home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Tricks of the Mac Game Programming Gurus
/
TricksOfTheMacGameProgrammingGurus.iso
/
Information
/
CSMP Digest
/
volume 2
/
csmp-v2-010.txt
< prev
next >
Encoding:
Amiga
Atari
Commodore
DOS
FM Towns/JPY
Macintosh
Macintosh JP
NeXTSTEP
RISC OS/Acorn
UTF-8
Wrap
Text File
|
1994-12-08
|
48.9 KB
|
1,229 lines
|
[
TEXT/R*ch
]
C.S.M.P. Digest Sun, 07 Feb 93 Volume 2 : Issue 10
Today's Topics:
Distinguishing FrontClicks?
Uniquely identifying a Mac? How?
The Comp.Sys.Mac.Programmer Digest is moderated by Michael A. Kelly.
The digest is a collection of article threads from the internet newsgroup
comp.sys.mac.programmer. It is designed for people who read c.s.m.p. semi-
regularly and want an archive of the discussions. If you don't know what a
newsgroup is, you probably don't have access to it. Ask your systems
administrator(s) for details. If you don't have access to news, you can
post articles to any newsgroup by mailing your article to
newsgroup@cs.utexas.edu
So, to post an article to comp.sys.mac.programmer, mail your article to
comp-sys-mac-programmer@cs.utexas.edu
Note the '-' instead of '.' in the newsgroup name. Be sure to ask that
replies be emailed to you instead of posted to the group, and give your
email address.
Each issue of the digest contains one or more sets of articles (called
threads), with each set corresponding to a 'discussion' of a particular
subject. The articles are not edited; all articles included in this digest
are in their original posted form (as received by our news server at
cs.uoregon.edu). Article threads are not added to the digest until the last
article added to the thread is at least one month old (this is to ensure that
the thread is dead before adding it to the digest). Article threads that
consist of only one message are generally not included in the digest.
The entire digest is available for anonymous ftp from ftp.cs.uoregon.edu
[128.223.8.8] in the directory /pub/mac/csmp-digest. Be sure to read the
file /pub/mac/csmp-digest/README before downloading any files. The most
recent issues are available from sumex-aim.stanford.edu [36.44.0.6] in the
directory /info-mac/digest/csmp. If you don't have ftp capability, the sumex
archive has a mail server; send a message with the text '$MACarch help' (no
quotes) to LISTSERV@ricevm1.rice.edu for more information.
The digest is also available via email. Just send a note saying that you
want to be on the digest mailing list to mkelly@cs.uoregon.edu, and you will
automatically receive each new issue as it is created. Sorry, back issues
are not available through the mailing list.
Send administrative mail to mkelly@cs.uoregon.edu.
-------------------------------------------------------
From: Michael_Hecht@mac.sas.com (Michael Hecht)
Subject: Distinguishing FrontClicks?
Date: 23 Dec 92 16:07:49 GMT
Organization: SAS Institute Inc.
Hello!
I turned on the getFrontClicks bit in my SIZE resource, because it makes
sense for my application. However, I don't want *all* parts of the window
to respond to layer-changing clicks. How can I distinguish a click that
changes my layer from other clicks?
I can't just assume the next click after a resume event is a frontClick,
since the user may have switched to me via the application menu or by
double-clicking my Finder icon. For all I know, some other app may have
called SetFrontProcess for me! Just throwing out the next click would
probably frustrate the user (me) in these cases.
The best method I could think of is to use EventAvail to look for
mouseDown events in my resume event handler. If I see one I'll set a flag
that I can look at in my mouseDown handler. Is this a reliable method?
What I'd prefer is something along the lines of an event modifiers flag
on the mouseDown that says "this event caused you to switch layers."
Thanks!
- --Michael
=======================================================================
Michael P. Hecht | Internet: Michael_Hecht@mac.sas.com
SAS Institute Inc.; Cary, NC USA | AppleLink: SAS.HECHT
+++++++++++++++++++++++++++
From: absurd@apple.apple.com (Tim Dierks, software saboteur)
Date: 3 Jan 93 22:40:14 GMT
Organization: MacDTS Marauders
In article <BzpzH1.8tD@unx.sas.com>, Michael Hecht
<Michael_Hecht@mac.sas.com> wrote:
>
> Hello!
>
> I turned on the getFrontClicks bit in my SIZE resource, because it makes
> sense for my application. However, I don't want *all* parts of the window
> to respond to layer-changing clicks. How can I distinguish a click that
> changes my layer from other clicks?
A technique that's worked for me is to compare the 'when' fields of the
click and the resume event; if the mouseDown has a time before the
resume event, then it's probably this click that caused you to be switched.
(The exception would be if the user had posted several events, which got
queued up because [Get|Wait]NextEvent wasn't being called often enough;
for example, if I have an INIT which switches layers when I hit a hot key
installed, and I type the hot key, then click, the click won't have caused
the switch, but it will seem like it had.)
Specifically, when you get a resume, remember the value in the "when"
field;
when you get the first mouseDown after the resume, check its when; if it
was posted before the resume (or at the same time), consider it to be the
click that brought you forward.
Official sounding warning: this is only a side effect of the way the
process manager works now. Don't count on it continuing to work this way,
it's not a documented feature. If you want to use it, make sure you're
willing to accept the ways in which it might break (unreliable detection
of clicks which bring the layer to the front).
Enjoy,
Tim Dierks
MacDTS, but I speak for myself and my Albert Einstein doll
+++++++++++++++++++++++++++
From: keith@taligent.com (Keith Rollin)
Organization: Taligent
Date: Mon, 4 Jan 1993 04:53:53 GMT
In article <absurd-030193142840@seuss.apple.com>, absurd@apple.apple.com
(Tim Dierks, software saboteur) wrote:
>
> Tim Dierks
> MacDTS, but I speak for myself and my Albert Einstein doll
Hmm...looks like DTS still has that x-mas gift swap at the end of the
year...
- -----
Keith Rollin
Phantom Programmer
Taligent, Inc.
