home *** CD-ROM | disk | FTP | other *** search
- .pl45
- .op
- `@k``&30``^2``[1`
- LOCK89 SOFTWARE PROTECTION SYSTEM`@I`
- I.Introduction
- The LOCK89 protection system has been created for software developers
- and distributor to provide effective protection against the unauthorized
- duplication of computer applications program residing on floppy diskettes.
- Each LOCK89 contains a unique fingerprint just like eneryone does to
- which the protected file is keyed. And this fingerprint can never be
- duplicated by any software or copy machine (or copy card). Every time the
- protected program is executed, the LOCk89 process will cause the
- fingerprint on the diskette to be compared to the original fingerprint
- characteristics embeded within encrypted file.
- If a match is found, the program will be allowed to run, In the case of
- a mismatch or no fingerprint at all, an error will occur causing control
- to be passed back to DOS.
- With the excellent program shell, protected program has the powerful
- mechanism of anti-trace which prevent protected program from being traced
- by any debug system.LOCK89 may be write-protected.
- LDGS works on almost any PC/MS-DOS computer including the IBM PC/XT/AT,
- IBM PS/2, 80286, 80386 or its compatible machines.
- Only programs that are .COM or .EXE executable binary files can be
- protected. This includes Assembly Lanuage Programs, Compiled Basic,
- Compiled 'C', Compiled Fortran, and Compiled Pascal etc.
-
- II.USING LOCK89 DISKETTE
- In DOS environment, type in:
- [d:][path]LOCK89 [d:][path]sourcefile.EXT [d:][path]destfile<ENTER>
- d: designates drive, default is current drive.
- path designates derectory path.
- sourcefile designates the name of the file to be protected.
- .EXT designates extention of file. .EXE or .COM.
- destfile designates the name of the protected destention file.
- Note that extention of all protected files is .EXE.
- EXAMPFLE:èCurrent drive is C:, type in:
- C>A:LOCK89 B:\UNLOCK\INFILE.EXE D:\LOCK\OUTFILE<ENTER>
- After press ENTER key, the following information will be displayed on the
- screen:
- LOCK89 Protection Floppy Disk Version 1.0
- (C) Copyright SYNTONE Corporation 1989
- Please waiting......
- Now LOCK89 is working. When it is finished, "Good bye!" will be displayed
- on the screen.
- The LOCK89 diskette can be filled with as many protected or unprotected
- programs as desired.
- LOCk89 diskette is limited only by the capacity of the diskette. Note that
- each protected file is approximately 6KB larger than the original file.
- Protected file may be backed-up with normal system utilities. But when it is
- executed, LOCK89 diskette must be inserted into drive A: or drive B:.
-
- III.TRANSFERING THE PC/MS-DOS OPERATING SYSTEM ON A LOCK89 DISKETTE
-
- 1.Place the DOS System Master into drive A:.
- 2.Place the LOCK89 diskette into drive B:.
- 3.Copy all the files in drive B: to a sub-directory of drive C:.
- 4.Enter A>DEL B:*.*
- 5.Enter A>SYS B: to write the Operating System onto the LOCK89 diskette.
- 6.Once the "System Transferred" message is displayed, copy the file COMMAND.COM
- onto the LOCK89 diskette by entering the following command:
- A>COPY COMMAND.COM B:
- 7.Restore the original files on the LOCK89 diskette from the sub-directory of
- drive C:.
- 8.Remove both diskettes, and place the LOCK89 diskette into drive A:. Press
- CTRL/ALT/DEL key to verify the system loads (boot).
-
-
- LOCK89------╕▀╝╢╝╙├▄│╠╨≥┼╠
- ╩╣╙├╦╡├≈╩Θè ▒▒╛⌐╨┼═¿╝»═┼╣½╦╛╚φ╝■╣ñ│╠╣½╦╛
- Software Engineering Company, SYNTONE Group.
