Skip to main content

Full text of "Hardcore Computist Issue #60"

See other formats


For The Serious User Of Persoiial_CginButerg_ 



iMPUTIST 



Issue 60 



October 1988 



USA $3.75 Canada & Mexico $7.00 All Others $8.75 

# RDE3I '■=s^<%ex^ 



Reading from Protected Disks-By bui Jetzer 
EDASM Transfer Utility-oy m.m. McFadden 
Amper QuickOraw II Routines-By m.m. McFadden 
Slow Speeds for Arcade Games-By jotm Bishop 

A Patch for Copy II PluS-By Mate Satchelor 

The Product Monitor-By Jeff Huriburt 

Low Cost Alternate Languages-By Michael j. Parii 

Another Copy-Protection Scheme for DOS 3.3-By Stanley pianton 



Change Appleworhs Cursor-sy Jack r. Nissei 



■■■^r-c- «-. fjn. 



# RDEX S^OLteB^^MfAz 

Ace Programmer * Aesop's Fables (GS) « Apple GEOS v2.0 « Artie Antics * Creating the Constitution * Crossword Magic 
4.0 « Death Sword «Dome Bookkeeping « Essential Data Duplicator III (EDO 3) « Garfield Deluxe Edition « Gauntlet 
llgs «J & S Gradebook « Kings Quest llgs « Kings Quest 1 <GS) <t Lazer Maze « Leisure Suit Larry « Magical Myths 
« Mastertype v2.1 * Mavis Beacon Teaches Typing * Mind Prober/Mind over Minors « NATO Commander vl.2 * Paperboy 

* Pegasus * Pinball Construction Set # Pool 1.5 * RAD Warrior * RaUroad Works * Road Rally USA «Robomath « Science 
Tool Kit « Search and Rescue « Showoff « Social Studies Vol 1 « Social Studies Vol 2 « Solo Flight « Space Quest 
m springboard Publisher « Spy vs Spy 111 * Star Fleet 1 v2.1 * Tales of Fantasy: The Dark Tower and Frog & The Fables 

* Tapper * Troll Courseware: Maps & Globes - Latitude & Longitude * Type! « Ultima V * Wagons West A Zorro 



= Sofikey: ■ Clipper IDoubleDOS vl.O ILoadCalc v4.13 BMind Prober 



RATE 
^/ o Postage 

PAID 

Tacoma, WA 
Permil No 269 



You have a 

LEGAL RIGHT 

to an unlocked 
backup copy 

of your 

commercial 

softiMfare 



Our editorial policy is that we do NOT condone 
software piracy, but we do believe that users are entitled 
to backup commercial disks they have purchased. 

In addition to the security of a backup disk, the removal 
of copy-protection gives the user the option of modifying 
programs to meet his or her needs. 

Furthermore, the copyright laws guarantee your right 
to such a DEPROTECTED backup copy: 



..."It is not an infringement for the owner of a copy of 
a computer program to make or authorize the making of 
another copy or adaptation of that computer program 
provided: 

1) that such a new copy or adaptation is created as an 
essential step in the utilization of the computer program in 
conjunction with a machine and that it is used in no other 
manner, or 

2) that such new copy or adaptation is for archival 
purposes only and that all archival copies are destroyed in 
the event that continued possession of the computer program 
should cease to be rightful. 

Any exact copies prepared in accordance with the 
provisions of this section may be leased, sold, or otherwise 
transferred, along with the copy from which such copies 
were prepared, only as part of the lease, sale, or other 
transfer of all rights in the program. Adaptations so prepared 
may be transferred only with the authorization of the 
copyright owner." 



United States Code title 17, §117 



COMPUTIST 



Editor: Charles R. Haight 

Circulation: Karen Fitzpatricic 

Advertising, caU: (206) 474-5750 
Publislier: SoftKey Publisliing 

Printing: Vaico Grapliics & Printing 



• Address all advertising inquiries to: 
COMPUTIST; Advertising Department; PO 
Box ll08l6;Tacoma, WA984II 

• Mail all RDEX letters to: 

COMPUTIST 

Apple-RDEX or IBM-RDEX 

POBox II0846-K 

Tacoma, WA 984 1 1 

• COMPUTIST does NOT purchase editorial 
material. The entire editorial content consists 
of information submitted to COMPUTIST for 
publication in the shared interests of all 
COMPUTISTs. 