+++++++++++++++++++++++++++
From: ericsc@microsoft.com (Eric Schlegel)
Date: 4 Jan 93 16:08:43 GMT
Organization: Microsoft Corporation
In article <absurd-030193142840@seuss.apple.com> absurd@apple.apple.com
(Tim Dierks, software saboteur) writes:
>In article <BzpzH1.8tD@unx.sas.com>, Michael Hecht
><Michael_Hecht@mac.sas.com> wrote:
>>
>> I turned on the getFrontClicks bit in my SIZE resource, because it makes
>> sense for my application. However, I don't want *all* parts of the window
>> to respond to layer-changing clicks. How can I distinguish a click that
>> changes my layer from other clicks?
>
>A technique that's worked for me is to compare the 'when' fields of the
>click and the resume event; if the mouseDown has a time before the
>resume event, then it's probably this click that caused you to be switched.
Wow, I know something that Tim doesn't... :) I've never actually used this,
but according to IM 6, pg. 5-16, the activeFlag bit in the modifiers field
of a mouseDown event will be set if the mouseDown caused your layer to become
frontmost. Also see pg. 2-20 in IM:Mac Toolbox Essentials. Note that this is
a System 7-specific feature - it won't work for MultiFinder under System 6.
- -eric
- -----
My opinions, not Microsoft's.
+++++++++++++++++++++++++++
From: absurd@apple.apple.com (Tim Dierks, software saboteur)
Date: Tue, 5 Jan 1993 22:57:25 GMT
Organization: MacDTS Marauders
In article <1993Jan04.160843.18732@microsoft.com>, ericsc@microsoft.com
(Eric Schlegel) wrote:
>
> In article <absurd-030193142840@seuss.apple.com> absurd@apple.apple.com
> (Tim Dierks, software saboteur) writes:
> >In article <BzpzH1.8tD@unx.sas.com>, Michael Hecht
> ><Michael_Hecht@mac.sas.com> wrote:
> >>
> >> I turned on the getFrontClicks bit in my SIZE resource, because it makes
> >> sense for my application. However, I don't want *all* parts of the window
> >> to respond to layer-changing clicks. How can I distinguish a click that
> >> changes my layer from other clicks?
> >
> >A technique that's worked for me is to compare the 'when' fields of the
> >click and the resume event; if the mouseDown has a time before the
> >resume event, then it's probably this click that caused you to be switched.
>
> Wow, I know something that Tim doesn't... :) I've never actually used this,
> but according to IM 6, pg. 5-16, the activeFlag bit in the modifiers field
> of a mouseDown event will be set if the mouseDown caused your layer to become
> frontmost. Also see pg. 2-20 in IM:Mac Toolbox Essentials. Note that this is
> a System 7-specific feature - it won't work for MultiFinder under System 6.
>
> -eric
> -----
> My opinions, not Microsoft's.
Cool! Just goes to show that Inside Mac VI is bigger than you
can possibly imagine....
Tim Dierks
MacDTS, but I speak for myself
Drop by and say 'Hi' at MacWorld- DTS Debugging Lab, I'll be there
Thursday morning and Friday afternoon.
---------------------------
From: mtc@mundil.cs.mu.OZ.AU (Michael Trevor CUTTER)
Subject: Uniquely identifying a Mac? How?
Date: 14 Dec 92 23:34:35 GMT
Organization: Computer Science, University of Melbourne, Australia
We are looking for a way to uniquely identify a Mac, probably one on a network,
but not necessarily. Is the serial number or similar available somewhere in the
ROMs or parameter RAM? (Highly unlikely, I know - specially since PRAM can be
reset)
We are considering assigning each mac a unique chooser name then disabling the
Sharing Setup Control panel...this is the best solution so far.
Any assistance would be wonderful.
Regards,
Mike.
- --
Michael Cutter email: mtc@mundil.cs.mu.oz.au
Ictinus Network Development Team mtc@arbld.unimelb.edu.au
BCAT Development Team snail: c/- 3 Barton Street
Department of Architecture & Building Hawthorn, VIC, 3122
University of Melbourne, Australia AUSTRALIA
Sort of 3rd Year Computer Scientist phail: 61-3-853 9717
+++++++++++++++++++++++++++
From: bredell@tdb.uu.se (Mats Bredell)
Date: 15 Dec 92 14:11:28 GMT
Organization: Uppsala University Computing Center (UDAC)
Michael Trevor CUTTER (mtc@mundil.cs.mu.OZ.AU) wrote:
: We are looking for a way to uniquely identify a Mac, probably one on a network,
: but not necessarily. Is the serial number or similar available somewhere in the
: ROMs or parameter RAM? (Highly unlikely, I know - specially since PRAM can be
: reset)
:
: We are considering assigning each mac a unique chooser name then disabling the
: Sharing Setup Control panel...this is the best solution so far.
:
: Any assistance would be wonderful.
I also need to solve this problem for a program I'm writing. I've considered
two possibilities:
1. If there's an ethernet card, use the ethernet address.
2. Use the creation date/time of the harddisk or system folder or something
similar.
This method will work as long as the user is not reconfiguring the system or
reformating the harddisk. This is not a problem in my case, since it will
"only" force the user to reconfigure the application in my case.
/Mats
- --
Mats Bredell Mats.Bredell@udac.uu.se
Uppsala University Computing Center (UDAC) Ph: +46 18 187817
Department of medical systems Fax: +46 18 187825
Sweden Think straight - be gay!
+++++++++++++++++++++++++++
From: d88-jwa@dront.nada.kth.se (Jon Wtte)
Date: 15 Dec 92 12:17:56 GMT
Organization: Royal Institute of Technology, Stockholm, Sweden
In <9235010.4295@mulga.cs.mu.OZ.AU> mtc@mundil.cs.mu.OZ.AU (Michael Trevor CUTTER) writes:
>We are looking for a way to uniquely identify a Mac, probably one on a network,
>but not necessarily. Is the serial number or similar available somewhere in the
>ROMs or parameter RAM? (Highly unlikely, I know - specially since PRAM can be
>reset)
The ROMs are masked, so doing them unique would be a trifle expensive :-)
(You could do it by burning wit a laser)
>We are considering assigning each mac a unique chooser name then disabling the
>Sharing Setup Control panel...this is the best solution so far.
