home *** CD-ROM | disk | FTP | other *** search
Wrap
FROM "Electronic News"- October 1,1984 Quote: DETECTOR HURTS SOFTWARE PIRATES by Jill A. Golden Westlake Village, Calif. -Vault Corp has escalated the war against software pirates with a new protection system that randomly destroys data if improperly used. Prolok-plus, successor to Prolok, detects attempts to use illegally duplicated computer programs. Upon discovering such activity, Prolok-plus informs the pirate that in 10 seconds,random data erasures will be made on the offending disk. This method keeps users honest by offering them the chance to remove the illegally duplicated disk from their systems before any harm can be done. Prolok-plus, as did Prolok, works by locking a program to the originally purchased disk by virtue of a "fingerprint" - a small laser-burned hole in a unique place on the disk - that identifies the orginal disk. Whenever a user loads a program off the protected disk into the system memory, Prolok first checks to make sure that the proper fingerprint is in place. If the fingerprint is properly detected, the program will be loaded and run in a manner completely unknown to the user. NO FINGERPRINT, NO TRANSFER If the fingerprint is not properly discerned - such as when an illegal copy is being used - then Proleck refuses to load the program. Prolok does allow backup copies to be made and run, but only after the original has been submitted to the computer for fingerprint verification. Prolock-plus includes this protection mechanism but adds the extra protective feature of investigating any attempts that may have been made to defeat the fingerprint- detection scheme. When detected, Prolok-plus warns the user to remove the illegally duplicated diskette. If the user continues to try to use the program, then Prolok-plus performs the retributive act of using a so-called programming "worm" to randomly destroy data untilthe system si shut down. This sort of data loss is particularly catastrophic for hard-disk users who store most of their information on one large disk. "The war against software pirates is definitely escalated by Prolok-plus," notes senior vice-president Dixon Smith, who estimates that nearly $750 million a year is lost to casual software theft. PIRATES RISK RETRIBUTION Prolok-plus is a response to the succesful "copy-buster" products being sold commercially by several mail-order houses. These systems work on Prolok by replacing the fingerprint verification routines with programming that mimics the verificatin procedure on a illegally copied diskette. Prolok-plus defeats this code-breaking method by searching out the substituted programming. Vault's protection scheme is now being used on over 3,500 computer programs, notably on Ashton-Tate's products, Framework and dBase III. Vault Corp.' 2649 Townsgate Rd.,Suite 500, Westlake Village, Calif. 91361; (805) 496-6602. ================================================================= and a few weeks later...... Electronic Engineering Times, October 22, 1094 VALUT'S FILELOK DISKETTES PROVIDE HIGH SECURITY WITH 'FINGERPRINTS' Westlake, Calif.------When you walk into the local software store this fall, do not be surprised to see high-security diskettes on the shelf next to the more ordinary single-sided, double-sided and double-sided/double-density varieties. Vault Corp., here, in cooperation with 3M Co. (St. Paul, Minn.) is marketing the Filelok data diskette for high-security users. When using Filelok diskettes, the computer operator has the perogative of locking individual data files onto the original diskette with a user-defined password protection. All applications involving sensitive data, such as payroll information, can be protected from unauthorized access through use of Filelok diskettes. These ensure that there is only one original copy and that only those with the authorized password have access to it. Filelok also permits a higher degree of confidence when transporting sensitive data to temporary environments. Filelok- protected information can be used on remote computers only in the presence of the original diskette. Like Vault's first OEM product, Prolok, Filelok diskettes have a unique laser-burned "fingerprint" on the surface to encrypt the data contained on them. Before the protected data can be accessed, a small program on the Filelok diskette must verify that the fingerprinted diskette is in the system as well. In this way, backup copies are always secure because they cannot be accessed except in the presence of the original. Unlike Prolok, however, Filelok adds the extra level of password protection. When then user secures data with Filelok, a password is associated with the file that only this particular user knows. That password is always requested of the user whenever the protected file is accessed. - Vault Corp., 2649 Townsgate Road, Suite 500, Westlake, Calif. 