home *** CD-ROM | disk | FTP | other *** search
-
-
- ══════════════════════════════════════════════════════════════════════════════
-
-
- ┌───────────────────────────────┐
- │ Lock-Master 9.0 Documentation │
- └───────────────────────────────┘
-
-
-
- Lock-Master... Your software investment protector.
- ──────────────────────────────────────────────────
-
-
-
- Introduction:
- ─────────────
-
-
- Have you ever written a program, then found out the next day that your program
- had been cracked/hacked and uploaded to all the bbs's across North America?
-
- Have you ever invested lots of time and money developing a program which you
- released as shareware with a registration option, and found out that someone
- made a generic "key" registration program to crack-register your current and
- future version of that software?
-
- Ever invest in purchasing a copy-protection product like a key-disk or a dongle
- plug protection to protect your software from being copied by everyone, and
- then the next day, discovering a cracked copy of your program on a bbs - even
- though it was "protected"?
-
- If you answered yes to any of the above, then this is what you need. A
- revolutionary new product, the only one in the world right now, a program
- that will totally change software security procedures now, and in years to come.
- It's called....
-
-
- ≡ L O C K - M A S T E R 9.0 ≡
-
-
- Lock-Master v9.0 is a program that protects any program for the IBM or
- compatible PC from being traced/disassembled or viewed. It's uses are
- numerous, but it's main purpose is to protect your program from being
- hacked/cracked or modified.
-
- Lock-Master 9.0 can be integrated into any IBM or compatible executable
- file (COM or EXE). Once integrated, the master program is locked. All
- known debuggers will be shut down. If someone tries to trace the protected
- master program, his computer will freeze and reboot. Tracing, disassembling,
- or producing a source code listing is... let's just say nearly impossible.
-
- Lock-Master 9.0 cannot be reverse-engineered, mostly because it's code
- unencrypts the new data OVER the used up code while running. It
- cannot be modified in any way, due to it's 8 layered reverse-encryption
- and multiple CRC code checking routines. Also, all of Lock-Master's
- anti-debugging routines calculate a complicated checksum, which they use
- to reverse-unencrypt other modular routines, which inturn use the previous
- checksum to complete their functions! Overall it's a nightmare to trace,
- even to the most experienced cracker.
-
- There are about 3 other products that say they "protect" your exe/com files
- from hackers - but as you know, there are unprotect programs written for them
- already out there. These programmers might write nice exe/com encryption and
- compression routines, but they don't provide any anti-debugger/hacker
- protections. And those that do, are always easily bypassed by the average
- 14 year old.
-
- You see, a software protection is only as good as it's "envelope". You can
- utilize the best hardware/software protection for your software, but if it
- doesn't have a good "envelope lock", it's like protecting a 10 foot steel
- bank safe with a barbie doll lock!
-
- I have spent about 4 years on and off, optimizing and inventing
- some of the best anti-debugger routines that you will ever find for the IBM PC.
-
- As you know, everything can be cracked with time. Someday, some wizard out
- there will figure a way to trace through Lock-Master's protection. After
- spending a LOT of months, he might find a bypass method. But all you need to
- do is request a Lock-Master routine modification upgrade, and you will put him
- back to square one! - He will have to forget everything he did and restart
- from scratch, because all the routines would be different.
-
-
-
- Places where you might want to utilize Lock-Master 9.0 :
- ───────────────────────────────────────────────────────────────
-
-
- * Releasing a shareware program with a registration option.
-
- * Releasing a commercial copy-protected program. (Either with a key-disk
- or a security/dongle plug protection)
-
- * Releasing any program that you don't want hacked, cracked or modified
- in any way.
-
-
- About the demo:
- ───────────────
-
-
- This Lock-Master 9.0 demo was coded so that you would be able to experiment
- and evaluate just how powerful Lock-Master 9.0 really is. The file included
- with this zip called LM9-DEMO.COM is protected with Lock-Master 9.0. Try to
- view, edit, trace, or modify that file - you will then understand the power
- of Lock-Master 9.0. You can use ANY debugger for the IBM PC. It doesn't
- matter which one you use, they will all be TERMINATED the hard way. (Be
- prepared to reboot your machine VERY often!)
-
- To start the demo, simply run LM9-DEMO.COM. Make sure you don't have any
- debuggers resident in memory, otherwise the demo won't run. You will then
- see a screen describing Lock-Master. You cannot quit the demo back to the
- dos prompt. To quit, you have to reboot your machine. This was done so that
- everytime you trace, and mess up, you will have to hard boot - this should
- give you lots of "fun"!