• Unsolicited material (manuscripts, letters 
to the editor, softkeys, A.P.T.s, playing tips, 
questions, etc.) are assumed to be submitted 
as letters-to-the-RDEX-editor for publication 
with all and exclusive rights belonging to 
COMPUTIST. 

• Entire contents copyright 1 988 by SoftKey 
Publishing. All rights reserved. Copying done 
for other than personal or internal reference 
(without express written permission from the 
publisher) is prohibited. 

• The volunteer and paid editorial staff 
assume no liability or responsibility for the 
products advertised in the magazine. Any 
opinions expressed by the authors are not 
necessarily those of COMPUTIST magazine, 
its staff or SoftKey Publishing. 

• Apple® is a trademark of Apple 
Computers. IBM® is the IBM trademark. 

SUBSCRIPTIONS: Rates (for 1 2 issues): 
U.S.-$32 U.S. lstClass-$45 

Canada/Mex.-$45 Other Foreign— $75 

• Send subscription inquiries to: 
COMPUTIST; Subscription Department; PO 
Box 1 10846-T; Tacoma, WA 984 1 1 

• For Domestic Dealer rates: Call (206) 
474-5750 for more information. 

• Cliange Of Address: Please allow 4 
weeks for change of address to take effect. 
On postal form 3576 supply your new 
address and your most recent address label. 

• Issues missed due to non-receipt of change 
of address may be acquired at the regular 
back issue rate. 



COMPUTIST #60 



October 



Attention Apple-users: 
Why type those 
l-o-n-g listings when 
you can just Upgrade 
your present sub. to a 
Mag/5V4"Disk Combo 
subscription 

■ You may upgrade your current 
subscription to a magazine & disk 
combination by sending $5.50 ($6.50 
foreign) per remaining issue. 

Time to renew? 

■ Check your mailing label to see if you 
need to renew your subscription. 

D Use the order form on this page to 
renew, and don't forget to send your most 
current mailing label to help expedite your 
renewal 

Moving soon? 

■ If you're moving, let us know at least 30 
days in advance. 

■ Issues missed due to non-reciept of 
Change-of-Address may be acquired at the 
regular back issue rates. 

■ Remember, the Post Office does not 
forward third class rnail unless requested. 
COMPUTIST is not responsible for 
replacing issues lost while forwarding order 
is in effect. 






Yes, I want to subscribe to COMPUTIST. Enclosed are funds for an annual (12 issue) subscription. 



I am... D A new subscriber 

n Renewing my current subscription 

D Changing my address (please Include last mail label) 

I have..n an Apple He. Ilgs or lie computer 

D an IBM computer 

Apple— IBM subscription... 
D U.S. - $32 

D U.S./Canada/MexIco First Class - $45 
n All other Foreign - $75 

Apple mag-disk combination subscription... 
D U.S./Canada/Mexico First Class plus Library Disk • $100 
n All other Foreign plus Library Disk $ 1 40 

U.S. Funds drawn on U.S. bank. Allow 4—8 weeks for first issue. 



Name, 



_ID#. 



Address 



City 



State 



Zip 



Country. 



Signature 



_Phone_ 



Exp. 



CP60 



Mail to; COMPUTIST PO Box I 10846-T Tacoma, WA 984 II (206)474-5750 



October 



COMPUTIST ^0 



-JEElKMSr-SSA, 



^ftr'Ai^Jfi „-':S, 









IBM 



Jim Bancroft 31 

Mark Batchelor 24 

John Bishop 23 

Ken Bumell 8 

Eric Delbridge 8 

Paul P. Dillon 35 

Ron DIppold 21 . 

