PC Floppy Copy Protection: Vault Prolok

This is Part 4 of a series on PC floppy copy protection methods. You can read the previous parts here:  

Vault Corporation

Vault was conceived in 1979 and incorporated in 1983. There's not much information about the early days of the company, but 1983 was a busy year for them. The trademark filing for Prolok, their first copy-protection product has a first-use date of March 1983. That same year would see several full-page, color advertisements in various PC magazines, making them one of the major competitors of firms like Softguard. Compared to the modest back-page adverts from other copy-protection firms, Vault's advertisements were very slick - clearly put together by a professional ad agency.

One of Vault's biggest customers was Ashton-Tate, makers of the industry-leading dBase database software and later owners of the Framework office suite. Both dBase III v1.0 and Framework 1.0 would see releases incorporating Vault's Prolok copy protection.  Ashton-Tate was even impressed enough by Prolok to invest $500,000 in Vault, acquiring a 20% interest in the company. 

Vault had over 2,000 customers of Prolok during its heyday, according to former Vault VP Peter Avritch

Vault expressed a high degree of confidence in their product. One of their advertisements even stated the following:

We're proud of Prolok and the fact it represents the end of software piracy.

I probably don't need to tell you that Prolok was not the end of software piracy. 

PROLOK


Prolok differed from other floppy copy-protections in two significant ways. First, the protection did not rely on unusually formatted diskettes, crazy track layouts or non-standard sectors. Instead, the protection relied on deliberate damage to the disk surface, which Vault referred to as a "fingerprint."

Secondly, unlike other methods which were applied during a professional disk duplication process, Prolok was offered as a commercial product in the form of pre-damaged diskettes upon which a software publisher could write their software.  

Prolok Software Protection Diskettes

Once a software publisher had purchased a set of Prolok protection diskettes, they would use the PROLOK.EXE utility included on the disk to write their software to the disk. The utility would encrypt and wrap the program inside a protected loader.

The Software Protection Diskette Packaging

Vault produced both 5.25" and 3.5" versions of the Prolok protection diskette, and high density versions of each were released in late 1991.

Vault offered a evaluation package for $9.95, if you just wanted to see how it worked for your application. A 10-pack cost a little over $30, but bulk orders of Prolok diskettes could drop the cost to as little as $1 a disk. This was still relatively expensive compared to what commercial disk duplicators paid for blank media.

The Prolok technology is described in US patent #4785361.  The inventor is listed as W. Krag Brotby, who was Vault's president and chairman.  

The patent gives a good description of how the technology worked:

The security check procedure involves a test to determine whether the disk on which it has been recorded has or does not have the physical fingerprint that is the hallmark of an authorized disk. If the fingerprint is present, the security check procedure enables the read/write head to read out the protected material; however, if the fingerprint is absent, as it would be from an unauthorized disk, the security check procedure prevents the read/write head from reading out the protected material.

In a preferred embodiment, if the fingerprint is not present, the security check procedure instructs the read/write head to obliterate or to erase the protected material. 

Note the last sentence, this would not be the last time Vault expressed a cavalier attitude toward the data of suspected pirates.  Deliberately damaging user data is almost always a bad idea - Vault ended up replacing some early Prolok-protected media that was inadvertently erased due to compatibility issues. 

In a first embodiment of the invention, which is preferred for its simplicity, a localized permanent defective area is intentionally created at the factory on the unrecorded disk at a random location on the recording surface, on the portion of the recording surface reserved for the material to be protected. The effect of the defect is to render the affected portion of the disk incapable of accurately reading out a piece of data that previously a write head had attempted to record on the defect.

Exactly how this damaged area was created is not specified - PC folklore often describes burning a hole through a disk with a laser.  In actuality, no physical hole is produced through the disk media, but you could think of it as a "hole" in the magnetic oxide coating. The side of the disk opposite the fingerprint is not affected.

Regardless of the exact mechanism - laser or otherwise - a robotic process was employed that precisely disturbed the fine iron oxide coating on the disk sufficiently that it could no longer be written to.  More than one damaged area may be present on a single disk.

The Prolok "Fingerprint"

The disk protection check therefore worked under the assumption that you could write to a sector containing the damaged area, but not read all of the written data back. Reproducing these partially-writable areas would be impossible via conventional means.

