the unprotects just press PgUp or PgDn or Enter. If you have any trouble finding a Unprotect, there is an Alphabatized listing of the unprotects and where they may be found. VI. GENERAL FORMAT OF THE UNPROTECTS. The Unprotects are setup using a general format to make unprotecting files easier. The Format is as follows NAME OF THE PROGRAM USING: <- This field tells you what editors to use to unprotect the program. FILE TO SEARCH: <- This tells you what file the changes need to be done to. SEARCH STRING: <- This tells you what to search for in the File using the editors. CHANGE: <- This tells you the byte to change TO: <- This tells you what to change the bytes to. NOTES: <- This is just some notes concerning the unprotection schemes. VII. EDITORS. 1. PCTOOLS/PCSHELL. This Program is most commonly used. It is put out by Central Point Software. Enter the PCSHELL and Highlight the file you are going to edit based on information in this Library. Type ALT-F S F9 Then you input your string. When the String has been found you hit F8 and enter the HEX editor. You then make the changes and F5 to save it. You are done. - Other Editors that HEX edit are: DISKEDIT NORTONS some Shareware stuff around. 2. DEBUG. Debug is an old way of cracking thing and you will rarely come up with this one. Debug is included with your DOS system. Information will be provided to deal with unprotection of files that the unprotect was done in debug. VIII. GENERAL METHOD. 1. !!!Make BACKUPS of your ORIGINALS!!! 2. Find the correct unprotect in this library and jot down important information. 3. Enter the Editor and apply the crack. 4. Run the program. 5. Finished. IX. PROBLEMS The Main problem you should have now is that the unprotect did not work or messed up the program. This is why you MADE a BACKUP right? Software Companies, in order to prevent unprotection, sometimes puts out multiple releases of a file with changes in the protection scheme. We cannot find every file and alert you to this. Another Problem is you may have made a wrong byte change. RE-READ the Unprotect strings.. Zeros and Eights look a Lot Alike! Try this again. X. BYE The Unprotects were done using Soft-Ice, Turbo Debugger, Debug and a few misc debuggers. Enjoy the Library! We are Tired of Protection. Aren't YOU? End of TOP Unprotect Library Help