Doodlebug 7 

Andrew Grogan 7 

Dan Halfwit 36 

Brian Hatch 8 

Rosalie Beals Huntley 8 

Jeff Hurlburt 27 

Bill Jetzer 10 

The Pirate King 26 

Ryan Lanctot 31 

Stephen Lau 9, 1 7 

Mike Maginnis 7 

M.M. McFadden 14 

Blaine C. Miskell 31 

Nathan Mourfield 7 

Jack R. Nissel 21,34 

Michael J. Paris 29 

David L. Perez 23 

Stanley Planton 32 

Dr. George Sabeh 8 

Scott M. Simon 22 

Michael Smith 16 

Swampfox 24 

Edward Teach 17 

Gary Verbuch 33 

Bill Wilson 25 

Alan Zimbard, M.D 16 

18MISM1BMIBMI3ML.:;. .?- '• ■ •. 

David Kazuba 44 



I First the bad news 

I just recieved issue #8 of Apple Assembly Line. On the first page is a notice that it will be 
the last issue I receive. No, my subscription hasn't run out. It's the last issue that anyone will 
receive. Apple Assemble Line is no more. It's income has fallen to the point where Bob Sander- 
Cederlof can't continue to publish. He is going to work for Applied Engineering. 

I'm sorry to see AAL go, but I understand about the drop in income. We've been hit just 
as hard. With us, it's an especially funny joke. (Black humor.) I've talked on the phone and answered 
letters from people who are non-subscribers. I've asked them why they haven't subscribed. The 
usual answer is that they haven't gotten around to it. (Huh!) I've also been told, by numerous 
people, of wholesale copying of COMPUTIST by clubs or other groups. So here's the joke; if 
COMPUTIST goes the same way as AAL due to lack of income caused by non-subscribing readers 
and excessive zerox copies. Well, maybe it's not fiinny to you but the software companies would 
split a gut. 

I For Toddlers 

Kathleen Herrman (Computing for 1-3 year olds, COMPUTIST #58) wrote to let us know 
that the program she refers to in her article is available for $10 from; Peter Vasilev, 370 Calle 
La Montana, Moraga, CA 94556. Those of you with toddlers who have outgrown the "carpet 
commando/sticky-fingered curtain climber" phase may want to give this some serious consideration. 

I Rumors 

I'm interested in starting a rumors & propaganda page. I know that the RDEX open format 
allows you to write anything you want but I thought it would be neat to sift out the rumors and 
such and put them all in one place. With all the people who read COMPUTIST (including those 
who don't subscribe), we should be able to come up with some interesting tid-bits. It should make 
good reading and may even generate some controversy. So, if you hear something or read something 
or even know something, send us a postcard with all the details. You don't have to sign the postcard 
but do send it. 

I Ultima V and Bard's Tale III 

We've gotten a lot more input on these two adventures. I'm going to have to bend a rule that 
already has a number of kinks in it. I try to limit my editorial meddling in RDEX to some occasional 
help with spelling or grammar. But with the number of near indentical letters that I've recently 
received, I'm going to have to get out my razor and do some hacking and chopping. I apologize 
in advance for any hurt feelings but I'm going to combine the letters about Ultima V into one 
and the letters about Bard's Tale into another. I think it's better to have all the pertinent data in 
one place. It's certainly more useful. I'm ignoring the comment from the volunteer editor on the 
comer workstation (who shall remain nameless for his own protection) to the effect that I should 
spread the data thoughout the issue and make it hard on the non-subscribers who just make copies. 
Because of the necessary editing, you won't see the combined tables and charts until the next issue. 

I Format errors 

I apologize for the great number of text and other strange format errors in COMPUTIST #59. 
(The key icon with the dash at the bottom of the first column on page 33 is the strangest.) Eight 
corrected pages somehow didn't make it into the final layout. My fault for trying to do everything 
myself. (Where were the rest of you when that issue was being finalized?) Also, the authors list 
should have included four more names; Don Westcott, Bob Igo, Brian Hatch and Richard (Gramps) 
Pirong. I guess I answered my own editorial question from COMPUTIST #59. 

I Etc... 

Mike stopped by and updated our COMPUTIST Shopper Ad. Lots of new stuff. Check it out. 



COMPUTIST #56, page 19. Softkey for Railroad Works - In step 6, C600G should be 

removed. 

