Unfortunately, this site has restricted functionality as this browser does not support the HTML button formaction attribute.
Unfortunately, this site has restricted functionality as this browser has HTML web storage turned off.

The Official Unprotection Scheme Library. by Copycats Inc

1 of 2 files the paperboy
  • DOC / Text   How to
  • 27 kB   DOWNLOAD   SHARE
hide RetroTxt from Defacto2   The open source WebExtension to view many ANSI, ASCII and NFO files in a browser. Available for Chrome Firefox Brave Edge.
[+] Configuration Select all
                  THE OFFICIAL UNPROTECTION SCHEME LIBRARY

           original document created and compiled by "The PaperBoy"
                            and the CopyCats, Inc.
              01-21-89, 01-26-89, 01-30-89, 02-04-89, 02-06-89
-----------------------------------------------------------------------------
The following protection removal schemes took  many valuable hours of time to
create.  This file contains the procedures for  many of the  latest  software
packages  out  today.   (This  document  is updated at every new unprotection
scheme  or  schemes  we  find.)   Please  be patient if your program can't be
cracked yet.  It will be, pretty soon, we hope.

        ! Please note that these patches are for personal use only !

                      We are THE COPYCATS INCORPORATED:

                    Seymore Warez Unprotected (President)
    The PaperBoy, MasterByte, The Gigolo, The Ninjutsu, SlimeMan, Shimba,
 Grand Central Station, Didley Bop, Dr. Disk, The No Cause People In Florida

                 ** Just cracking software, byte by byte. **

 Use these software unprotection schemes at own risk!   (Try with a BACKUP!)
-----------------------------------------------------------------------------
These programs have unprotection patches or fixes in this document:        29

         Accolade: 4th & Inches, Test Drive, Fast Break, Grand Prix Circuit,
                   Apollo 18
       Activision: The Last Ninja+fix, Rampage
           Sierra: Leisure Suit Larry II, King's Quest IV, Manhunter:  NYork
                   Police Quest II, Gold Rush!
        MindScape: Willow, Bop'n Wrestle, Infiltrator, Defender of the Crown,
                   Perfect College
             Epyx: The Games: Summer E, TechnoCop/fix, California Games, The
                   Games: Winter E.
   Simon&Schuster: Star Trek: The Kobayashi Alternative
         DataSoft: Bruce Lee/fix
  Electronic Arts: Advanced Flight Trainer 1.2
Spectrum Holobyte: Gato: WW2 Submarine Simulator
       Broderbund: The Print Shop, Ancient Art of War
      Cignet Tech: Little Black Book
         PowerUp!: most software
          Infocom: BattleTech!
             misc: Trivia Fever

   /fix=fix only, no unprotection patch    +fix=fix and unprotection patch
-----------------------------------------------------------------------------
A NOTE ON COPY PROTECTION

At the CopyCats, we would like to make a statement on copy protection. We see
this  concept  as  unnecessary.  Crude disk checking and trudging through the
manuals for "key words," make it very difficult for many of the novice users,
as well as the experienced computer users.  Many  of  our  "program  hackers"
also feel  they do not promote software  piracy.  They  only  help the people
who  are  against  the  protection  schemes and use of software authorization
procedures.  And, if it continues, WE will continue.

                                               "S. W. Unprotected"
                                               President of The CopyCats, Inc
-----------------------------------------------------------------------------
LAST MINUTE HACKER'S NOTES

The  PaperBoy  here.  You may notice that many of these programs have similar
protection  scheme  instruction  codes.   If  you  have a program that has no
unprotection  scheme  here,  apply it to the program and test it.  That's how
we were able to pull most schemes down. Remember, this is for the experienced
user.  Don't mess up your originals, either.  And, use write-protect tabs for
the  scheme  checking  -  last  time,  it  erased itself due to a backfire of
the BIOS interrupt 13hex.  Smart program, but WE cracked it.  CAREFUL!
-----------------------------------------------------------------------------
                          THE UNPROTECTION SCHEMES!
-----------------------------------------------------------------------------
1. MOST MAJOR ACCOLADE SOFTWARE, The PaperBoy

