📄 54175
字号:
Path: cantaloupe.srv.cs.cmu.edu!rochester!udel!news.udel.edu!darwin.sura.net!howland.reston.ans.net!torn!news.ccs.queensu.ca!qucdn!leekOrganization: Queen's University at KingstonDate: Sat, 24 Apr 1993 21:18:18 EDTFrom: <LEEK@QUCDN.QueensU.CA>Message-ID: <93114.211818LEEK@QUCDN.QueensU.CA>Newsgroups: sci.electronicsSubject: Re: How to the disks copy protected.References: <1rc4dbINNp44@phage.cshl.org> <C60DvH.FAn@ucdavis.edu>Lines: 44In article <C60DvH.FAn@ucdavis.edu>, ez019654@othello.ucdavis.edu (VictoriaMilliron) says:>> A possibility for the software registration conondrum would be to have the>distributor register the copy when the software was sold. The clerk sticks itThat's kind of extra work that one cannot expect the store people to do.IMHO it would be easier if companies sell their software as cheaply aspossible AND to sell the customers detail manuals (for the brain-deads), quick reference books, how to do books and videos, paid support hot line(1-900 :). For the registered purchasers, these can be part of their package.I have seen many books to teach people how to use DOS, WP and other software. II suspect either users can't read the manuals or they don't have manuals.Either way, there is $$$ to be made. BTW books are quite a bit moreexpensive to reproduce than a $1 disk.>What is the problem with parallel port security keys? I haven't used anything>that had hardware key copy protection schemes, so I don't know what the>drawbacks are. I know the companies that make them claim they're uncrackable,With the popularity of Multitasking and pseudo multitasking systems(eg. OS0.5, Windoze, Mack System 7), it is pretty easy to run a debuggerand figure out the protection schemes by disassembling/tracing/trappingthe application during run time. Schemes like compressed software/special loaders would be easy pray even to beginner hackers.Hardware keys (unless well designed and *TOTALLY* transparent) is apain in the b*t. We having using a piece of software under Windozethat uses a hardware key. The key interfers with the printer stuffwith other programs and often has to be unplugged for those softwareto work properly.>but I've seen cracks of AutoDesk 3d-studio floating around (I don't have one>so don't ask) and I had heard that it had parralel port keys.All the hacker has to do is to remove/modify code that communicate withthe port.>vamilliron@othello.ucd.edu>-my apologies if I rambled, but vi inhibits my communication skills greatly.K. C. LeeElec. Eng. Grad. StudentOS0.5, Windoze, Mack are not trademarked...
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -