LOCKSMITH PC v1.3 [JUNE 94] - *SHAREWARE VERSION* (c) 1994 REM Software, All Rights Reserved. Programming: Roger Ray Deprotection: Matthew Linsemier *** NOTICE *** THIS VERSION OF LOCKSMITH PC IS *SHAREWARE*. You have a 30 day trial period in which to evaluate this product. After 30 days you are required to purchase the commercial product or cease all use of this *SHAREWARE* version. To purchase Locksmith PC, Contact: REM Software 1359 Frank Drive Monroe, MI 48161 (313) 457-1161 LOCKSMITH PC v1.3...................................$39.95 LOCKSMITH PC COMPETATIVE UPGRADE*...................$29.95 * for owners of NEVERLOCK, RAWCOPY PC, COPYII/PC, or DPROTECTOR. SYSTEM REQUIREMENTS Requirements: IBM XT/AT/386/486/Pentium and 100% compatible 512k RAM DOS 3.3 or higher Hard Disk Recommended: Microsoft Mouse and 100% compatible MEDIA INFORMATION Locksmith PC is shipped on one (1) 3.5" Diskette. If necessary, you may obtain Locksmith PC on a 5.25" diskette directly from REM Software. COPY PROTECTION The diskette upon which Locksmith PC is distributed is not copy protected. We recommend that you make one archival backup of your original diskette. Illegal distribution of this product in any way will result in prosecution to the fullest extent of the law. DISCLAIMER This program is sold as is, without warranty of any kind, either expressed or implied, with respect to the use or functionality of this program, including, but not limited to, implied warranties for the program's quality, performance, merchantability, or fitness for and particular purpose. Neither REM Software nor its dealers or distributors shall be liable to the purchaser or any other person or entity with respect to any liability, loss, or damage caused or alleged to be caused directly or indirectly by this program. INTRODUCTION What is Locksmith PC? Locksmith PC is a program developed to lift the burden of copy protection from those users who purchase commercial software products. After running Locksmith PC on the appropriate title, it will alleviate the copy protection process. No longer will you have to fumble through your 300 page manual to find the correct word, align a triple level code wheel, or worry about grinding your floppy disk heads on a keydisk. Locksmith PC makes your software easily accessible, which means you spend more time on the game, not the copy protection. What is the purpose behind Locksmith PC? REM Software does not condone the illegal distribution of copyrighted material. Locksmith PC is created as an alternative to the aggravation caused by copy protection. It is intended to be used only by legitimate owners who have purchased the software product they are deprotecting. Use of this product to remove copy protection from illegally owned software is in violation of federal copyright laws and subject to prosecution to the fullest extent of the law. Why Locksmith PC? There are several other packages similar (but NOT superior) to Locksmith PC, some of which are Neverlock, Rawcopy PC, Dprotector, and CopyII/PC. Locksmith PC offers the most features at the cheapest price. It removes copy protection from more software packages than any of the other software competing packages listed above, 763 different titles to be exact. Locksmith PC has all of the latest titles as well as most of the older ones. So when it comes down to it, there is NO COMPITETION! HISTORY OF COPY PROTECTION Originally, and still many times today, people hear the words "copy protection" and assume that the disk is protected in a way so that it could not be copied. The term "copy protection" may be applied in many cases. Copy protection can be broken down into four basic types: keydisk, password, code wheel, and hardlock. Keydisk protection was the first form of copy protection developed on many of the computer platforms. The idea behind the keydisk was that the software publishers produced a specially formatted track or tracks that could not be copied through normal means using DOS. When you ran the software package it would require you to place the original diskette in the appropriate drive to operate correctly. The term "original" meant that you must use the original diskette and because this was your only copy it could cause many problems. If the disk was in any way damaged you would have to get a hold of the publisher and pay money to have it replaced, if you were lucky enough that the software company was still in business. This type of copy protection proves useful to software publishers, although most avoid using it due to the user's inconvenience. Password protection was created following the keydisk era. This is the most commonly used copy protection on the market today. The term "password" has many meanings. Basically you must supply the currently running program with a word, code, or other form of text from printed material supplied with the game. This is preferred over keydisk copy protection because you can make archival backups of your original diskettes. Although password protection is preferred by most software companies, it is still a pain sorting through that 200 page manual, or finding a code on a piece of brick red paper that must by held at the correct angle in the light to read anything legible. Code Wheel protection surfaced about the same time as password protection. The theory behind the code wheel was that you had to align the wheel according to information displayed on the screen of the currently running program. At first there were two level code wheels which asked you to align two objects, text, etc. to obtain the correct text or numbers to start