If you run MacTCP, each mac will have/get its own IP address;
likewise, EtherNet cards have a 6-byte EtherNet address that's
unique in the world.
- --
-- Jon W{tte, h+@nada.kth.se, Mac Hacker Deluxe --
The word "politics" is derived from the word "poly", meaning
"many", and the word "ticks", meaning "blood sucking parasites".
-- Larry Hardiman
+++++++++++++++++++++++++++
From: roy@mchip00.med.nyu.edu (Roy Smith)
Date: 16 Dec 92 02:16:56 GMT
Organization: New York University, School of Medicine
d88-jwa@dront.nada.kth.se (Jon Wtte) writes:
>If you run MacTCP, each mac will have/get its own IP address;
>likewise, EtherNet cards have a 6-byte EtherNet address that's
>unique in the world.
Well, no, that's not quite true. If you run MacTCP, you basically
have 3 choices:
1) You're configured for "Manual" mode, in which case the only
reason you have an unique IP address is because somebody (manually, hence
the name) configured it in. That somebody could just as easily change it,
either by accident, or on purpose.
2) You're on a LocalTalk segment behind a FastPath (or similar box
with KIP-like dynamic address allocation) and you're configured for "Server"
moded. In that case, you've got an IP address which is currently unique,
but each time you reboot, you (potentially) get a different one. Hardly
useful for identifying a machine on the network.
3) You're on Ethernet and configured for "Server" mode, in which
case a bootp server gave you your IP address, based on a 1-to-1 mapping from
your ethernet address. I don't know about token ring, but presumably the
same thing can happen with TokenTalk.
Then, of course, there's "Dynamic" mode in MacTCP, but I havn't the
foggiest idea what it is. :-)
Unfortunately, as far as I can tell, unless your Mac has an ethernet
(or, presumably, token ring) port, there is no built-in unique way to
identify the machine. I personally think it was a major mistake for Apple
to not have put some sort of machine-readable serial number in each machine.
Actually, there is a machine-readable serial number *on* each machine; it's
the bar-code label on the bottom/back/where-ever. Unfortunately, since most
Macs don't come with bar-code readers, they have no way of finding out their
own serial number. Sort of like walking around with a sign painted on your
forehead that everybody but yourself can read! Obviously, it would have
added something to the manufacturing costs, but slapping those unique
bar-code labels must cost something too; I would have been happy to give up
the unique bar-code on my keyboard and mouse to have a serial number burned
into an eprom on board.
- --
Roy Smith <roy@nyu.edu>
Hippocrates Project, Department of Microbiology, Coles 202
NYU School of Medicine, 550 First Avenue, New York, NY 10016
"This never happened to Bart Simpson."
+++++++++++++++++++++++++++
From: jcav@ellis.uchicago.edu (JohnC)
Date: 16 Dec 92 15:49:37 GMT
Organization: The Royal Society for Putting Things on Top of Other Things
In article <1gm3ioINN9uh@calvin.NYU.EDU> roy@mchip00.med.nyu.edu (Roy Smith) writes:
> Unfortunately, as far as I can tell, unless your Mac has an ethernet
>(or, presumably, token ring) port, there is no built-in unique way to
>identify the machine. I personally think it was a major mistake for Apple
>to not have put some sort of machine-readable serial number in each machine.
[]
Apple's Lisa computers each had a software-accessable serial number. This was
mostly used for copy-protecting software, including the OS. Ick.
- --
John Cavallino | EMail: jcav@midway.uchicago.edu
University of Chicago Hospitals | John_Cavallino@uchfm.bsd.uchicago.edu
Office of Facilities Management | USMail: 5841 S. Maryland Ave, MC 0953
B0 f++ c+ g++ k s++ e+ h- pv | Chicago, IL 60637
+++++++++++++++++++++++++++
From: absurd@apple.apple.com (Tim Dierks, software saboteur)
Date: 16 Dec 92 18:02:49 GMT
Organization: MacDTS Marauders
In article <1gm3ioINN9uh@calvin.NYU.EDU>, roy@mchip00.med.nyu.edu (Roy
Smith) wrote:
>
> d88-jwa@dront.nada.kth.se (Jon Wtte) writes:
> >If you run MacTCP, each mac will have/get its own IP address;
> >likewise, EtherNet cards have a 6-byte EtherNet address that's
> >unique in the world.
[ Stuff about MacTCP configurations ]
> Unfortunately, as far as I can tell, unless your Mac has an ethernet
> (or, presumably, token ring) port, there is no built-in unique way to
> identify the machine. I personally think it was a major mistake for Apple
> to not have put some sort of machine-readable serial number in each machine.
Well, the Lisa had a unique serial number in each machine; as I
understand, it was burned into a special PROM on the motherboard.
This was a major headache at the time, which is why it wasn't
continued in the Mac. The biggest single problem was serviceing
these machines; if the PROM blew, you had to special-order a
PROM that matched the one that had been destroyed (or all your
copy-protected software wouldn't work anymore) or have to go and
tell a number of software companies that your PROM blew so you need
a new unlocked copy of their program. If something else on the
machine broke, or you wanted to upgrade, and you wanted to swap
motherboards, you had to deal with swapping the serial PROMs too.
In the end it was much more trouble than it was worth, and its
only real purpose was copy-protection, and copy-protection is
generally easily worked around, so it was taken out of the Mac.
Tim Dierks
MacDTS, but today my shoes match!
+++++++++++++++++++++++++++
From: ldo@waikato.ac.nz (Lawrence D'Oliveiro, Waikato University)
Date: 17 Dec 92 16:28:20 +1300
Organization: University of Waikato, Hamilton, New Zealand
In article <1gm3ioINN9uh@calvin.NYU.EDU>, roy@mchip00.med.nyu.edu (Roy Smith) writes:
>
> I personally think it was a major mistake for Apple
> to not have put some sort of machine-readable serial number in each machine.