Curiously, the patent describes a "third embodiment" of Prolok that enters the realm of science-fiction. It describes a special disk jacket that would somehow incorporate a miniaturized write head and battery. This tiny drive head would modify the disk every time you ran the software:

I don't really need to comment further on the feasibility of that particular scheme, especially considering the limitations of 1980's era technology.

Vault had a bit of a habit of overstating the sophistication of their fingerprinting technology. At the end of the day they were just burned circles on a disk.

Vault's Other Products

Hard Disk Prolok

Eventually, Vault would produce a variant of Prolok that would allow installation to a hard disk, but unlike standard Prolok it would then run from the hard disk without requiring a protection disk in the floppy drive. This was called Hard Disk Prolok.



This scheme would have required some sort of software fingerprint left on the hard disk to essentially confirm that the software was installed from a valid copy - such schemes were not that unusual.  Usually some system of hidden files or a mark placed in an unused section of the hard disk's boot sector would be employed.  

Vault was thoughtful enough to produce a "Cleanup Disk" that would remove the Prolok software fingerprint from a hard disk.


Filelok


Filelok was similar to Prolok, but protected the data files on a floppy disk instead of an executable. Filelok diskettes contained similar "fingerprints" as Prolok diskettes. The way that Filelok worked is that the included utility FL.EXE would be used to launch a desired application. From that point forward, FL.EXE would intercept the target application's disk access and handle encryption and decryption of any files read or written to the Filelok diskette³. A password of up to 8 characters could be supplied when launching the program this way, otherwise all that was required is that the Filelok diskette be present to read any file.  One can speculate about the cryptographic strength of the cipher used - an 8-character password limit might indicate DES, which was limited to a 56-bit key. In any case, lack of any specific details is a worrying admission. One would not buy an encryption product today without knowing exactly what cipher it used.

Filelok diskettes were not cheap - the cost for a 10-pack was announced at $84.95, or $257 in 2024 dollars.

At one point, Vault was in talks with diskette manufacturer 3M to distribute disks using the Filelok technology.  This deal would end up a disaster, with Vault eventually suing 3M over the deal.

Techline

An interesting variation on the Software Protection Disk, Techline was a fingerprinted disk that would accompany a software product and grant access to that product's technical support department.  The Techline utility would present basic diagnostics for use by a technical support representative, but also a code that identified the caller as a genuine owner of the software.

The rationale for this product was clearly illustrated by Vault chairman W. Krag Brotby in an editorial in PC Week:

PC Week, Oct 1987

Telelok

Telelok was yet another extension of of the Prolok scheme, where users could remotely download software onto an authorized (and fingerprinted) diskette. Vault advertised this scheme as being the first copy-protection method for telecommunications. Being that a software publisher would have had to ship you a "remote" disk first, the strategy seems best suited to enable software updates rather than initial distribution.

MIS Week, Jan 1984
Are you really doing Computer Science if you don't have your lab coat on?

Telelok would gain Vault the attention of telecommunications giant AT&T, which at one point was rumored to be considering an investment of $10 million into the company. This investment would ultimately never materialize.

InfoWorld, July 1984

Miscellaneous Other Products

Over the span of the 80's Vault announced a wide variety of other products in the Prolok family, such as UNILOK, CHRONOLOK, and COMMLOK.  Unilok was a multi-key disk scheme, comprising a set of disks with the same fingerprint, so that any two disks with the same serial number could be used to unlock a protected title. Chronolok kept track of the number of times a protected title had been run before expiring at a pre-configured limit.  Vault also produced a parallel port dongle called ROMLOK, and in 1985 they branched out into more sophisticated hardware, announcing a disk duplication machine called the ProLoader. This machine was originally advertised at a price of 3,495, but by 1989 you could purchase a ProLoader II for only $1,595. 

In any case, enough history - let's take a look at the Prolok Software Protection Disk.

Analyzing The Prolok Software Protection Disk

I was fortunate enough to acquire an original, unopened package of Prolok Protection Diskettes, so we can see exactly how they functioned.  A physical examination shows there are 3 fingerprints on each disk, and the fingerprints on all disks in the package are in identical locations. However, the PROLOK.EXE saved to each disk is unique, as is the data in sector 1 of Cylinder 39, Head 0, Sector 1.

The presence of three fingerprints is interesting - dBase III v1.0, one of the few commercial products known to have used Prolok, only has a single fingerprint.