-
- This demo is just a demo - it cannot be cracked/hacked and used as a software
- protection program. All the routines for protecting your exe/com files have
- been removed from this demo, and are only available in the registered version.
-
- ══════════════════════════════════════════════════════════════════════════════
-
-
- ┌────────────────────────────────┐
- │ Lock-Master 9.0 technical info │
- └────────────────────────────────┘
-
-
-
- The following features are incorporated into Lock-Master 9.0
- ──────────────────────────────────────────────────────
-
-
- ■ Written in 100% PURE asm/machine language.
- ■ Written in hacker-deterrent, non-standard code.
- ■ Maximal space-optimized coding.
- ■ 8 way reverse-encrypted code.
- ■ Compressed code.
- ■ Self-checking file integrity routine.
- ■ Self-checking code integrity routine.
- ■ Automatic warning of file modification - file size & checksum.
- ■ Automatic warning of altered code.
- ■ Automatic warning of insufficient memory.
- ■ Automatic warning of missing loader file.
- ■ Automatic warning of invalid/hacked loader file.
- ■ Dos version warning if too low.
- ■ Hack proof code.
- ■ Strip-proof code.
- ■ Reverse-engineer proof code.
- ■ Debugger proof code.
- ■ No memory usage.
- ■ Works on ALL IBM and compatible machines.
- ■ Permanent virus-free file protection - You will never get
- infected with a virus - directly linked, or imbedded in a
- Lock-Master protected file.
-
-
- ══════════════════════════════════════════════════════════════════════════════
-
-
- ┌───────────────────────────────┐
- │ Lock-Master 9.0 Registration │
- └───────────────────────────────┘
-
-
- When you register Lock-Master 9.0, you'll receive a disk with the latest
- version of Lock-Master, the usage manual, and upgrade information. With
- that disk, you'll be able to protect your com or exe files with Lock-Master.
- There is no limit or "protect-count" on the number of files that you can
- protect with Lock-Master.
-
- Once you register, your name, phone and other information is serialized
- into the Lock-Master protect program. It's not just encrypted and written
- in the file, it's transformed into machine-language instructions, which are
- then used by the Lock-Master protect program to do some protection calculations
- etc! Your whole system info is also recorded and kept track of. Your
- protected exe/com files will not contain your personal information, just the
- Registered Lock-Master protection program will.
-
- We are all sick of those hackers/crackers who steal our software investments,
- it's time to do something about it. This program was not written to make
- money, it was written to help the hard working computer programmers like
- yourselves. The registration costs are very low, for the amount of time that
- it took to develop Lock-Master 9.0 - This is the first public release, and
- we are at version 9.0 already! - that's because all previous versions were
- beta versions, or were upgraded and enhanced with more options.
-
- To receive your registered version of the latest Lock-Master software
- protection program, send a cheque or money order payable to :
-
-
- Andrew Kacy
-
- P.O BOX 233
- Pierrefonds, Quebec
- Canada
- H9H 4K9
-
-
- USA customers send : $25, plus $5 for shipping and handling.
- Canadian customers send : $30, plus $5 for shipping and handling.
- Overseas customers send : $30 Canadian International money order,
- plus $8 Canadian for shipping and handling.
-
-
-
- USA company orders send : $50, plus $5 for shipping and handling.
- Canadian company orders send : $60, plus $5 for shipping and handling.
- Overseas company orders send : $60 Canadian International money order,
- plus $8 Canadian for shipping and handling.
-
-
-
- Fill out and print the form below. Include it with your letter.
-
-
- <cut here>....................................................................
-
- ===============================================================================
-
- FROM:
-
- Name: ______________________________________________________
-
- [Company]: ______________________________________________________
-
- Reg Name: ______________________________________________________
- [Used to register your software, 30 characters max]
-
- Address: ______________________________________________________
-
- City: ____________________________ State: _____________________
-
- Country: ____________________________ Postal Code: ____________
-
- Phone: ________________________ Fax: ___________________________
-
-
- Where did you obtain the Lock-Master demo from? ___________________
-
- ______________________________________________________
-
- What do you intend to use Lock-Master for? ________________________
-
- ______________________________________________________
-
- ______________________________________________________
-
- Future product suggestions:________________________________________
-
- ______________________________________________________
-
- ______________________________________________________
-
- ===============================================================================
-
- <cut here>....................................................................
-