The trouble with providing a feature like that is that people will start to
use it.
Can you say "copy protection"...?
Lawrence D'Oliveiro fone: +64-7-856-2889
Computer Services Dept fax: +64-7-838-4066
University of Waikato electric mail: ldo@waikato.ac.nz
Hamilton, New Zealand 37^ 47' 26" S, 175^ 19' 7" E, GMT+13:00
+++++++++++++++++++++++++++
From: ematias@dgp.toronto.edu (Edgar Matias)
Date: 17 Dec 92 15:58:13 GMT
Organization: CSRI, University of Toronto
> In article <1gm3ioINN9uh@calvin.NYU.EDU>, roy@mchip00.med.nyu.edu (Roy Smith) writes:
> >
> > I personally think it was a major mistake for Apple
> > to not have put some sort of machine-readable serial number in each machine.
>
> The trouble with providing a feature like that is that people will start to
> use it.
>
> Can you say "copy protection"...?
>
> Lawrence D'Oliveiro fone: +64-7-856-2889
Isn't that the idea? If you are going to have a copy protection scheme,
I'd think that would be the best type. Least amount of hassle for the
user, yet still protects the software industry's interests. Of course,
if you're in the habit of pirating software maybe it's not in your
interests...
I'm a little surprised that the software industry hasn't latched onto
this idea and lobbied hard for it. It seems like the ideal solution
to software piracy. Of course, it wouldn't stop piracy entirely but
it would certainly put a serious dent in it.
Edgar
- --
Edgar Matias
Input Research Group
University of Toronto
- --
I speak for no one...
+++++++++++++++++++++++++++
From: de19@umail.umd.edu (Dana S Emery)
Date: 17 Dec 92 22:42:58 GMT
Organization: personal
In article <1992Dec17.105813.18407@jarvis.csri.toronto.edu>,
ematias@dgp.toronto.edu (Edgar Matias) wrote:
>
>
> > In article <1gm3ioINN9uh@calvin.NYU.EDU>, roy@mchip00.med.nyu.edu (Roy Smith) writes:
> > >
> > > I personally think it was a major mistake for Apple
> > > to not have put some sort of machine-readable serial number in each machine.
> >
> > The trouble with providing a feature like that is that people will start to
> > use it.
> >
> > Can you say "copy protection"...?
> >
> > Lawrence D'Oliveiro fone: +64-7-856-2889
>
>
> Isn't that the idea? If you are going to have a copy protection scheme,
> I'd think that would be the best type. Least amount of hassle for the
> user, yet still protects the software industry's interests. Of course,
> if you're in the habit of pirating software maybe it's not in your
> interests...
>
> I'm a little surprised that the software industry hasn't latched onto
> this idea and lobbied hard for it. It seems like the ideal solution
> to software piracy. Of course, it wouldn't stop piracy entirely but
> it would certainly put a serious dent in it.
OK, now that would either be in a custom chip or in the Roms, but in either
case it would be WELDED on to the logic board, right?
Now what happens when a logic board needs service? Since the board now
must stay with the machine, you have just forced all apple dealers to
perform componant level diagnosis and repair, this is a dramatic change
from present policy, and on which APple is likely to regard as a giant step
backward.
Oh, and just how would one deal with a faulty Rom chip, or a ROM upgrade
(remember the SCSI problems in the first and second versions of the 128k
roms?).
- --
Dana S Emery <de19@umail.umd.edu>
+++++++++++++++++++++++++++
From: ematias@dgp.toronto.edu (Edgar Matias)
Date: 18 Dec 92 03:32:00 GMT
Organization: CSRI, University of Toronto
> OK, now that would either be in a custom chip or in the Roms, but in
> either case it would be WELDED on to the logic board, right?
>
No, it would be in a socket. That way, if you had to swap for a new
board you could simply pull it out of the old board and stick it in
the new one. No wielding required.
Edgar
- --
Edgar Matias
Input Research Group
University of Toronto
- --
I speak for no one...
+++++++++++++++++++++++++++
From: griswoldj@bntley.bntley.ingr.com (John Griswold)
Organization: Bentley Systems (Development)
Date: Fri, 18 Dec 1992 14:51:09 GMT
In article <1992Dec17.223200.15385@jarvis.csri.toronto.edu>,
ematias@dgp.toronto.edu (Edgar Matias) wrote:
>
>
> > OK, now that would either be in a custom chip or in the Roms, but in
> > either case it would be WELDED on to the logic board, right?
> >
>
> No, it would be in a socket. That way, if you had to swap for a new
> board you could simply pull it out of the old board and stick it in
> the new one. No wielding required.
>
And what happens when I upgrade my machine (like I just recently did). Do
I have to go and buy all new software. Forget that, I will deal with
software companies that can deal with *real* users. If you have to deal
with some form of hardware lock I would prefer the dongle approach. You
know those little inline boxes that can hang off of the ADB. But I prefer
to not even deal with that.
- --------------------------------------------+---------------------------
John Griswold | Bentley Systems Inc.
UUCP: ...uunet!ingr!bntley!griswoldj | 690 Pennsylvania Drive
INTERNET: griswoldj@bntley.bntley.ingr.com | Eagleview Corporate Center
AT&T: (215) 458-5000 | Exton, PA 19341
- --------------------------------------------+---------------------------
+++++++++++++++++++++++++++
Organization: Royal Institute of Technology, Stockholm, Sweden
Date: Fri, 18 Dec 1992 14:52:47 GMT
In <1992Dec17.105813.18407@jarvis.csri.toronto.edu> ematias@dgp.toronto.edu (Edgar Matias) writes:
>> > I personally think it was a major mistake for Apple
>> > to not have put some sort of machine-readable serial number in each machine.
>> The trouble with providing a feature like that is that people will start to
>> use it.
>I'd think that would be the best type. Least amount of hassle for the
>user, yet still protects the software industry's interests. Of course,
Copy protection sucks. ALWAYS.