The fingerprints overlap with the last track of the disk, creating 3 bad sectors. I've indicated the rough positions of the fingerprints as circles in the visualization below.  You will see some contrast changes in this image on the outer tracks - this is due to write splices on the disk, which imply that the PROLOK.EXE utility was written to the disk only after professional duplication of a blank, formatted floppy was performed. The rest of the disk is blank.


PROLOK.EXE will refuse to run unless it detects the presence of a valid Protection Diskette. As a clue to how the protection operates, it will also exit with an error if the disk is write-protected. 

Running PROLOK.EXE without arguments

The way it works is quite simple: we give the utility an input filename (the executable we wish to protect), and an output filename (the protected executable it will create).  It looks like we can also provide a custom username and serial number to be attached to the protected product. The destination path must be on the protected disk.

Only one thing to do now - give it a try. I decided to make a protected version of Alley Cat.  To do so, we will issue the following command:

prolok c:\games\cat.exe a:catprot.exe

The utility then asks for confirmation, and after a bit of drive noise, notifies you of completion. 

The file produced, catprot.exe, has grown from the original 55,067 bytes to 69,944 bytes.

Running catprot.exe starts the game without any issues, however there's a small delay and a flurry of CGA snow on the screen, along with perhaps more disk activity than normal.   I copied it to my hard disk, and was able to run it from there as well as long as the protection disk was in the floppy drive. Attempting to run catprot.exe with an unrelated disk in the drive results in the error:

Please insert key diskette and try again

One surprising thing is that it will also run with any of the protection disks from the same package. I had assumed that the unique data seen on track 39 and/or the unique contents of PROLOK.EXE would have been part of the encryption used to wrap the executable, but apparently there must be another explanation.  If I had been a small software publisher trying to sell two different products, I would have found this limitation very disappointing, as it means someone could easily purchase one product and pirate the other, unless I had different sets of diskettes with different fingerprints to use for each product.

Analyzing PROLOK.EXE

PROLOK.EXE is heavily obfuscated, as you might expect. It takes care to frequently overwrite the trap and single step interrupt vectors to combat debugging.  At various stages the program will XOR part of itself, only to later XOR that section again - by doing this, it avoids having the entire program sitting undecoded in memory at any point. This makes it resistant to simple memory dumping attacks. 

I followed along with this for a while, dumping the code segment after each block of code was decrypted, going at least five levels deep. The process felt much like peeling an onion.

The routines that decode blocks of memory are called via registers, which are loaded with addresses from within recently decoded functions. A cracker won't even know the entry points of critical routines if a previous decoding step is missed.

I eventually ran into something interesting - a case-insensitive check for the strings "quaid" and "noguard" in video memory. Quaid Software was a company that produced backup software, and we'll hear more about them soon enough. NOGUARD was a utility from Central Point Software included with their Copy II PC product, which was specifically advertised as defeating Prolok copy-protection. That Prolok looks for these utilities running is a hint of the cat-and-mouse game that was well underway between makers of copy protection technology and makers of backup software.  I see no provision for scanning video memory during a blanking period. This likely explains the CGA snow when launching a protected title, as to avoid snow you must not read or write video memory when the display is in the active area.

Another interesting section analyzes the memory region 0xCA000, which was a common location for a third party floppy controller to mount its expansion ROM.  Prolok looks for the string "BIOROM" and a few specific bytes within the ROM. What it is looking for is not quite clear. I scanned the ROMs of a few different floppy controllers, but did not find a matching string. I thought initially, it might be looking for a Copy II PC Option Board, but I am informed by Trixter that such boards did not contain an expansion ROM. If you have a hunch what Prolok might have been sniffing for, please let me know.

Later on, there's a clever section where we bounce from an overflow interrupt handler, which pushes a value to the stack that sets the trap flag on return. It appears we return into nonsense code, but the trap handler that is called after each seemingly nonsensical instruction gives the code proper context. 

When we finally reach the call to interrupt 13h that reads one of the sectors containing a fingerprint, things aren't much clearer. The actual int instruction is jumped to from a fair distance away, and is present within a block of seemingly unrelated instructions. I can imagine that given all the tricks it employs, this utility would have been difficult to reverse-engineer using the tools of the day.

But nothing could stop a determined cracker.

Copying Prolok Protected Titles

Despite all of Prolok's software tricks and the physical alteration of the disk itself, it was ultimately possible to defeat. The protection code used the standard disk interrupt vector 13h, meaning that you could load an anti-Prolok software utility that would stay resident in memory, intercept calls to interrupt 13h, and simulate the damaged area of the disk.  The protected program would be none the wiser.  A more robust protection such as Superlok 3.0 would directly access the floppy disk controller to avoid such interception, however this could potentially create compatibility issues.

