home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
The World of Computer Software
/
World_Of_Computer_Software-02-385-Vol-1of3.iso
/
t
/
toplib40.zip
/
TOPHELP.TXT
< prev
next >
Wrap
Text File
|
1993-01-13
|
4KB
|
103 lines
HELP for the TOP Unprotect Library
I. Welcome to the TOP Unprotect Library. This Library has been setup with
V. Buergs LIST Program for Convenience. It is a collection of Unprotects that
the group Tired of Protection has done. Tired of Protection has put many long
hours of work into cracking these programs.
II. CONTENTS.
I. - Welcome.
II. - Contents.
III. - Getting Started.
IV. - Using LIST.
V. - The Setup.
VI. - General Format of the Unprotects.
VII. - Editors.
VIII. - General Method.
IX. - Problems.
X. - Bye.
III. GETTING STARTED.
You already have!
IV. USING LIST.
In using V. Buergs LIST program there are a few commands of note.
H - Help inside V. Buergs list
# - Jump to a certain Line number
HOME - Begining of the File
END - End of the File
PgUp - Jump up one Unprotect/Page
PgDn - Jump Down one Unprotect/Page
Arrows - guess..:->.
ESC - Quit
V. THE SETUP.
The Unprotect library is setup on a PAGE by PAGE basis. The First Page is an
introduction. The Second page and possible Third page is a Table of Contents.
The Last page is a Final note per Library. The Pages in between are Unprotects
that have been done. Each Page is numbered and the line numbers are put in the
table of contents. To get to any specific Unprotect you would then use the '#'
key and jump to the correct page. To scroll through the unprotects just press
PgUp or PgDn or Enter.
If you have any trouble finding a Unprotect, there is an Alphabatized
listing of the unprotects and where they may be found.
VI. GENERAL FORMAT OF THE UNPROTECTS.
The Unprotects are setup using a general format to make unprotecting files
easier. The Format is as follows
NAME OF THE PROGRAM
USING: <- This field tells you what editors to use to unprotect the program.
FILE TO SEARCH: <- This tells you what file the changes need to be done to.
SEARCH STRING: <- This tells you what to search for in the File using the
editors.
CHANGE: <- This tells you the byte to change
TO: <- This tells you what to change the bytes to.
NOTES: <- This is just some notes concerning the unprotection schemes.
VII. EDITORS.
1. PCTOOLS/PCSHELL. This Program is most commonly used. It is put out by
Central Point Software. Enter the PCSHELL and Highlight the file you are going
to edit based on information in this Library. Type
ALT-F S F9
Then you input your string. When the String has been found you hit F8 and
enter the HEX editor. You then make the changes and F5 to save it. You are
done.
- Other Editors that HEX edit are:
DISKEDIT
NORTONS
some Shareware stuff around.
2. DEBUG. Debug is an old way of cracking thing and you will rarely come up
with this one. Debug is included with your DOS system. Information will be
provided to deal with unprotection of files that the unprotect was done in
debug.
VIII. GENERAL METHOD.
1. !!!Make BACKUPS of your ORIGINALS!!!
2. Find the correct unprotect in this library and jot down important
information.
3. Enter the Editor and apply the crack.
4. Run the program.
5. Finished.
IX. PROBLEMS
The Main problem you should have now is that the unprotect did not work or
messed up the program. This is why you MADE a BACKUP right? Software
Companies, in order to prevent unprotection, sometimes puts out multiple
releases of a file with changes in the protection scheme. We cannot find every
file and alert you to this.
Another Problem is you may have made a wrong byte change. RE-READ the
Unprotect strings.. Zeros and Eights look a Lot Alike! Try this again.
X. BYE
The Unprotects were done using Soft-Ice, Turbo Debugger, Debug and a few misc
debuggers.
Enjoy the Library!
We are Tired of Protection. Aren't YOU?
End of TOP Unprotect Library Help