What if you have to have a logic board replacement? Or a copy
T use at the same time as
the Quadra)? Or just plain upgraded your machine?
t be circumvented, and
s hassle-free,
Cheers,
/ h+
- --
-- Jon W{tte, h+@nada.kth.se, Mac Hacker Deluxe --
NetHack 3.1: Any Year Now.
+++++++++++++++++++++++++++
From: anadig@otago.ac.nz
Date: 18 Dec 92 19:04:18 +1300
Organization: University of Otago, Dunedin, New Zealand
In article <absurd-161292095851@seuss.apple.com>, absurd@apple.apple.com (Tim Dierks, software saboteur) writes:
> continued in the Mac. The biggest single problem was serviceing
> these machines; if the PROM blew, you had to special-order a
^^^^^^^^^^^^^
The PROM blew? Just blew? Did this actually happen? I'm amazed: I though PROMs
(not EPROMs, mind you) were extremely reliable, more so than most components on
a typical motherboard. Did Apple have some special problems with them?
I would have thought the Lisa problem would happen when for whatever reason it
was necessary to swap the motherboard, at which point the soldered-in PROM
would be impracticable to remove...
Michael(tm) Hamel
Analog Digital Instruments, Dunedin, New Zealand.
+++++++++++++++++++++++++++
From: k044477@hobbes.kzoo.edu (Jamie R. McCarthy)
Organization: Kalamazoo College
Date: Fri, 18 Dec 1992 21:33:02 GMT
anadig@otago.ac.nz writes:
>absurd@apple.apple.com (Tim Dierks, software saboteur) writes:
>
>> continued in the Mac. The biggest single problem was serviceing
>> these machines; if the PROM blew, you had to special-order a
>
>I would have thought the Lisa problem would happen when for whatever reason it
>was necessary to swap the motherboard, at which point the soldered-in PROM
>would be impracticable to remove...
My two bits on copy protection: I have a Lisa sitting in my closet,
complete with the manuals and original disks for LisaWrite, LisaDraw,
LisaPaint, LisaDoodle, and LisaYodel. I also have a defunct 4.8-meg
ProFile hard drive, which presumably has all that software on it, but
which stubbornly refuses to work.
The disks won't reinstall; I think the installation process marked the
disks as "already installed," and it refuses to do it again. At least,
that's what a Lisa reference book says (yes, I actually found one at a
bookstore!).
So, I bought $10,000 (1983 dollars) worth of hardware, probably several
thousand in software, and a cool hard drive for under $15, and I got
rooked. It's worth whatever a scrap metal dealer will pay for it (and,
despite that solid lead case, I don't think I'll get $15).
Even if I got the hard drive working, I'd have to call up the software
company and ask them to send me replacement disks in exchange for the
ones I have...anyone think I'll get them?
- --
Jamie McCarthy Internet: k044477@kzoo.edu AppleLink: j.mccarthy
"As you should know by now, we're strong believers in the Apple II
and always will be. But we can't ignore reality forever."
- Tom Weishaar
+++++++++++++++++++++++++++
From: lsr@taligent.com (Larry Rosenstein)
Date: 19 Dec 92 03:01:59 GMT
Organization: Taligent, Inc.
In article <1992Dec17.105813.18407@jarvis.csri.toronto.edu>,
ematias@dgp.toronto.edu (Edgar Matias) wrote:
>
> Isn't that the idea? If you are going to have a copy protection scheme,
> I'd think that would be the best type. Least amount of hassle for the
> user, yet still protects the software industry's interests. Of course,
You'd think so, but I remember visiting a Lisa customer who had problems
because he had to keep track of which set of diskettes went with which
machine.
Larry Rosenstein
Taligent, Inc.
lsr@taligent.com
+++++++++++++++++++++++++++
From: russotto@eng.umd.edu (Matthew T. Russotto)
Date: 19 Dec 92 03:04:55 GMT
Organization: Project GLUE, University of Maryland, College Park
In article <1992Dec18.190418.437@otago.ac.nz> anadig@otago.ac.nz writes:
>In article <absurd-161292095851@seuss.apple.com>, absurd@apple.apple.com (Tim Dierks, software saboteur) writes:
>
>> continued in the Mac. The biggest single problem was serviceing
>> these machines; if the PROM blew, you had to special-order a
> ^^^^^^^^^^^^^
>The PROM blew? Just blew? Did this actually happen? I'm amazed: I though PROMs
>(not EPROMs, mind you) were extremely reliable, more so than most components on
>a typical motherboard. Did Apple have some special problems with
them?
I don't know about in the Mac, but blasting the P5/P5A PROM on the old
Apple II disk controller card was a fairly common occurrence.
- --
Matthew T. Russotto russotto@eng.umd.edu russotto@wam.umd.edu
Some news readers expect "Disclaimer:" here.
Just say NO to police searches and seizures. Make them use force.
(not responsible for bodily harm resulting from following above advice)
+++++++++++++++++++++++++++
From: niel@cars.com (Niel Bornstein)
Date: Thu, 17 Dec 92 09:29:55 EDT
Organization: Heavy Objects R Us
In article <9235010.4295@mulga.cs.mu.OZ.AU> (comp.sys.mac.programmer), mtc@mundil.cs.mu.OZ.AU (Michael Trevor CUTTER) writes:
>We are looking for a way to uniquely identify a Mac, probably one on a network,
>but not necessarily. Is the serial number or similar available somewhere in the
>ROMs or parameter RAM? (Highly unlikely, I know - specially since PRAM can be
>reset)
How about the AppleTalk address? I know, they are assigned dynamically,
but if the network is mature it will stabilize. Are machines being
added to or taken off the network a lot?
Or if it's a TCP/IP network, there's the IP address.
If they're not networked, I don't know.