COMPUTIST #56, page 20. The controller for Pitfall H - Add this line: 1005 POKE 47426 , 24 

COMPUTIST #56, page 25. Super Sunday Football General Manager - In step 6 the the BSAVE 

should be BSAVE RWTS.SUPER SUNDAY GEN MANAGER, A$1900,L$800. 

COMPUTIST #58, page 13. Infocom Decoder Revisited. See Ryan Lanctot, page 31. 



■imv<im^m'ii- u-^m 



COMPUTIST #60 



October 



Table Of Contents 



October 



1988 



Ace Programmer 22 

Aesop 's Fables (GS) 22 

Apple GEOSv2.0 26 

Artie Antics 22 

Creating the Constitution 34 

Crossword Magic 4.0 7 

Death Sword 13,31 

Dome Bookkeeping 34 

Essential Data Duplicator III 

(FDD 3) 12 

Garfield Deluxe Edition 33 

Gauntlet Ilgs 9 

J <fe 5 Gradebook 24 

Kings Quest Ilgs 9 

Kings Quest I (GS) 22 

Lazer Maze 21 

Leisure Suit Larry 8,9 

Magical Myths 19 

Mastertype v2.1 17 

Mavis Beacon Teaches 

Typing 18 

Mind Prober/Mind over 

Minors 23 

NATO Commander vl.2 25 

Paperboy 18 

Pegasus 34 

Pinball Construction Set 7 

Pool 1.5 35 

RAD Warrior 23 

Railroad Works 21 

Road Rally USA 34 

Robomath 22 

Science Tool Kit 31 

Search and Rescue 34 

Showoff 9 

Social Studies Vol 1 34 

Social Studies Vol 2 34 

Solo Flight 36 

Space Quest 9 

Springboard Publisher 10 

Spy vs Spy III 22 

Star Fleet I v2.1 37 

Tales of Fantasy: 

The Dark Tower 

Frog & The Fables 22 

Tapper 16 

October 



Troll Courseware: 

Maps & Globes 

Latitude & Longitude 36 

Type! 22 

Ultima V 20 

Wagons West 23 

Zorro 18 

Kid Niki Radical Ninja 35 

Lode Runner 8 

Space Quest He 8 

Thexder 18 

2400 A.D 7 

Captain Goodnight 31 

Space Quest lie 8 



Defending the Crown with "Visit 

Monitor" 

Formatting extra tracks 34 

Merging controllers 

with Super lOB 36 

More on Tower of Myraglen 19 

Needs help with Alien Mind 18 

Needs help with 

Crossword Magic 4.0 17 

Some notes on Electronic Arts. . . 19 

Some notes on Epyx 20 

Tips for cracking 

Ilgs 3y2" disks 10 

ii a a VOTE!!! 1^ A ir 29 



I 6M So^ik^d: 

Clipper 44 

DoubleDOS vl.0 44 

LoadCak v4.13 44 

Mind Prober 45 



Editorial 4 

Bugs 4 

Most Wanted Softkeys. 37 



Reading from Protected Disks 11 

Here's what all those pokes and patches to ignore headers, trailers and checksums are, and 
some neat charts showing where they are. 



EDASM Transfer Utility 

A quick and easy way to move EDASM into the /RAM disk. 



14 



Amper QuickDraw II Routines 15 

Add super-hires graphics capability to Applesoft with these ampersand commands. 



Slow Speeds for Arcade Games. . . 

Slow those hyperspeed arcade games so your toddler can play too. 

A Patch for Copy II Plus 

Makes it a little easier to initialize more than one disk. 



23 



24 



27 



The Product Monitor. 

More notes from our master wordsmith. 



Low Cost Alternate Languages 29 

How to try your hand at programming in some other languages without going broke. 



Another method for... 

Copy-Protecting DOS 3.3. 



Change Appleworks Cursor... 

From blinking underline to blinking apple in one quick patch. 



32 
35 



COMPUTIST #60 



New COMPUTIST readers using Apple lis 
are advised to read this page carefully to avoid 
frustration when attempting to follow a soflkey 
or entering the programs printed in this issue. 

What is a softkey, anyway? 