91361; (805) 496-6602. 10-30-1984 21:03:24 BOB BEILSTEIN (ID0049) ALL COPY PROTECTION 30 I am told that the "CopyWrite" program, from: Quaid Software, Limited 45 Charles Street East, Sixth Floor Toronto, Ontario, Canada M4Y 1S2 will make a usable backup copy of ANY copy-protected disk currently in use on the PC (including PROLOCK-protected disks!). Don't ask me how they make the copy look like it has a laser hole in it, but I have it on good authority that they do (something supposed to be theoretically impossible, if I recall PROLOCK's literature). I understand they also revise the program monthly to keep up with changes in copy protection schemes (apparently the PROLOCK folk changed their scheme last month, and this month CopyWrite will once again back up PROLOCK disks). The program is $50.00 (U.S.), and updates are $12.00 (available, as I said on a monthly basis). If this program does all it is supposed to do (and I have every reason to believe it does), then perhaps I will finally be at the point where I can buy a program I need to depend on even if it i s supplied in copy-protected form. Bob Beilstein ************************************************************************* 10-30-1984 21:49:51 SYSOP BOB BEILSTEIN (ID0049) COPY PROGRAMS 9 I know of AT LEAST three (3) programs on the market that will copy PROLOK disks (and most others). Interesting, none of them will copy everything, but if you have all three, you will get almost every floppy made today copied TO ANOTHER FLOPPY. 1. CopyWrite 2. COPYIIPC 3. Disk Mechanic (version 4) Gene Plantz ************************************************************************* 11-02-1984 06:21:20 LYNN LONG (ID0023) ALL PROLOK-PLUS 7 I read in the current issue of PC Magazine that there is a new version of Porlok that will do damage to your equipment if you attempt to run the software from a copy. Has anyone run into this yet? I have a hard time buying the concept that they can do damage to the equipment Lynn Long ************************************************************************* 11-02-1984 06:35:22 EVERETT JOHNSON (ID0217) LYNN LONG (ID0023) (R) PROLOK EQUIP. DAMAGE 3 I could quickly write a program which would damage your display and even cause it to emit smoke by overdriving it. I have no idea what PROLOK is doing. ************************************************************************* 11-02-1984 09:48:33 ED FISCHER (ID1359) LYNN LONG (ID0023) PROLOK ADS 4 My impression from the wording of the Prolok news was that Prolok issued a warning during copying attempts that it would trash your hardware, but perhaps would not actually do so. I think it was intended as a threat only. ************************************************************************* 11-02-1984 11:55:46 ROBERT DEW (ID0044) LYNN LONG (ID0023) PROLOK 11 If you take a look at the 11/19 issue of InfoWorld it confirms that Vault Corp. are ready to issue a version called Killer Prolok which will allow copies to be made but during the running of the program it will randomly trash hard disks etc. The article is well worth reading. The teo men who designed it should by taken out to the tennis courts one night late and have their hard disks f...ed around with. Quite an irresponsible attitude to copy protection. I just wish that the article had listed their addresses. Their photos were published. Time for egg throwing at COMDEX!!!??? ************************************************************************* 11-02-1984 13:08:59 ALAN LOSOFF (ID0010) LYNN LONG (ID0023) KILLER PROLOK 29 The article in the 11/19 INFOWORLD describes several nasties that killer pro-lock may do if it gets angry. I think that trashing random bytes in your hard disk allocation table is close enough to physical damage to make their statements accurate. I agree with others that this is an incredibly irresponsible approach to copy-protection. I expect that even the "legal" copy of software so protected could trash your disk if you got a speck of dust on it. What about bugs?? It`s hard enough to debug software that doesn't TRY to trash your disk. I am hereby serving notice on the vendors of PROLOK and all their customers, that I will not buy any product from any company that uses PROLOK, unless and until they stop this horrendus practice. I am also advising any of my clients the same. Perhaps if a vendor sees that using prolok (any version) results in an instant loss of sales, we can drive