To remove the protection schemes of 4TH & INCHES, TEST DRIVE, FAST BREAK**, &
other ACCOLADE SOFTWARE:

    Search for these bytes: 55 56 57 06 1E  (use Norton Utilities, DEBUG
       And replace it with: 31 C0 C3 06 1E    PC-Tools, or equivalent)

 ** If you wish to patch FAST BREAK, you must modify all main FB-?.EXE files
    and the FB.RTL file.
-----------------------------------------------------------------------------
2. GRAND PRIX CIRCUIT BY ACCOLADE, Two Guys
 
The  previous  ACCOLADE  unprotection  scheme was incompatible with its later
released game, GRAND PRIX CIRCUIT.  With an updated protection, you must:

          Search for these bytes   ------>   And replace it with
         1. BE 06 00 E8 13 00                EB 16 00 EB 13 00
         2.    F6 C4 10 75 0B                EB 0E 10 75 0B
         3.          72 5F BB                90 90 BB
         4.          75 47 BE                90 90 BE
         5.          B8 09 02                EB 0A 02
         6.       75 03 E8 03                EB 03 E8 03    (GPEGA.EXE only!)
-----------------------------------------------------------------------------
3. LEISURE SUIT LARRY II BY SIERRA, Pirates-R-Us

LEISURE SUIT LARRY GOES LOOKING FOR LOVE  IN SEVERAL WRONG PLACES  by  Sierra
On-Line  has  a  seriously annoying protection scheme. The player must trudge
through  the  manual  to  look for  girl's phone number in order to enter the
game.  This  patch force the program to accept any input at the prompt in the
initialization of the program.

   1. Rename SIERRA.EXE to SIERRA.XXX
   2. Enter DEBUG and enter the following lines.

             E 0394 F6
             E 4210 52 5C
             E 9E1D B8 08 35 CD 21 89 1E FC 12 8C 06 FE 12 B8 24 35
             E 9E2D CD 21 89 1E 00 13 8C 06 02 13 B8 24 35 CD 21 89
             E 9E3D 1E 04 13 8C 06 06 13 07 1E 0E 1F BA 6B 9C B8 23
             E 9E4D 25 CD 21 BA 6C 9C B8 24 35 CD 21 1F E8 5A 00 C7
             E 9E5D 06 FA 12 01 00 C3 90 57 51 B9 0F 00 BF 86 BA C6
             E 9E6D 05 00 83 C7 09 E2 F8 59 5F 2E C7 06 10 3F 0E 01
             E 9E7D E9 8F A3 90 90 90 90 90 90 90 90 90 90 98 90 83
             E 9E8D 3E FA 12 00 75 01 C3 1E 07
             E F676 8E D8 B1 03
             W
             Q

   3. Rename SIERRA.XXX back to SIERRA.EXE
-----------------------------------------------------------------------------
4. STAR TREK: THE KOBAYASHI ALTERNATIVE BY SIMON & SCHUSTER, Dr. Disk

This  simple  protection scheme can be bypassed with Central Point Software's
NOKEY (distributed with COPY II-PC), or you can use the removal scheme below.

         Search through ST.EXE for CD 13 and replace it with 90 90.

You  can  use this patch with most software that you use with NOKEY to bypass
its protection scheme.
-----------------------------------------------------------------------------
5. RAMPAGE AND THE LAST NINJA BY ACTIVISION, INC., The Ninjutsu

The above unprotection scheme can be used on these two ACTIVISION programs.
Search the main EXE files for CD 13 and replace it with 90 90.
-----------------------------------------------------------------------------
6. MANHUNTER: NEW YORK BY SIERRA, Bart Montgomery

            Search the file MHVOL.1 for these bytes: 41 06 7A
                  and replace them with these bytes: 7F C3 00
-----------------------------------------------------------------------------
7. FIX FOR BRUCE LEE BY DATASOFT, The PaperBoy (FOR DISK VERSION ONLY)