Niel
|--------------------------------------------------------------------------
| Niel M. Bornstein chinchilla!niel@cars.com |
| 1352 North Morningside Drive ...csn!sable!chinchilla!niel |
| Atlanta, Georgia 30306 (404) 872-6883 (404) 551-8075 |
- --------------------------------------------------------------------------|
| Opinions? I don't need no stinkin' opinions! |
|--------------------------------------------------------------------------
+++++++++++++++++++++++++++
From: peter@cujo.curtin.edu.au (Peter N Lewis)
Date: 21 Dec 92 05:39:52 GMT
Organization: NCRPDA, Curtin University
In article <1992Dec17.105813.18407@jarvis.csri.toronto.edu>,
ematias@dgp.toronto.edu (Edgar Matias) wrote:
>
>
> > In article <1gm3ioINN9uh@calvin.NYU.EDU>, roy@mchip00.med.nyu.edu (Roy Smith) writes:
> > >
> > > I personally think it was a major mistake for Apple
> > > to not have put some sort of machine-readable serial number in each machine.
> > Can you say "copy protection"...?
> Isn't that the idea? If you are going to have a copy protection scheme,
> I'd think that would be the best type. Least amount of hassle for the
> user, yet still protects the software industry's interests. Of course,
> if you're in the habit of pirating software maybe it's not in your
> interests...
>
> I'm a little surprised that the software industry hasn't latched onto
> this idea and lobbied hard for it. It seems like the ideal solution
> to software piracy. Of course, it wouldn't stop piracy entirely but
> it would certainly put a serious dent in it.
Isn't it clear why its not done? If Apple put a serial number on the
machine, and people successfully copy protect their programs, the immediate
consequence of this is that the value of the machine drops a great deal.
All those users can't pirate the programs they want, so they stop buying
the machines, and buy other machines where they can get the programs
they want for free. This may not be moral, but I haven't found much
connection between morality and reality. Besides, its not Apple's
problem if people pirate (non-apple) software, quite the opposite,
Apple benifits by this.
I'm not condoning piracy - the world would probably be a better place
if their was no piracy, but the world would be better off if no one
went hungry as well, and neither of these outcomes are going to happen
any time soon, and the latter is far more important than the former anyway.
There have actually been a few examples of hardware with serial numbers
on them, but they've mostly gone out of business now...
Have fun all,
Peter.
_______________________________________________________________________
Peter N Lewis <peter@cujo.curtin.edu.au> Ph: +61 9 368 2055
+++++++++++++++++++++++++++
From: jpugh@apple.com (Jon Pugh)
Date: 22 Dec 92 06:36:00 GMT
Organization: Apple Computer, Inc.
In article <peter-211292133304@rocky.curtin.edu.au>,
peter@cujo.curtin.edu.au (Peter N Lewis) wrote:
>
> Isn't it clear why its not done? If Apple put a serial number on the
> machine, and people successfully copy protect their programs, the immediate
> consequence of this is that the value of the machine drops a great deal.
> All those users can't pirate the programs they want, so they stop buying
> the machines, and buy other machines where they can get the programs
> they want for free. This may not be moral, but I haven't found much
> connection between morality and reality. Besides, its not Apple's
> problem if people pirate (non-apple) software, quite the opposite,
> Apple benifits by this.
I agree that piracy is one of the things that made personal computers as
popular as they are. Almost every _person_ I know who bought a machine for
themselves busted their bank on the machine and ran on pirated software
until they could afford to buy their software. I personally have used many
pirated programs in order to evaluate them before buying. It's how I got
to know so much about the machine and the software.
PCs sell because you can pirate when you need to. Getting the work done is
the number one priority, isn't it? ;)
Of course, I must point out that piracy is not a valid long term solution,
for all the obvious reasons. You don't buy, we don't write. Piracy as a
full-time policy is a self defeating proposition. You've got to buy so
that the market works.
Jon
Squeeking for myself again and trying damn hard to fill my mouth with feet.
+++++++++++++++++++++++++++
From: noah@apple.com (Noah Price)
Date: 23 Dec 92 19:33:56 GMT
Organization: (not the opinions of) Apple Computer, Inc.
In article <peter-211292133304@rocky.curtin.edu.au>,
peter@cujo.curtin.edu.au (Peter N Lewis) wrote:
> Isn't it clear why its not done? If Apple put a serial number on the
> machine, and people successfully copy protect their programs, the immediate
> consequence of this is that the value of the machine drops a great deal.
> All those users can't pirate the programs they want, so they stop buying
> the machines, and buy other machines where they can get the programs
> they want for free. This may not be moral, but I haven't found much
> connection between morality and reality. Besides, its not Apple's
> problem if people pirate (non-apple) software, quite the opposite,
> Apple benifits by this.
Sorry to burst your bubble. As developers who watch the newsletters know,
Apple is quite active in anti-piracy education efforts.
People have already talked about why the simple serial number is more
trouble than it's worth for copy-protection (or more accurately, for
execution control). More advanced devices, yes those ugly dongles, solve
some of these problems by adding some intelligence. More important, they
can move from machine to machine so you don't have to go through
administrative back-flips when you service, upgrade, or replace a machine.
Newer ones can even key multiple application, so you don't get a
dongle-tree growing off your keyboard.
I personally don't think these should be used at all though, except for
mega-buck vertical market applications, or software sold in countries with
little or no respect (or legal clout) for copyright and piracy protection.
noah
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
noah@apple.com Macintosh Hardware Design
...!{sun,decwrl}!apple!noah (not the opinions of) Apple Computer, Inc.
+++++++++++++++++++++++++++
From: bobert@informix.com (Robert Murphy)
Date: 22 Dec 92 20:33:03 GMT
Organization: Informix Software, Inc.
peter@cujo.curtin.edu.au (Peter N Lewis) writes:
>There have actually been a few examples of hardware with serial numbers
>on them, but they've mostly gone out of business now...
Actually, most of the dedicated Unix workstations out there - including
Suns, NeXTs, and IBM RS/6000's - have serial numbers in a PROM on the
motherboard. (We're not talking Macs running A/UX or PClones running
SCO Unix here.) For more information, log into your nearest such
workstation and type "man hostid" at the shell command prompt.