- ╝≥ ╜Θ
- ╧╓╘┌╣·─┌╡─╕≈╓╓╝╙├▄│╠╨≥┼╠,┐╔╥╘╖└╖╢╥╗╨⌐┐╜▒┤╚φ╝■,╡½╓┴╜±╔╨╬▐┐╔╥╘╖└╓╣ì
- ┐╜▒┤╗·(┐¿)╡─╝╙├▄│╠╨≥┼╠,LOCK89╕▀╝╢╝╙├▄│╠╨≥┼╠╡─│÷╧╓┤≥╞╞┴╦┐╜▒┤╗·(┐¿)╬▐╦∙ì
- ▓╗─▄╡─╔±╗░.
- ╨┼═¿╝»═┼╚φ╝■╣ñ│╠╣½╦╛╫ε╨┬═╞│÷LOCK89╕▀╝╢╝╙├▄│╠╨≥┼╠, LOCK89╕▀╝╢╝╙├▄ì
- │╠╨≥┼╠╙├└┤╝╙├▄PC DOS╗╖╛│╧┬╡─╕≈╓╓┐╔╓┤╨╨╬─╝■(.COM╨═║═.EXE╨═).╡▒LOCK89ì
- ╕▀╝╢╝╙├▄│╠╨≥┼╠▓σ╘┌A╗≥B╟²╢»╞≈╩▒,▒╗╝╙├▄╡─╬─╝■┐╔╥╘╘┌IBM PC/XT/ATíóIBM PS/2ì
- íó80286íó80386╝░╞Σ╝µ╚▌╗·╔╧╘╦╨╨.
- ╛°╢╘╡─╖└┐╜▒┤─▄┴ª
- LOCK89╕▀╝╢╝╙├▄│╠╨≥┼╠═¼├┐╕÷╚╦╡─╓╕╬╞╕≈▓╗╧α═¼╥╗╤∙,├┐╒┼LOCK89╕▀╝╢╝╙├▄ì
- │╠╨≥┼╠╥▓╙╨╞Σ"╓╕╬╞",└√╙├╠╪╩Γ╡─▒α│╠╖╜╖¿,┐╔╩╣├┐╒┼┤┼┼╠╡─├┐╕÷┤┼╡└╘▓╗╖╣╣│╔ì
- ▓╗┐╔╓╪╕┤╡─"╓╕╬╞",╒Γ╓╓"╓╕╬╞"╩╟╚╬║╬┐╜▒┤╗·(┐¿)║═┐╜▒┤╚φ╝■╦∙╬▐╖¿╕┤╓╞╡─, LOCK89ì
- ╕▀╝╢╝╙├▄│╠╨≥┼╠╡─├▄╘┐╒²╩╟╒Γ╨⌐"╓╕╬╞",╥≥┤╦╝╙├▄║≤╡─│╠╨≥╛▀╙╨╛°╢╘╡─╖└┐╜▒┤─▄ì
- ┴ª.
- ╝½╟┐╡─╢»╠¼╖┤╕·╫┘╗·╓╞
- └√╙├╙┼╨π╡─╝╙├▄│╠╨≥═Γ┐╟, ╝╙├▄║≤╡─│╠╨≥╛▀╙╨╝½╟┐╡─╢»╠¼╖┤╕·╫┘╗·╓╞,┐╔╥╘ì
- ╖└╖╢╕≈╓╓╚φ╙▓╝■┐¬╖ó╡≈╩╘╧╡═│╢╘╞Σ╞╞╥δ.
- │ñ╩┘├ⁿ
- LOCK89┐╔╝╙├▄╢α╕÷│╠╨≥, ┐╔╜½▒╗╝╙├▄║≤╡─│╠╨≥╖┼╘┌╚╬║╬┼╠╓╨╓┤╨╨.╘┌╓┤╨╨▒╗ì
- ╝╙├▄│╠╨≥╩▒╓╗╨Φ╜½LOCK89╕▀╝╢╝╙├▄│╠╨≥┼╠▓σ╚δA┼╠╗≥B┼╠╓╨╝┤┐╔.LOCK89│╠╨≥┼╠┐╔ì
- ╠∙╨┤▒ú╗ñ┐┌,╘┌╓┤╨╨│╠╨≥╩▒╓╗╢╘LOCK89╕▀╝╢╝╙├▄│╠╨≥┼╠╜°╨╨╢┴├▄╘┐▓┘╫≈,╬▐╨┤▓┘ì
- ╫≈╣²│╠,╩╣╞Σ╛▀╙╨│ñ╛├╡─╩╣╙├╩┘├ⁿ.