gameplay. I am assuming that this was too easy for pirates to duplicate, so software publishers went to the three level code wheel which added an additional object, text, etc. to start gameplay. Hardlock protection, known also as Dongle, Keylock, and many other names, was not as much of a problem as other forms of copy protection, but offered greater risks. Mostly hardlock protection appears on high end business packages such as CAD/CAM, Statistical, and many others. This protection comes in the form of a hardware plug that must be attached to your computer's parallel or serial port for the program to run correctly. For the home user this caused little problem, but for the business person, losing a Hardlock due to a malfunction or theft could cause the loss of time and money. GETTING STARTED Installation: Use the following procedure to install the Locksmith PC. 1. To install Locksmith PC place the original diskette in any floppy disk drive. Type the letter for that drive followed by a colon (:) and press [ENTER]. 2. Type the following to install Locksmith PC. INSTALL [ENTER] 3. The installation program will display three options. A. Install files to hard disk. When this option is selected, the program will ask you to supply the word located on a specified page and line from the manual. After typing the correct word and pressing [ENTER], the program will ask you to supply the path to use for installing Locksmith PC. The default path is C:\LOCKSMTH. If you prefer to use a different path, use the back space key to delete the default path and then type in the path you wish to use. Press [ENTER]. B. Display README.TXT file. This option will allow you to view the README.TXT file, if any which contains documentation on any last minute changes made to Locksmith PC. C. Exit to DOS This option will return you to DOS RUNNING LOCKSMITH PC To run Locksmith PC change to the drive and directory where you have installed the program. Type the following to run Locksmith PC: LOCK_SW [ENTER] USING LOCKSMITH PC Menu Command Bar: Parameter: Selecting this option from the menu control bar activates the parameter menu from which you can choose a software title in the list to remove the copy protection from. This is the default selection upon running Locksmith PC. Copy/Format: Selecting this option from the menu control bar activates the copy and format menu. From here you can format and duplicate disks. Hex Editor: Selecting this option from the menu control bar activates the hex editor. This will allow you to edit text or other data in binary files. Quit: Selecting this option from the menu control bar exits from Locksmith PC. Pull Down Menus: File: 1. Shell to DOS Selecting this option will allow you temporarily return to DOS. Type 'EXIT' to return to Locksmith PC. 2. About Selecting this option from the pull down menu displays the information about Locksmith PC including version, copyright notice, and authors. 3. Quit Selecting this option from pull down menu exits Locksmith PC. Utilities: 1. Parameter Selecting this option from the menu control bar activates the parameter menu in which you can chose a software title in the list to remove the copy protection from. This is the default selection upon running Locksmith PC. 2. Copy/Format Selecting this option from the menu control bar activates the copy and format menu. From here you can format and duplicate disks. 3. Hex Editor Selecting this option from the menu control bar activates the hex editor. This will allow you to edit text or other data in binary files. Options: 1. Search Method A. Auto Search When this option is selected, all hard drives (C-Z) will be automatically searched when attempting to deprotect a software title from the parameter list. B. Manual Search When this option is selected, Locksmith PC will ask you to supply a drive and path when attempting to deprotect a software title from the parameter list. USING PARAMETERS Deprotecting a Software Title: NOTE: The shareware version of Locksmith PC has only a fraction of its 700+ parameters enabled. Only those titles that are marked with an asterisk (*) are enabled. The commercial version of Locksmith PC supports the full list of parameters. Use the arrow keys or mouse to highlight the name of the software titles you wish to deprotect. If you are using the manual search option, you will be asked to supply a path for the program you have selected for Deprotection. If you are using the Auto Search option then Locksmith PC will begin searching all available hard drives for the program you have selected. Once the CANCEL button appears, you may cancel the search by clicking this button. When Locksmith PC finds a possible match it will ask you to confirm the path. You may click the YES, NO, or CANCEL buttons to confirm, deny, or abort respectively. If you confirm the path, Locksmith PC will attempt to deprotect the software. A message box will confirm the whether or the Deprotection was successful or unsuccessful. Search: Clicking the search button will activate the search window in which you can specify a particular software title in which to scan the list of parameters for. Pressing '+' will advance to the next occurrence, while '-' will retreat to the previous occurrence. USING THE FAST COPY AND FAST FORMAT This option is not available in the *SHAREWARE* version of Locksmith PC. Contact REM Software to purchase the commercial version which contains this feature. USING THE HEX EDITOR This option is not available in the *SHAREWARE* version of Locksmith PC. Contact REM Software to purchase the commercial version which contains this feature.