Various commercial products such as Central Point Software's NOGUARD and Quaid Software's RAMKEY advertised their ability to circumvent Prolok copy-protection. The latest version of Quaid CopyWrite available on the Internet Archive that includes the RAMKEY utility was published in 1990 - that gives me hope that it may have been updated for any changes in this 1989 version of Prolok.

Before we can use the RAMKEY utility, we must make a copy of the protected disk with CopyWrite. This is what the CopyWrite interface looks like:

All we need to do is have our Prolok diskette in drive A:, and our blank diskette in drive B:, and hit enter.

Copying goes smoothly until we hit track 39, where the drive starts to make a lot of noise and we don't make progress for a while.  Eventually we tick over to track 40, which is one track too many for a standard floppy disk, but not unheard of. 

Writing the copy to the disk in drive B: proceeded similarly.

Eventually, the copy operation completes with the following message:


The CopyWrite manual warns us that running this copy without the RAMKEY utility loaded may result in making the copy unusable. 

Dutifully, we load RAMKEY:


I removed the copy protection diskette, and executed catprot.exe off our new copy.  It felt like the loading process took a bit longer, but just as I was expecting to see an error Alley Cat started up in all its CGA glory.

It looks like Quaid Software has won this historical shootout. 

Vault Corporation vs Quaid Software

Vault was obviously unhappy with commercial products being sold that completely bypassed their flagship product.  In May of 1985, Vault filed a lawsuit against Quaid Software seeking $100 million in damages. This case would set an important precedent in copyright case law - significant enough to have its own Wikipedia article: Vault Corp. v. Quaid Software Ltd

Quaid Software would prevail in the court battle, confirming the right of users to make backup copies of software under Title 17 of US copyright law. It also overruled a state law, the Louisiana Software License Enforcement Act, which prohibited disassembling or reverse-engineering the Prolok software, deeming such activities an "essential step" of enabling consumer rights under Title 17.

The lawsuit came at no small cost to Quaid software founder, Robert McQuaid, who spent over $100,000 on the defense.

Details from the court filings show how far Vault went to try to protect the secrets of the Prolok code:

Their efforts included encrypting the PROLOK program in four layers of code, separating the various different programmers working on the program from each other, having all employees sign nondisclosure agreements prohibiting them from disclosing any of Vault's secrets, the use of shredding devices at the close of business each day to shred all paper containing any portion of the PROLOK program, and keeping the master PROLOK program locked in a safe.

Given all that secrecy, it's no wonder Vault was a bit upset to see Prolok so easily bypassed. 

An Interview With Robert McQuaid

I was fortunate enough to have the opportunity to interview Robert McQuaid about his experiences and the court battle with Vault. You can read the interview here.

Vault's Corporate Suicide

Occasionally, stories will emerge about a business decision so ill-advised that it basically tanks an entire company's fortunes.  Vault Corporation would give us an excellent example in its announcement of its "Prolok Plus" product.  

Reproduced here is an article from PC Magazine:

PC Magazine, Nov 27, 1984

Here we hear a description of how Prolok Plus will format your hard drive or infect it with a virus on a failed protection check:

Ignore this at your own peril, cautions Vault Corporation Chairman W. Krag Brotby, because if the machine has a hard disk, its entire contents are likely to be erased. Prolok Plus can also implant a "worm" in the system that will cause immediate or subsequent damage to the data or operating system.

Needless to say, this set off a firestorm of negative consumer perception toward Vault Corporation, its Prolok product, and any commercial products that may have used it.  Although Prolok Plus was never actually implemented into any product as far as I can tell, the damage was done as rumors spread that any Prolok-protected title could potentially infect or erase your computer. 

Letter to the Editor, PC Magazine, Mar 1985 

Ashton-Tate, Vault's biggest customer understandably did not want to be associated with this, and by the end of the year had dropped Prolok from their products.  Vault Corporation would never recover from the reputational damage and loss of large customers, and would face increasing industry irrelevance from that point forward. Softguard Systems - subject of a previous post - would pick up some of Ashton-Tate's business in the wake of Vault's blunder.

Ironically perhaps, years later W. Krag Brotby would author several books on Information Security

Emulating Prolok

Emulation is an important tool in the interest of preserving computing history, and Prolok was certainly an important part of that history. I would like people to be able to use and analyze the Prolok protection in MartyPC. 