- │╠╨≥╜⌠┤╒íó╜ß╣╣╤╧╜≈
- ╛¡LOCK89╝╙├▄║≤╡─│╠╨≥╓╗▒╚╘¡│╠╨≥╘÷╝╙┴╦6KB,╙δLOCKER(╘÷╝╙╩«╝╕KB)íóPROLOK(ì
- ╘÷╝╙╩«╝╕KB)╧α▒╚╒╝╙├┤┼┼╠┐╒╝Σ╔┘┴╦╨φ╢α, ╠╪▒≡╩╟╢╘╙┌╨Φ╝╙├▄╡─╧╡═││╠╨≥╚φ╝■╝░ì
- ┴⌠╫ñ─┌┤µ╡─│╠╨≥╚φ╝■,╝⌡╔┘┴╦─┌┤µ╡─╒╝╙├┴┐.
- ╜ß┬█
- LOCK89╕▀╝╢╝╙├▄│╠╨≥┼╠╩╟╚φ╝■╣ñ╫≈╒▀╚¿╥µ╡─╓╥╩╡║┤╬└╒▀.
- ╙├ ╖¿
- ╘┌DOS╗╖╛│╧┬ú¼╝ⁿ╚δú║
- [d:][path]LOCK89_[d:][path]SOURCEFILE.EXT_[d:][path]DESTFILE<Enter>
- ╞Σ╓╨ú║d:▒φ╩╛┼╠║┼ú¼╚▒╩í╓╡╬¬╡▒╟░┼╠ú«èpath╬¬┬╖╛╢ú¼╚▒╩í╓╡╬¬╡▒╟░─┐┬╝ú«
- SOURCEFILE╬¬╨Φ╥¬▒╗╝╙├▄╡─╬─╝■├√ú
- EXT╬¬╨Φ╥¬▒╗╝╙├▄╬─╝■╡─└⌐╒╣├√.EXE╗≥.COMú«
- DESTFILE╬¬╝╙├▄║≤╡─╬─╝■├√ú«
- ╫óú║╝╙├▄║≤╡─╬─╝■╛∙╬¬EXE╨═╬─╝■
- └²╚τú║╘┌╡▒╟░┼╠╬¬C┼╠╩▒ú¼╝ⁿ╚δú║
- C>A:LOCK89_B:\UNLOCK\INFILE.EXE_D:\LOCK\OUTFILE<Enter>
- ╘≥╘┌╞┴─╗╔╧╧╘╩╛│÷ú║
- LOCK89 Protected Floppy Disk Version 1.0
- (C)_Copyright SYNTONE Corporation 1989
- Please Waiting...
- ┤╦╩▒LOCK89┐¬╩╝╝╙├▄▓┘╫≈ú¼═Ω│╔╓«║≤╞┴─╗╧╘╩╛ú║
- Good bye!
- ╚τ╣√╘┌B┼╠UNLOCK─┐┬╝╧┬├╗╙╨INFILE.EXE╬─╝■ú¼╘≥╧╘╩╛ú║
- File:B:\UNLOCK\INFILE.EXE not found
- ╫╨╧╕╝∞▓Θ╬─╝■┬╖╛╢ú«
- ╚τ╣√D┼╠├╗╙╨╫π╣╗╡─┐╒╝Σú¼╘≥╧╘╩╛ú║
- Insufficient disk space!
- ╟σ└φD┼╠╬─╝■┐╒│÷╫π╣╗╡─┐╒╝Σ╗≥╜½╝╙├▄║≤╡─╬─╝■┤µ╘┌╞Σ╦√┼╠╓╨ú«
- ╬─╝■╝╙├▄║≤ú¼╬─╝■╡─│ñ╢╚▒╚╝╙├▄╟░╘÷╝╙6KB.
- ╝╙├▄║≤╡─╬─╝■┐╔╥╘╜°╨╨╕┤╓╞▒╕╖▌ú¼╡½╘┌╘╦╨╨│╠╨≥╩▒ú¼▒╪╨δ╜½LOCK89╕▀╝╢╝╙├▄ì
- │╠╨≥┼╠▓σ╚δA┼╠╗≥B┼╠.