Softkey is a term which we coined to describe 
a procedure that removes, or at least 
circumvents, any copy-protection on a 
particular disk. Once a softkey procedure has 
been performed, the resulting backup copy can 
usually be copied by the normal copy programs 
(for example: COPYA, on the DOS 3.3 System 
Master disk). 

Commands and control keys 

Commands which a reader is required to 
perform are set apart b y being in boldface and 
on a separate line. The IhetohnI key must be 
pressed at the end of every such command 
unless otherwise specified. Control characters 
are speciaUy boxed. An example of both is: 

g lBPl 

Press |T]. Next, place one finger on the (^3 
key and th en press [p]. Don't forget to press 

iBBTOHHl . 

Other sp ecial combination keypresses include 
ISRKSKTI or KSBHKSKTi . In the former , 
press and hold down (^E) then press iRESETl . 
In t he lat ter, press a nd hold down both (=3 
and I ci I then press IhksktI . 

Softwara recommendations 

The Starter Kit contains most of the programs 
that you need to "Get started". In addition, we 
recommend that you aquire the following: 

• Applesoft program editor such as "Global 
Program Line Editor (GPLE)". 

• Assembler such as the "S-C Assembler" 
from S-C software or "Merlin/Big Mac". 

• Bit-copy program such as "Copy H Plus", 
"Locksmitii" or "Essential Data Duplicator 
(EDD)". 

• Text-editor (that produces normal sequential 
text files) such as "Applewriter H", "Magic 
Window 11" or "Screenwriter H". 

• "COPYA", "FID" and "MUFFIN" from 
the DOS 3.3 System Master disk are also 
useful. 

Super lOB and Controllers 

This powerful deprotection utility (in the 
COMPUTIST Starter Kit) and its various 
Controllers are used in many softkeys. (It is also 
on each Super lOB Collection disk.) 



Reset into the Monitor 

Softkeys occasionally require the user to stop 
the execution of a copy-protected program and 
directly enter the Apple's system monitor. 
Check the following list to see what hardware 
you wiU need to obtain this ability. 

Apple II + , //e, compatibles: 1) Place an 
Integer BASIC ROM card in one of the Apple 
slots. 2) Use a non-maskable interrupt (NMI) 
card such as Replay or Wildcard. 

Apple II + , compatibles: 1) Install an F8 
ROM with a modified reset-vector on the 
computer's motherboard as detailed in the 
"Modified ROM's" article (COMPUTIST #6 
or Book Of Softkeys III ) or the "Dual 
ROM's" article (COMPUTIST #19), 

Apple lie, lie: Install a modified CD ROM 
on the computer's motherboard. Cutting Edge 
Ent. (Box 43234 Ren Cen Station-HC; Detroit, 
MI 48243) sells a hardware device that will give 
you this important ability but it will void an 
Apple //c warranty. 

Apple //gs: If you have the 2.x ROM, there 
is a hidden classic desk accessory (CDA) that 
allows you to enter the monitor. In order to 
install the new CDA, you should enter the 
monitor before running any p rotected p rograms 
(CALL -151) and press "# IretuhmI ". This 
win turn on two hidden CDAs, Mem ory Peeker 
and Visit Monitor. Thereafter press Ids ESC } 
to go to the Desk Accessories menu. Select 
"Visit Monitor" and there you are. Use |BY| 
to exit. 

Recommended literature: 

• Apple II Reference Manual 

• DOS 3.3 manual 

• Beneath Apple DOS & Beneath Apple 
ProDOS, by Don Worth and Pieter 
Lechner, from Quality Software 

Keying in Applesoft programs: 

BASIC programs are printed in a format that 
is designed to minimize errors for readers who 
key in these programs. If you type: 

10H0ME:REMCLEAR SCREEN 

The LIST will look like: 

10 HOME : REM CLEAR SCREEN 

...because Applesoft inserts spaces into a 
program listing before and after every command 
word or mathematical operator. These spaces 
don't pose a problem except when they are 
inside of quotes or after a DATA command. 
There are two types of spaces: those that have 
to be keyed and those that don't. Spaces that 



must be typed appear in COMPUTIST as delta 
characters C). All other spaces are there for 
easier reading. NOTE: If you want your 
checksums (See Computing checksums) to 
match up, only type spaces within quotes or 
after DATA statements if they are shown as 
delta C) charactors. 