     First, Bruce Lee is an excellent product.  It's just that (aaarrrggghhh)
you have no  `falls' left, and you feel yourself quite near the finish of the
game. Suddenly, one of those little dots floating on floor taps your foot and
you get zapped.  You see the sign "Game Over" and you feel pretty pissed, and
wish  you  could open the drive and rip the disk to shreds, but that would be
a waste.  So, fix it! One thing you could do is play option C, one player vs.
your opponent played by the other player. But this time, play alone, and make
sure  the  second joystick is calibrated wrong. If the computer sees that the
Yamo  isn't  moving,  it  will take over, so a wrong calibration will make it
move always.  So, you're playing, but that stupid ninja is in your way and it
won't  let you win.  Alternative?  Eliminate him.  And this is how you do it.
Get  a  disk  utility,  preferably Norton Utilities.  Zap the Bruce Lee disk,
with the following information.

     Sector 271                             Sector 271
     Offset 139                     and     Offset 354
     Change 09(hex) to 63(hex)              Change 09(hex) to 63(hex)
     
     That's all there  is  to it.  Now you play, the Green Yamo flying around
crazily, and the ninja... hmm... the ninja seems to appear for a quick second
then disappear.  Now, he's never gonna touch you!
-----------------------------------------------------------------------------
8. GATO: WORLD WAR 2-CLASS SUBMARINE SIMULATOR BY SPECTRUM HOLOBYTE, SlimeMan

              To unprotect GATO, use the following table below.

                  Sector    Offset    Contents  Change To

                    53        0E        72 11     90 90
                    53        13        72 0C     90 90
                    53        53        72        EB
                    53        65        75        EB
-----------------------------------------------------------------------------
9. TRIVIA FEVER, Grand Central Station

To unprotect TRIVIA FEVER, follow the steps below.

   1. Rename TF.EXE to TF.XXX
   2. Enter DEBUG and type in the lines below.
         -E 257E       <ENTER>
         -75.90 03.90  <ENTER>
         -W            <ENTER>
         -Q            <ENTER>
   3. Rename TF.XXX back to TF.EXE
-----------------------------------------------------------------------------
10. THE GAMES: SUMMER EDITION BY EPYX, Dr. Disk

To unprotect THE GAMES, use the following patch below.

               Search for these bytes: E8 87 00 59 C6
                  And replace it with: 59 59 5F EB 55
-----------------------------------------------------------------------------
11. LITTLE BLACK BOOK BY CIGNET TECHNOLOGIES, The Gigolo

To unprotect your LITTLE BLACK BOOK, search the file BOOK.EXE and patch:

         Search for these bytes:  ---->  and replace it with these bytes:
      3D 00 00 74 07 C6 06 03 01         B8 00 00 74 07 C6 06 03 00
      CD 13 B8 01 02 CD 13 72 0E         90 90 90 90 90 90 90 EB 0E
            EB F5 F6 C4 06 75 06         EB F5 F6 C4 06 EB 06

Now, search in the file LBB.EXE and patch:

         Search for these bytes:  ---->  and replace it with these bytes:
   3D 00 00 74 07 C6 06 76 04 01         B8 00 00 74 07 C6 06 76 04 00
      CD 13 B8 01 02 CD 13 72 0E         90 90 90 90 90 90 90 EB 0E
            EB F5 F6 C4 06 75 06         EB F5 F6 C4 06 EB 06
-----------------------------------------------------------------------------
12. KING'S QUEST IV: THE PERILS OF ROSELLA BY SIERRA ON-LINE, Pirates-R-Us

To  completely  bypass the documentational protection on KING'S QUEST IV, use
the procedure below.

   1. First, search your Quality Assurance file for the correct edition date.
      It is found in the ????????.QA file.
   2. If you do not have your version dated 09-19-88 nor 09-24-88, you cannot
      proceed with this patch.  Sorry!
   3. Rename SIERRA.EXE to SIERRA.XXX.
   4. Enter DEBUG and type the following lines below.
   