But how?  First of all, it seems we will need an image format that can define metadata about the disk surface.  The usual type of metadata stored in a disk image is a weak bit mask, relating to a copy-protection scheme which I haven't explained until now.

Weak Bits

Recall that floppy drives do not store 1's and 0's directly on the magnetic medium.  Instead, bits are encoded via a series of flux transitions, essentially reversals of the magnetic field. The time measured by the disk controller between each detected transition encodes a short sequence of bits.  

This scheme requires that flux transitions occur on a regular basis. The MFM encoding standard for floppies is designed to guarantee this - in a valid MFM stream, no more than three 0 bits should exist in a row before we see another 1 bit roll by.  This produces a steady stream of flux transitions.

But what happens if there are no flux transitions? The disk drive's amplifier increases the gain to try to detect weaker magnetic signals. If no signals are actually present, the resulting output becomes noise - think turning your camera ISO way up in a pitch-dark room - and so the disk controller starts to receive random data.  For further technical details on weak bits, please read this excellent blog post by Chris Evans.  Areas of a disk without regular flux transitions are called No-Flux Areas (NFAs).

Some clever copy-protection authors realized that such areas could be intentionally created on a disk, and detected by code that checked that the data read from these areas changed each time. These areas came to be called "weak bits". Like all good copy-protection schemes, such areas could not be created by a standard PC floppy controller.

The Prolok fingerprints essentially create weak bits, as the creation of the fingerprint destroys the regular flux transitions that we would otherwise expect to read.  But unlike a normal area of weak bits, writing over this area will fail to recreate normal flux transitions. The damaged area can no longer be written to. So it's not exactly the same.

Encoding Weak Bits

There are a few formats that allow for encoding both weak bits and deliberate damage ('holes') on the disk surface. MAME's MFI can do so - but it is a flux format that we don't yet support. Another format that we do support is 86F, the native format of the 86Box emulator. However, no images in 86F format that utilize the particular 'damage' surface description exist. 

So how do we encode Prolok's fingerprints into a working disk image file?

Jeff Parsons, of the web-based PCjs emulator, has already been down this road with Prolok in 2019, and posted his experiences in this blog post. PCjs uses a custom JSON-based disk format, and he was able to add the necessary metadata to describe the Prolok fingerprints on a diskette.  But this metadata will need to be added to each diskette as a manual process.

The 'Deluxe' version of the Copy II PC Option Board supported duplication of Prolok protection. No, the board did not include a laser to make holes in your copy - instead it was able to characterize the damaged sections and instruct the controller chip to simulate a damaged region. Clever.  This gives us hope that TransCopy-format images produced by the corresponding utility for the Option Board may support such encodings.

One small problem is that I do not currently own an Option Board, so I cannot produce TransCopy images myself.

Our frequent hero of this series, NewRisingSun, produced a utility bundled with his TransCopy-capable fork of DosBox called flux2tc.exe which can read a KryoFlux or SCP-format flux image, and produce a TransCopy format disk image. A TransCopy image of the Prolok-protected dBase III, converted in this manner, apparently works in this DosBox fork. I was optimistic it might support my catprot.exe as well.

I converted a KryoFlux dump of my protected Alley Cat disk using the command:

flux2tc "T:\gw\prolok_alleycat00\prolok_alleycat00.0.raw" catprot.tc --droptracks

Then I started DosBox-TC, and mounted the resulting disk image:

imgmount a -t floppy catprot.tc

After changing to drive A and running catprot.exe, I was greeted with the following:

DosBox-TC fooling Prolok

Unfortunately, support for TransCopy images isn't present in other, more actively maintained forks of DosBox, and the actual DosBox-TC fork itself doesn't appear to be currently maintained or distributed officially anywhere. 

Using documentation provided by NewRisingSun, I added support for the TransCopy format in fluxfox, my disk image library that powers MartyPC.  At first I was a bit puzzled because TransCopy doesn't seem to have any metadata that would define areas of weak bits or intentional damage. So how is DosBox-TC simulating the Prolok fingerprints?

As it turns out, storing separate metadata for weak bits is not necessarily required.  An area of weak bits can be represented inline within the data stored in a bitstream-level image by simply encoding invalid MFM sequences (long strings of 0's).  And this is exactly what the flux2tc tool does.