Keying In Hezdumps 

Machine language programs are printed in 
COMPUTIST as hexdumps, sometimes also as 
source code. Hexdumps are the shortest and 
easiest format to type in. You must first enter 
the monitor: 
CAU -151 

Key in the hexdump exactly as it appears in 
the magazine, ignoring the four-digit checksum 
($ and four digits) at the end of each line. When 
finished, return to BASIC with: 

3D0G 

BSAVE the program with the filename, 
address and length parameters given in the 
article. 

The source code is printed to help explain a 
program's operation. To enter it, you need an 
"Assembler". Most of the source code is in 
S-C Assembler format. If you use a different 
assembler, you will have to translate pieces of 
the source code into something your assembler 
will understand. 

Computing checksums 

Checksums are 4-digit hexadecimal numbers 
which tell if you typed a program correctly. 
There are two types of checksums: one created 
by the CHECKBIN program (for machine 
language programs) and the other created by 
the CHECKSOFT program (for BASIC 
programs). Both are on the "Starter Kit". 

If your checksums do not match the published 
checksums then the line where the first 
checksum differs is incorrect. 

CHECKSOFT instructions: Install Checksoft 
(BRUN CHECKSOFT) then LOAD your 
program. Press I h I to get the checksums. 
Correct the program line where the checksums 
differ. 

CHECKBIN instructions: Enter the monitor 
(CALL -151), install Checkbin at some out of 
the way place (BRUN CHECKBIN, A$6000), 
and then LOAD your program. Get the 
checksums by typing the Starting address, a 
period and fe e En ding address of the file 
followed by a I BY I . 
SSSS.EEEE 



Correct the lines at which the checksums 
differ RDEXed 



6 



COMPUTIST #60 



October 



when 
writing a 
letter to the... 




nveX edUoK 



RDEX stands for: 

Reader's Data Exchange 

That means that when you send in 
articles, softkeys, APTs, etc., you are 
submitting them for FREE publication in 
this magazine. RDEX does NOT 
purchase submissions nor do we verify 
data submitted by readers. We print 
what you write. If you discover any 
errors, please let us know. 

• Remember that your letters or parts 
of them may be used in RDEX even if 
not addressed to the RDEX editor. 
Correspondence that gets published may 
be edited for clarity, grammar and space 
requirements . 

• Because of the great number of letters 
we receive and the ephemeral and 
unpredictable appearance of our part- 
time staff, any response to your queries 
will appear only in RDEX, so it would 
be more appropriate for you to present 
technical questions to the readers and ask 
for their responses which will then be 
placed in the Apple-RDEX. 

• Whenever possible, send your articles 
and letters on disk as standard text files. 
When we get your letter-article in a text 
file, it is immediately uploaded into the 
most current RDEX file. We will return 
your disks, whenever possible, with the 
current library disk copied onto it. 
Conventional letters must be typed in by 
us... when we have the time. 

• When you send your material on disk, 
try to use a disk formatted for Apple 
DOS 3.3. It makes things a lot easier for 
us . 

• Address your letters, articles, to: 

COMPUTIST 

RDEX Editor 

PO Box 110846-K 

Tacoma, WA 98411 



Doodlebug 



I 3 I Make the following sector edits to the 
copy you just made. 



f Softkey for... 



Crossword Magic 4.0 

Mindscape 



Use the Sword of Kadash controller from 
COMPUTIST #27. When the controller asks 
which side, use (B) BACK. The controller is 
also on the Super lOB Collection, Volume 2. 



Nathan Mourfield 



I have some information for you. I loved 
Danny PoUak's character editor. Then I found 
that the character editor was on the Britannia 
disk. That was all right except it didn't work. 
Most of his adventure tips didn't work for me 
either. Except for that, I'm fine with Danny. 

The word of passage is VERAMOCOR, I 
think. Also, you can see additional clues in the 
program, like the 13 question of the code. 

