Ray Arachelian wrote:
There were all sort of weird and wonderful protection
schemes, and also
there were plenty of copier programs to break or bypass them. It was
quite an evolutionary's cesspool. The protection guys would invent
something new as soon as their old scheme was broken, so the guys
breaking them would get even more creative at building copiers. In the
end, I think, the crackers won.
I'd quite like to see those documented somewhere - not just for CBM machines,
but in the context of any system. I bet there were all sorts of oddball copy
protection schemes around, and it'd be interesting to see details of some of
them scribbled down (as you've just done so nicely!)
cheers
Jules
--
If you've ever wondered how you get triangles from a cow
You need buttermilk and cheese, and an equilateral chainsaw