We can detect this when we import a file, and create our own weak bit mask. Here is what that looks like, visualized:

A Prolok fingerprint, visualized

The magenta color represents our weak bits. You can see that they are clustered around the location of the Prolok fingerprint. 

That's great, but how to we distinguish holes - which we cannot write to - from weak bits, which we possibly can?

The answer is that we may not need to.  At least for Prolok, we have a few assumptions we can make. First, we can assume that the relevant NFAs will always appear on Cylinder 39. (And probably just head 0, but there's no guarantee Vault didn't change sides of the disk at some point).  This is because the fingerprint 'hole' is actually so large that it would cover multiple tracks if it was not at the very inner edge of track data.

The second assumption is that we can treat sectors with weak bits, at least on Cylinder 39, as safely writable. There are other copy protection schemes that use weak bits, but these NFAs are never meant to be written to. Writing to an NFA could lay down a fresh set of flux transitions and actually ruin the protection, leaving you with a useless floppy.  So we don't really need to expect to write to a sector containing weak bits, normally. 

Therefore we can use a heuristic: if we encounter weak bits on Cylinder 39, we can treat those weak bits as holes. We will preserve our weak bit mask on writes, and use the mask to return random data on reads.

With weak bit support officially in place for TransCopy images, I created an integration test that validated that sector data could be written to a Prolok-fingerprinted sector then read back, and would see different data returned.

One Last Detail

With both support for TransCopy images and weak bits, I was hopeful that catprot.exe would run in MartyPC; but again I was presented with an error message instructing me to insert the original disk.

Looking at disk activity, I spotted a potential reason why. After performing the write test to the Cylinder 39, Head 0, Sector 4, Prolok issues a series of Read Sector ID commands.

Read Sector ID is another standard NEC drive controller command that simply returns the next sector ID the read head encounters as the disk is rotating. I have basic support for this command, but there is no simulation of the disk actually rotating, yet - so Read Sector ID always returns the sector ID set in the result phase of the previously issued command.  When Prolok issues this command multiple times, and sees that the resulting sector ID returned does not increment, it would be able to detect that it was not dealing with a real floppy drive.

My plan for MartyPC is to eventually have a full model of physical floppy timings, including head seek times and spindle rotation.  Am I going to need to implement that now before Prolok can be conquered?  There's only one way to find out. I added a function that, given a sector ID, will return the next sector ID actually present on the track, or wrap around to the start of the track and return the first sector ID. Every time Read Sector ID is called, we'll advance to the next sector.  Hopefully this will be enough, and we won't yet need to model the rotational speed of the disk just yet.

Success

With our Read Sector ID command fixed, we find that catprot.exe starts right up!

Let's try another Prolok protected title, Ashton-Tate's dBase III, v1.0.

We'll make a TransCopy image out of this from an SCP file, using flux2tc.  Normally, dBase will present an error message immediately if the protection check fails. So if we see anything at all, we're in business.

Prolok-protected dBase III v1.0 running in MartyPC

I also worked with the 86Box team, who identified some bugs in the handling of surface description fields within 86F files. I'm happy to report that as of 4.3, 86Box will support Prolok protected titles as well.

Vault Corporation's Ultimate Fate

I couldn't find information on the ultimate fate of Vault.  The end of a company can occur by acquisition, merger, or simply a quiet closing of doors - the latter typically doesn't make news.  Vault emerged from Chapter 11 restructuring in January of 1988, and managed to be a going concern for several more years. The last activity I could find was a renewal of the trademark on their fingerprint logo in 1993. If you know how the Vault story ended, comment below!


If you skipped the link earlier in this article, be sure to read my interview with Quaid software founder, Robert McQuaid, who has some very interesting details to share about his court battle with Vault.

You can also proceed to my next article on XEMAG's Xelok scheme.



Comments

  1. Ran into Prolok on the late 80s at Micronyx. They would push things onto the stack, call the disk interrupt and check that the stack had not been pushed onto by extra TSR programs such as our TRIAD and TRISPAN disk encryption tools. We just restored the stack we had written over. We had a hardware boards that watched the bus that protected our code from. Debugger and Emulators, even hardware ones, by watching bus cycles.

    These were the first National Computer Security Center certified Windows and Dos products.

    ReplyDelete

Post a Comment

Popular posts from this blog

PC Floppy Copy Protection: Softguard Superlok

PC Floppy Copy Protection: Formaster Copy-Lock

The Complete Bus Logic of the Intel 8088