Regards,
Bob Murphy
+++++++++++++++++++++++++++
From: roy@mchip00.med.nyu.edu (Roy Smith)
Date: 24 Dec 92 01:28:40 GMT
Organization: New York University, School of Medicine
bobert@informix.com (Robert Murphy) writes:
> Actually, most of the dedicated Unix workstations out there - including
> Suns, NeXTs, and IBM RS/6000's - have serial numbers in a PROM on the
> motherboard.
Any box that comes with a built-in ethernet port has the moral
equivalent of a machine-readable serial number -- the ethernet 6-byte
hardware address.
- --
Roy Smith <roy@nyu.edu>
Hippocrates Project, Department of Microbiology, Coles 202
NYU School of Medicine, 550 First Avenue, New York, NY 10016
"This never happened to Bart Simpson."
+++++++++++++++++++++++++++
From: freek@phil.ruu.nl (Freek Wiedijk)
Date: 25 Dec 92 17:04:41 GMT
Organization: Department of Philosophy, University of Utrecht, The Netherlands
peter@cujo.curtin.edu.au (Peter N Lewis) writes:
>If Apple put a serial number on the
>machine, and people successfully copy protect their programs, the immediate
>consequence of this is that the value of the machine drops a great deal.
>All those users can't pirate the programs they want, so they stop buying
>the machines, and buy other machines where they can get the programs
>they want for free.
Yes!
That's why one of my friends (hi Jos!) bought a 486 machine and
advocated me to do the same (never!). "Pirating software for it is
much easier because there are far more people to copy software from."
Yet another reason why Intel machines are more popular that Macs.
Not only is the hardware cheaper, the software is also cheaper...
Freek
- --
Third theory of Phenomenal Dynamics: The difference between
a symbol and an object is quantitative, not qualitative.
+++++++++++++++++++++++++++
From: freek@phil.ruu.nl (Freek Wiedijk)
Date: 25 Dec 92 17:11:09 GMT
Organization: Department of Philosophy, University of Utrecht, The Netherlands
jpugh@apple.com (Jon Pugh) writes:
>Of course, I must point out that piracy is not a valid long term solution,
>for all the obvious reasons. You don't buy, we don't write. Piracy as a
>full-time policy is a self defeating proposition. You've got to buy so
>that the market works.
Pirating business software for home use will obviously not suffer from
this problem. Anyone want to run Excel on their home machine?
Freek
- --
Third theory of Phenomenal Dynamics: The difference between
a symbol and an object is quantitative, not qualitative.
+++++++++++++++++++++++++++
From: bobert@informix.com (Robert Murphy)
Date: 23 Dec 92 21:15:03 GMT
Organization: Informix Software, Inc.
de19@umail.umd.edu (Dana S Emery) writes:
>In article <1992Dec17.105813.18407@jarvis.csri.toronto.edu>,
>ematias@dgp.toronto.edu (Edgar Matias) wrote:
[discussion of serial numbers and copy/execution protection deleted]
>OK, now that would either be in a custom chip or in the Roms, but in either
>case it would be WELDED on to the logic board, right?
Nope. It would be in some sort of PROM ("Programmable ROM") chip which
is plugged into a socket, not welded. The only information recorded in
this PROM chip would be the serial number, which would be recorded into
the chip at the factory. Presumably Apple would use a type of ROM that's
not erasable or reprogrammable.
>Now what happens when a logic board needs service? Since the board now
>must stay with the machine, you have just forced all apple dealers to
>perform componant level diagnosis and repair, this is a dramatic change
>from present policy, and on which APple is likely to regard as a giant step
>backward.
The person servicing the computer pulls the PROM chip out of the socket on
the old motherboard, and puts it in the socket on the new motherboard.
>Oh, and just how would one deal with a faulty Rom chip, or a ROM upgrade
>(remember the SCSI problems in the first and second versions of the 128k
>roms?).
Since this is on a separate chip from the ROMs you're talking about, it's
not a problem. I suppose you could get a faulty PROM, but that would be
easily replaceable.
There are, by the way, a couple of flaws with this system. First, if you
wanted to make machine A look like it's machine B, you could crack the
case and swap the serial number PROMs. This is not really a problem as
far as software publishers are concerned, though, because they mostly are
concerned about people running multiple copies of their program simultan-
eously on different machines, and PROM swapping still only lets you run
the program on one machine at a time. Second, and more of interest to
pirates, is the possibility of duplicating the PROM chips. I'm sure there
would be ways to prevent this, though, such as adding some extra functionality
to the PROM chips so that they do more than act as PROMs, and so you
couldn't just go out and buy blank PROMs and put a serial number in them
and expect them to work.
>Dana S Emery <de19@umail.umd.edu>
Bob Murphy
bobert@informix.com
P.S. I've had to think about this stuff a lot because in the last four
years, I've written execution control code for several programs on Macs and
DOS machines using three different kinds of dongles from two different
manufacturers, and I am talking to two potential clients about doing the
same thing for them. (For those unfamiliar, a "dongle", or "hardware lock",
is a device that you attach to some port on a computer, typically ADB on
the Mac or a parallel port on DOS. When a protected program is running,
it can find out if the dongle is attached to the computer it's running on,
and refuse to execute if the dongle is missing. You can copy such programs
onto 4,000,000 floppies if you want, but they'll only RUN on a computer with
the correct dongle attached. That's why it's called "execution control",
not "copy protection".) By the way, none of these programs have been the
sort of thing college students would likely want to pirate; rather, they've
been vertical market applications in the $3,000-$15,000 price range that
are aimed at corporations with enough money that they shouldn't need to
pirate software - but nonetheless, some of them have tried...
+++++++++++++++++++++++++++
From: peirce@outpost.SF-Bay.org (Michael Peirce)
Date: 25 Dec 92 00:00:36 GMT
Organization: Peirce Software
In article <01050023.lbu8j5@chinchilla.cars.com> (comp.sys.mac.programmer), niel@cars.com (Niel Bornstein) writes:
>
> In article <9235010.4295@mulga.cs.mu.OZ.AU> (comp.sys.mac.programmer), mtc@mundil.cs.mu.OZ.AU (Michael Trevor CUTTER) writes:
> >We are looking for a way to uniquely identify a Mac, probably one on a network,
> >but not necessarily. Is the serial number or similar available somewhere in the
> >ROMs or parameter RAM? (Highly unlikely, I know - specially since PRAM can be
> >reset)
>
>
> How about the AppleTalk address? I know, they are assigned dynamically,
> but if the network is mature it will stabilize. Are machines being
> added to or taken off the network a lot?