      (if you have the 09-19-88 version, use this patch)
      E 0394 82
      E 0CB4 90 E8 38 98
      E A4A9 B8 08 35 CD 21 89 1E 7E 12 8C 06 80 12 B8 24 35 CD 21 89 1E
      E A4BD 82 12 8C 06 84 12 B8 24 35 CD 21 89 1E 86 12 8C 06 88 12 07
      E A4D1 1E 0E 1F BA F7 A2 B8 24 35 CD 21 BA F8 A2 B8 24 35 CD 21 1F
      E A4E5 E8 5A 00 C7 06 7C 12 01 00 C3 90 80 FB 98 75 16 C7 04 32 95
      E A4F9 C6 44 02 00 2E C7 06 B4 09 FF 97 2E C7 06 B6 09 A0 01 FF A7
      E A50D A0 01 90 90 90 90 90 90 90 90 90 83 3E 7C 12 00 75 01 C3 1E
      E A521 07
      W
      Q
      
      (if you have the 09-24-88 version, use this patch)
      E 0394 74
      E 0CB4 90 E8 2A 98
      E A49B B8 08 35 CD 21 89 1E 5E 12 8C 06 60 12 B8 23 35 CD 21 89 1E
      E A4AF 62 12 8C 06 64 12 B8 24 35 CD 21 89 1E 66 12 8C 06 68 12 07
      E A4C3 1E 0E 1F BA E9 A2 B8 23 25 CD 21 BA EA A2 B8 24 25 CD 21 1F
      E A4D7 E8 5A 00 C7 06 5C 12 01 00 C3 90 80 FB 98 75 16 C7 04 32 99
      E A4EB C6 44 02 00 2E C7 06 B4 09 FF 97 2E C7 06 B6 09 0A 05 FF A7
      E A4FF 0A 05 90 90 90 90 90 90 90 90 90 83 3E 5C 12 00 75 01 C3 1E
      E A513 07
      W
      Q

   5. Rename SIERRA.XXX back to SIERRA.EXE.
-----------------------------------------------------------------------------
13. CALIFORNIA GAMES BY EPYX, Jonathan Millhouse

To override the disk protection scheme in CALIFORNIA GAMES, enter Norton
Utilities or your favorite disk/file editor and open CALGAMES.EXE.

                Search for these bytes: FA FC 55 56 57
       And replace it with these bytes: 00 00 31 C0 C3
-----------------------------------------------------------------------------
14. CHUCK YEAGER'S ADVANCED FLIGHT TRAINER BY ELECTRONIC ARTS, Tony Elliott

(Version 1.2 only)

          1.  Rename AFT.EXE to AFT.XXX
          2.  Enter DEBUG with AFT.XXX open for editing.
          3.  At the DEBUG "-" prompt, type

              U 0DBB <ENTER>

Several  lines  with  be displayed on screen. You are interested in the first
two.  They should look EXACTLY like this:

              xxxx:0DBB  E9A3A7         JMP   B561
              xxxx:0DBE  C3             RET

The "xxxx" represents any four  hexadecimal  numbers.   If  you have a match,
on  to  the next step.  If not, you probably have the wrong version.  Sorry!

          4.  At the "-" prompt again, type

              U 0E38 <RETURN>

Several lines of code will again be displayed on screen.  Look  at  the first
two following  the "U 0E38" command.  They should also match exactly with the
following:

              xxxx:0E38  880E5005       MOV  [0550],CL
              xxxx:0Exx  8A0E4D05       MOV  CL,[054d]

If you have a match here, then you should  have  a  compatible version of the
AFS program.  If not, sorry!

          5.  At the "-" prompt, type the following:

              E 0DBB 90 90 90 <ENTER>
              E 0E38 C3 90 90 90 <ENTER>
              W <ENTER>
              Q <ENTER>

You should now be back in DOS.  Only one more step left.

          6.  Rename AFT.XXX back to AFT.EXE

That's it!  You now have an unprotected copy of AFT.
-----------------------------------------------------------------------------
15. POWER-UP! SOFTWARE, The No Cause People in Florida

To unprotect most programs from POWER-UP!, load the main EXE file with Norton
Utilities or such.