these vandals out of business. I do not believe it serves any vendor's purposes to protect their own interests at the expense of their customers. Not if they hope to have any customers. I do not condone piracy, but I think the vendors who put the customer's interests first will not be hurt in the long run. I hope others will join me in this "boycott". And I hope some of the lawyers out there will publish advise on how to collect the maximum damages when killer prolok kills. ************************************************************************* 11-02-1984 15:03:36 LYNN LONG (ID0023) ALL PROLOK 17 Thanks to all of you for the info on PROLOK. I do not condone pirating software and the few times I have made illegal copies they were for backup purposes only. Personally I think Turbo Pascal has the answer. They put out a quality product at a fair price and the manual is designed so that would be destroyed if someone attempted to xerox it. I had rather pay them the $50 than I had take two or three hours copying their manual. I only wish that Ashton-Tate especially and LOTUS would take a hint from them. If there are any lawyers using this board I would like to know what the legal obligation might be to a software vendor who intentionally caused damage to a piece of equipment with a copy protection scheme. I think we all should refuse to purchase Ashton-Tate and Lotus products until they change their way of thinking. Lynn Long ************************************************************************* 11-02-1984 20:22:52 RON FOX (ID0204) LYNN LONG (ID0023) COPY PROTECTION 6 I read that article you refer to. There was some discussion about a plug that would attach to a serial port and use the pins not normally used for communications in some sort of scheme. Imagine my glee when I realized that the new IBM serial ports for the AT don't have those pins!!! HAHAHAHAH. I hope they sunk a lot of money into that. ************************************************************************* 11-03-1984 00:34:54 SCOT GILES (ID0113) LYNN LONG (ID0023) PROLOC PLUS 29 I saw the article on PROLOC PLUS too, also, I'd talked to some who claim to have more (secret) info on the system. The protection scheme contains a "worm" program that is released on the system disk if the PROLOC code decides that the disk being used is an illegal copy. The worm program attaches itself to DOS and begins to systematically corrupt data being read or written by the system. According, when you save your datafile to disk, you are actually saving a corrupted file and the more you use it the more corrupt it gets. Also really evil worm programs actually contain code that causes the computer to erase sectors on the program disk each time the computer reads from the disk. That, reportedly, is all PROLOC PLUS does. It doesn't actually attack hardware--however, I'm also assured that it would be possible to create a worm program that did (versions of the old SCRNSAVE program used to destroy Hercules Graphic Cards, so it's possible), but the legal consequences would be far-reaching. As for me and mine I'm with you in refusing to buy copy-protected software. I reorganize my hard disk too often to want to deal with such, and I like my word- processor on a RAM disk, and I'd get real insecure knowing that at 11:50 PM on a Saturday night, when I'm trying to get my sermon finished (I'm a minister) that my computer could get cathair in a diskdrive, decide I'm using a copied program, and proceed to wipe out a week's work. I suspect software companies are in business to make money and if we'd all refuse their wares if copy-protected, they'd stop. ************************************************************************* Note: The Nov. 27 PC-Week had an article that stated that Aston-Tate had dropped Pro-Lok, even though they own 20% of Vault Corporation, the makers of Pro-Lok. Their "official" reason was the inconvenience caused customers by the floppy being in drive A. Their off-the-record reason was concern that users would mistake their pro-lok with pro-lok plus and would be driven away from the producttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttshesa oaososvPshstPwaoRfs sesP.uKsocpdsfOe 0ecCIsSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSdse svPsheSGsosvPshstPwaoRuears sesAaseKkosvPst0pnLdC dasP oOf svPati oftatststshstPwaoRftas sesPw?aase t shcnAd yAdlttdse svPststat.gsPstshstPwERftyRs sesP.- 4hasPstst0pnd dOoPst oOf svPshlaosososvPshstPwdursoaoRs sesP.t?sese t ssn t d eO OEdptPststysoxisPstshstPwlurf.urs aasPwso peaesPststtbvrAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss tdse svAaSGaoEsvPshstPwdursolurs sesP.uKEfhpdgdcTDPnPo