If you have PowerBook users, there very well may be many machines
coming and going from your network on a regular basis.
You might take the approach that Apple used with Aliases. They store
a number of tidbits of information when trying to track a file (things
like name, location on a volume, create date, etc) and use a number
of rules to figure out if that file out there that looks like the
one we want is *really* it.
You might use something like a combination of AppleTalk address, user
name, machine name, machine type, boot volume create date, etc.
Then you use some rules like:
(1) if only AT address changed, figure it's the same machine as yesterday.
(2) if only user name changed, figure it's the same machine asas yesterday.
(3) if only the boot volume create date changed, figure it's the same machine as yesterday.
(4) etc.
If you are careful in how you choose these variables and rules you
will probably do OK. You still may want to through up your hands
every now and ask the user (as they do with Aliases).
Good luck...
- -- Michael Peirce -- peirce@outpost.SF-Bay.org
- -- Peirce Software -- Suite 301, 719 Hibiscus Place
- -- -- San Jose, California USA 95117
- -- Drop by booth #4463 -- voice: (408) 244-6554 fax: (408) 244-6882
- -- at MacWorld Expo/SF -- AppleLink: peirce & America Online: AFC Peirce
+++++++++++++++++++++++++++
From: flash@austin.lockheed.com (James W. Melton)
Date: 29 Dec 92 07:06:30 GMT
Organization: "Lockheed Austin Division, 6800 Burleson Rd, Austin, TX 78744
In article <1hb3o8INNt5h@calvin.NYU.EDU> roy@mchip00.med.nyu.edu (Roy Smith) writes:
>
> Any box that comes with a built-in ethernet port has the moral
>equivalent of a machine-readable serial number -- the ethernet 6-byte
>hardware address.
I have bad news for you: The ethernet address is set in software.
The high-order portion of the address is supposed to reflect the
manufacturer, and the low-order portion is supposed to be machine
unique (a serial number), but this is not accomplished in hardware
NECESSARILY.
There is NO fool-proof method of machine identification short of
the ubiquitous "dongle" method.
"Build a system even a fool can use, and only a fool will use it."
+++++++++++++++++++++++++++
From: bobert@informix.com (Robert Murphy)
Date: 29 Dec 92 22:23:02 GMT
Organization: Informix Software, Inc.
niel@cars.com (Niel Bornstein) writes:
>In article <9235010.4295@mulga.cs.mu.OZ.AU> (comp.sys.mac.programmer), mtc@mundil.cs.mu.OZ.AU (Michael Trevor CUTTER) writes:
>>We are looking for a way to uniquely identify a Mac, probably one on a network,
>>but not necessarily. Is the serial number or similar available somewhere in the
>>ROMs or parameter RAM? (Highly unlikely, I know - specially since PRAM can be
>>reset)
>How about the AppleTalk address? I know, they are assigned dynamically,
>but if the network is mature it will stabilize. Are machines being
>added to or taken off the network a lot?
A Mac's AppleTalk address can potentially change every time the machine is
booted.
>Or if it's a TCP/IP network, there's the IP address.
If you're serious about uniquely identifying the Mac (e.g. tying program
execution to a particular Mac), this is a very ineffective way of doing
it. All you have to do is change the IP address of the Mac. If it would
conflict with another Mac on the network, pull your Mac off the network.
A client of mine has a product with execution control tied to an IP
address. (This is on a Sun, by the way.) You get the program, call in
with the invoice number and IP number, and get an authorization code.
At one of their customers, somebody called in with IP number
129.blah.blah.blah and got an auth code. Then somebody else called in
with the same invoice number and a different IP number. Big fireworks!
"Why, 129.blah.blah.blah isn't even on our network!" Turned out it was
one of IP numbers you get on out-of-the-box Suns. As best as they can
tell, somebody intercepted the software in the customer's mailroom, called
and got the auth code, and then put the software back in the mailroom.
The pirate can run their Sun normally on the company's network, and when
they want to run this software, they unhook the ethernet connector,
change the IP number, and reboot the Sun. My client got ripped off for
a $10,000 software package.
Needless to say, this client has changed his procedure for issuing auth
codes.
Regards,
Bob Murphy
+++++++++++++++++++++++++++
From: noah@apple.com (Noah Price)
Date: 4 Jan 93 18:23:50 GMT
Organization: (not the opinions of) Apple Computer, Inc.
In article <1458@shrike.com>, flash@austin.lockheed.com (James W. Melton)
wrote:
> In article <1hb3o8INNt5h@calvin.NYU.EDU> roy@mchip00.med.nyu.edu (Roy Smith) writes:
> > Any box that comes with a built-in ethernet port has the moral
> >equivalent of a machine-readable serial number -- the ethernet 6-byte
> >hardware address.
>
> I have bad news for you: The ethernet address is set in software.
> The high-order portion of the address is supposed to reflect the
> manufacturer, and the low-order portion is supposed to be machine
> unique (a serial number), but this is not accomplished in hardware
> NECESSARILY.
I know "any box" wasn't limited to a Macintosh, but all the Macs with
on-board ethernet have a unique address in a PROM.
noah
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
noah@apple.com Macintosh Hardware Design
...!{sun,decwrl}!apple!noah (not the opinions of) Apple Computer, Inc.
+++++++++++++++++++++++++++
From: fprefect@engin.umich.edu (Matt Slot)
Date: 6 Jan 93 00:50:12 GMT
Organization: University of Michigan, CAEN
If you need to do this from an application, there are several tricks you
can try. Use TickCount() to get a long, try Random() (one in 4 billion
chance of duplication), or the
initialization time of the Boot volume.
Not foolproof, but pretty good.
Matt
---------------------------
End of C.S.M.P. Digest
**********************