          Search for the bytes: E8 48 FF
           And replace it with: 90 90 90
-----------------------------------------------------------------------------
16. THE PRINT SHOP BY BR0DERBUND, Swamp Fox

The Print Shop employs two sections of code to copy protect itself. The first
is embedded in PS.EXE and is exercised when the program is run from a floppy.
The second is  embedded in PSINIT.OVR and is employed when the program is run
from a hard or ram disk. Once activated,  both seek out a specially formatted
track on the A: drive and terminate the program if not found.

Both sections of code will be un-hooked here so that the program will run
from either a floppy or a hard disk.

RENAME PS.EXE PS.ZAP                            Rename for DEBUG

DEBUG PS.ZAP                                    Start DEBUG

S0 9000 CD 13                                   Search for Disk interrupt 13

XXXX:3AC6                                       You should find these two:
XXXX:3ADF

U 3AC6                                          Unassemble code to make sure
                                                you're in the right place :

XXXX:3AC6       INT     13                      A test for any disk in A:
XXXX:3AC8       MOV     BYTE PTR [0A91],02
XXXX:3ACD       DEC     BYTE PTR [0A91]
XXXX:3AD1       JZ      3AE6
XXXX:3AD3       MOV     DH,00                   \
XXXX:3AD5       MOV     DL,00                    | This sets up a look for the
XXXX:3AD7       MOV     CH,09                    | special track
XXXX:3AD9       MOV     CL,0A                    |
XXXX:3ADB       MOV     AL,01                    |
XXXX:3ADD       MOV     AH,04                    |
XXXX:3ADF       INT     13                      /
XXXX:3AE1       CMP     AH,00                   If not there ... Loop then
XXXX:3AE4       JNZ     3ACD                    Zonk! Terminate Program...


A 3AC6                                          Get rid of 1 st diskette look

XXXX:3AC6       NOP                             Remove the INT 13
XXXX:3AC7       NOP
XXXX:3AC8

A 3ADD                                          Get rid of the real test:

XXXX:3ADD       MOV     AH,00                   Give it what it wants in AH
XXXX:3ADF       NOP                             Remove the INT 13
XXXX:3AE0       NOP
XXXX:3AE1

W                                               Write out the changed code

Q                                               Quit DEBUG

RENAME PS.ZAP PS.EXE                            Rename for running program

(The program will now run from floppy disks without further changes)

Now for the second portion of the copy protection :

DEBUG PSINIT.OVR                                Start DEBUG (using a copy !)

S0 2000 CD 13                                   Look for disk interrupt 13

XXXX:0479                                       You should find these three:
XXXX:0492
XXXX:04BD

U 0479

XXXX:0479       INT     13                      A test for any disk in A:
XXXX:047B       MOV     BYTE PTR [CD57],02
XXXX:0480       DEC     BYTE PTR [CD57]
XXXX:0484       JZ      04DB
XXXX:0486       MOV     CL,11                   \
XXXX:0488       MOV     AH,04                    |
XXXX:048A       MOV     DH,00                    |
XXXX:048C       MOV     CH,09                    | This sets up a look for the
XXXX:048E       MOV     DL,00                    |   special track
XXXX:0490       MOV     AL,01                    |
XXXX:0492       INT     13                      /
XXXX:0494       CMP     AH,00                   If not there ... Loop then
XXXX:0497       JNZ     0480                       Zonk ! Terminate Program...

                                                (Look familiar ?)

U 04BD

XXXX:04BD       INT     13                      This one's a read (same idea)
XXXX:04BF       CMP     AH,00
XXXX:04C2       JNZ     04A5
XXXX:04C4       ADD     BX,018B
XXXX:04C8       MOV     CL,05
XXXX:04CA       ES:
XXXX:04CB       MOV     AL,[BX]
XXXX:04CD       CMP     AL,41
XXXX:04CF       JNZ     04DB
XXXX:04D1       INC     BX
XXXX:04D2       DEC     CL
XXXX:04D4       JNZ     04CA
XXXX:04D6       MOV     AX,0000                 This is the success exit !
XXXX:04D9       JMP     04DE

