COMPUTIST Magazine Articles
While I was in high school, I submitted a number of articles to COMPUTIST magazine (nee Hardcore Computist). The magazine was devoted to removing the copy protection from commercial software. One article defeated a fairly famous protection scheme.
The "Spiradisc" copy protection system was developed by Sierra On-Line to defend its games. In his book _Hackers_, Steven Levy wrote:
Spiradisc was used on Sierra's "Frogger" and "Maze Craze Construction Set" titles. It truly was state-of-the-art. My favorite trick was the way they defeated NMI copy cards, which captured a snapshot of the computer's memory after the game had loaded. The easiest trick -- corrupting your stack pointer when the game is idle, so the interrupt frame overwrites a valid return address -- was too obvious, and too easily circumvented. Instead, Spiradisc collected some information about the computer's configuration as it was booting. This was periodically re-checked. If the computer had mysteriously gained or lost peripherals, the game knew it was running on a different computer, and would bail. This meant that memory-image copies would appear to work until you tried using them somewhere else, which, as intended, had me running in circles for a few days (the copy card was in a friend's computer).
Since that wasn't working, I tried boot-tracing my way through it. This turned out to be a very frustrating experience. After peeling back several layers of self-modifying code, I gave up and tried a different approach.
It was possible to purchase a "Super Saver ROM" chip that made getting into games easier. The replacement ROM provided a different way of handling the "reset" key that side-stepped the usual copy protection tricks. My brother hacked our 16K "language card" to add a write-protect switch, which allowed us to do essentially the same thing without replacing any chips. (This limited cracking attempts to games that fit in the main 48K of memory, but nearly all heavily-protected games fell into this category.) I submitted an article describing how the hack should be performed, but it was rejected by the editors (scans of the submission here: 1 2 3 4 5 6).
Once I could break into the already-loaded game, finding the copy protection checks was straightforward. I submitted a rather convoluted article to COMPUTIST magazine, but it was rejected by the editors (scans here: 1 2 3 4 5 6 7 8 9). When I got a copy of Frogger, and discovered that it used the same scheme, I successfully applied the same techniques to crack it. I submitted a somewhat shorter article for Frogger, which was accepted and published in COMPUTIST issue #41 in March 1987. I did a nicer crack of the game for my own use, but there was something poetic about breaking the dreaded Spiradisc with a 4-byte change, so I left it as-is.
Scans of the COMPUTIST article are below. The images were copied from computist.textfiles.com, which legally hosts a large collection of scanned issues.
Spelling note: the game itself put the word "SPIRADISC" on the screen, though many people seem to spell it with a 'K' on the end. I believe that computers use floppy disks, not floppy discs, but I feel compelled to use the author's chosen spelling.
Other ArticlesDigging around a little, I have found the following:
There are some others, published after the magazine went into "tabloid" format, that aren't scanned (e.g. a small utility program that appears in issue #60).
For those who may be wondering: I do not advocate software piracy; in fact, as a software developer, I advocate against it. I own well over 100 retail games for the PC, with not a single illegal copy among them. I have, however, continued to explore copy protection technologies, and have provided analyses of a few in my CD-Recordable FAQ.