A 0479

XXXX:0479       NOP                             Remove INT 13
XXXX:047A       NOP
XXXX:047B

A 0490

XXXX:0490       MOV     AH,00                   Give it what it wants in AH
XXXX:0492       NOP                             Remove INT 13
XXXX:0493       NOP
XXXX:0494

A 04BD

XXXX:04BD       JMP     04D6                    Jump to success exit code
XXXX:04BF

W                                               Write out the changed code

Q                                               Quit DEBUG


The program may   now  be run from a hard disk or floppy as desired. The hard
disk  set up will  ask  for  the  master diskette to be inserted but won't do
any checking or diskette access at all.
-----------------------------------------------------------------------------
17. THE ANCIENT ART OF WAR BY BR0DERBUND, Didley Bop

Load  up  Norton Utilities with WAS.EXE and search for these bytes: E8 F8 32.
Replace them with B8 01 00.  Now, it's unprotected!
-----------------------------------------------------------------------------
18. FIX FOR BATTLETECH BY INFOCOM, The PaperBoy

You don't have enough C-Bills?  Well, this will help.  Save your game and run
Norton  Utilities  or  such with the GAME# (#=number of the save game) ready.
Edit the bytes at offset 05D5hex and 05D6hex and replace it with 00 70.  That
should give you about 28672 C-Bills when you return to the game.  You may  go
as  high  as  FF 7F, which will total 32767, but I wouldn't want to go higher
than that, or there could be a program interpretation screwup.
-----------------------------------------------------------------------------
19. FIX FOR TECHNOCOP BY US GOLD AND EPYX, Shimba

If you start with only 5 lives and must go through 11 levels of harsh battle,
I  don't  think  you'll  make it, unless you are lucky and fast enough to get
extra  lives.  Save your game, enter NU and change the byte at offset 5hex to
05.  This will return you to 5 lives.  I tried fixing it with FF, but I found
out that it doesn't work - I lose as if I had no lives left.  You can attempt
to screw around with other bytes and hopefully get more lives than five.
-----------------------------------------------------------------------------
20. WILLOW BY MINDSCAPE/CINEMAWARE, Hacker Joe

Open WILLOW.EXE with your hex file editor and perform these operations:

           Search for these bytes:  ---->  And replace with:
           CD 13 59                        90 90 59
           74 02 EB E6                     EB 02 EB E6
           75 04 3C 00                     EB 18 3C 00
           3C F8 75 14                     3C F8 EB 14
           73 0C 33 C0                     EB 0C 33 C0
-----------------------------------------------------------------------------
21. BOP 'N WRESTLE BY MINDSCAPE, SlimeMan

Prepare  BOP.EXE for editing with NU or compatible program.  Search for these
bytes: B8 00 19 CD and replace them with: 31 C0 EB 2F.
-----------------------------------------------------------------------------
22. FIX FOR THE LAST NINJA BY ACTIVISION, The Ninjutsu

Not enough lives?  Well,  save your game and enter your hex-style editor with
that save game file open for editing.  Change the byte at offset 59hex to any
hex number  from 00 to FF.  FF will obviously give you 255 lives, so why want
the 00?  Your  screen  will  be lined up with those damn apples on the bottom
status screen, but they won't effect the game.
-----------------------------------------------------------------------------
23. INFILTRATOR BY MINDSCAPE, MasterByte

This unprotection scheme was very similar to that of  BOP 'N WRESTLE.  Here's
its own version.  ** Make sure you change all EXE files (except INSTALL)! **

                Search for these bytes: 31 C0 19 CD
                   And replace it with: EB 33 19 CD
-----------------------------------------------------------------------------
24. APOLLO 18 BY ACCOLADE, Two Guys

To unprotect APOLLO 18, use Norton Utilities or PC-Tools and...

                Search for these bytes: 9A 29 00
                   And replace it with: EB 1B 00
-----------------------------------------------------------------------------
25. DEFENDER OF THE CROWN BY MINDSCAPE/CINEMAWARE, The Doctor of MASH

To unprotect DEFENDER OF THE CROWN,  use DEBUG for this one.  Rename the file
DOC.EXE to DOC.XXX and follow the instructions below.

DEBUG DOC.XXX <CR>
-S 0 FFFF B8 00 A0 50 FF 36 0A 45 <CR> ; search for beginning of routine.
xxxx:3BCC                              ; addresses may be different
xxxx:3BF2
-A3BCC <CR>                            ; assemble at first address
xxxx:3BCC JMP 3BF2 <CR>                ; jump to second address
xxxx:3BCE <CR>
-W <CR>                                ; write the edited file back to disk
Writing 11600 bytes
-Q <CR>                                ; quit, return to DOS

Now, rename DOC.XXX back to DOC.EXE.  It's unprotected.
-----------------------------------------------------------------------------
26. PERFECT COLLEGE, Dr. Disk

This  unprotection  scheme is very similar to that of unprotection scheme #1,
the  ACCOLADE  schemes.  However,  the  program  places  a  RETF (far return)
instruction instead of the normal RET.  So, ready COLLEGE.EXE for edit, and:

        Search for these bytes: 55 56 57 06 1E
           And replace it with: 31 C0 CB 06 1E
-----------------------------------------------------------------------------
27. POLICE QUEST II: THE VENGEANCE BY SIERRA, Pirates-R-Us

The new line of SIERRA software protected with the documentational check have
almost identical patches to the main EXE file.  This one was no sweat.

Rename SIERRA.EXE to SIERRA.XXX and load DEBUG.  Enter these lines:

            E 0394 74
            E 7FDB 05 1F
            E 9E9B B8 08 35 CD 21 89 1E 38 13 8C 06 3A 13 B8 24 35
            E 9EAB CD 21 89 1E 3C 13 8C 06 3E 13 B8 24 35 CD 21 89
            E 9EBB 1E 40 13 8C 06 42 13 07 1E 0E 1F BA E9 9C B8 23
            E 9ECB 25 CD 21 BA EA 9C B8 24 35 CD 21 1F E8 5A 00 C7
            E 9EDB 06 36 13 01 00 C3 90 57 51 B9 38 00 BF B8 AB C6
            E 9EEB 05 00 47 E2 FA 2E C7 06 DB 7C 5B 01 59 5F E9 DE
            E 9EFB E0 90 90 90 90 90 90 90 90 90 90 90 90 90 90 83
            E 9F0B 3E 36 13 00 75 01 C3 1E 07
            W
            Q

Rename SIERRA.XXX back to SIERRA.EXE and your unprotection is complete.
-----------------------------------------------------------------------------
28. GOLD RUSH! BY SIERRA, Sir Graham

To  avoid  the  80-page  manual  for the keywords, prepare the file GRDIR for
DEBUG and enter the following lines:

            E 28C CC
            E 28D 7A
            W
            Q
-----------------------------------------------------------------------------
29. THE GAMES: WINTER EDITION BY EPYX, Super Dave

To unprotect THE GAMES: WINTER EDITION, follow these steps below:

    1. Rename GAMES.EXE to GAMES.XXX.
    2. Enter DEBUG with GAMES.XXX ready for modifications.
    3. Type "S 0000 FFFF 0B C0 74 01" to search for the protection pattern.
    4. The  computer should respond with only one address.  If none or more
       than one is given, this unprotection scheme may not work.  Sorry!
    5. Take the address given (in the form of XXXX:YYYY) and subract 5 from
       the  YYYY  address.  The numbers are in hexidecimal.  Do not attempt
       this patch if you do not understand hex.
    6. Use the subracted number (ZZZZ) and enter it in DEBUG as follows:
       "E ZZZZ EB 03 90 90 90 31 C0" to NOP the protection scheme.
    7. Save the modified file by entering "W", then entering "Q" to exit to
       DOS.
    8. Rename the file GAMES.XXX back to GAMES.EXE.
-----------------------------------------------------------------------------
  This file is updated every week.  Watch out for new unprotection schemes!
Please  upload  this  file  archived as "UNP89-#.ARC," where # is the edition
number.  For instant cracks on software, call 1-312-ZAP-DISK and ask for Vic!
UNPCC89.DOC 80x590 Font
80