If anyone with an Apple needs help on 
Ultima I-IV, just write. 



Andrew Grogan 



I have made my very first crack which was 
actually easier than I thought. I would like to 
share my joy because I am very pleased with 
your magazine. It is now my turn to pay back 
all of the other RDEX contributors out there. 
This worked for me. 

Softkey for... 



Pinball Construction Set 

Electronic Arts 



■ Requirements 

n Blank Disk 
D Sector Editor 
D COPYA 



I 1 I Boot your DOS 3.3 System Disk 

I 2 I Tell DOS to ignore checksum and 
epilog errors and run COPYA 

POKE 47426,24 
RUNCOPTA 



Trk Set Byte(s) From 



To 



$03 $06 $4A-4C ?. 



EAEAEA 



The title screen of this program is on tracks 
$04, $05 and can be loaded using Keith 
Parker's Picture Loader (COMPUTIST #54) in 
the forward mode. 

<2) Does anyone have a crack for 
Lode Runner and Championship Lode Runner. 
Also, why doesn't turning off the checksum and 
epilog errors not work? 



Mike Maginnis 



Playing lips for... 



2400 A.D. 

Origin 



• Confiscated equipment is stored in the only 
open box in the storeroom at the Social Rehab 
Center. 

• Buy at least three items from Wes and say 
bye. Talk to him again and you'll get the broken 
plasma rifle. 

• Hugo will fix the plasma rifle. 

• The passcard number for the blueprints room 
is: 6435. 

• Les will build the field disperser. 

• The door to get the Transporter Guidance 
Device is off the railroad tracks of the South 
Station. The passcard number to get through 
the door is: 569 A. 

• To get through the protector robots to get the 
guidance device, use a Direct Override on them. 

• LETSGO 

• From the back of the City dump on the path: 
2N, IE, IN, 2E, IN, 3E, 3S, IE, 3S, 3W, 3S, 
IE, 2S, 2E, 2S, 5W, 2N, 3W, 2N, 4W, IN, 
5W, IN, 2W, 2S, 3W, 2N, 3W, 3S, 5W, 2S, 
IE, 2S, 4E, 2S, IW, 6S, 2W, 2N, 2W, 2N, 
4W, 2N, 6E, 2S. 

• 07, 18, 09, 12, 15 

• Lower, lower, lower, upper, lower 

• PERABR, EDDONE, CHLOBU (not 
necessarily in that order) 

• The Guidance Device is on the south counter 
of the third room. 

• Maze to IQ & energy boosts: take the comer 
doors until you get to the room with 2 comer 
doors— one leads to the IQ boost, the other leads 
to energy. REMEMBER the way back. 



October 



COMPUTIST #60 



Rosalie Beals Huntley 



I use Copy n Plus v8. 1 and an EDD 4 Plus 
card and backup 70% of my software. I need 
to know how to backup the other 30 % . I have 
no programming knowledge so I really need 
step by step help at the start. Any suggestions 
would be useful. 

C2) I have a few questions: (sorry if 
they seem dumb) 

1. Should I use a ProDOS manual instead of 
a DOS 3.3? I don't use DOS 3.3 software. 

2. Would Beneath Apple ProDOS be better than 

DOS? 

3. Is Multiscribe GS or Appleworks 2.0 a text 

editor? 

4. Is the GS Utility with fast copy ok or do I 
need COPY A? 

5. With EDD and Copy 11, I can change 
parameters and do a disk scan, do I still need 
a sector-editor, disk-search utility and 
assembler? 

6. How do I back up a 3.5 disk for my GS that 

is protected by the "key disk" system? Do 
any of your back issues address this? 

Thank you for your help. I am sure once 
I get started I will enjoy your magazine and all 
it has to offer. 



i 



IS2. Ves, learn how to use ProDOS. When 
you are familiar with ProDOS then DOS 3.3 will 
be easy. 

3. Yes, and much more besides. 

4. It is better to stick with the exact program calls 
in a softkey procedure. Sometimes another copy 
program may be used but usually the procedure 
will tell you that also. (IE. Use COPYA or any whole 
disk copier.) 

5. Copy II Plus comes with a sector editor and disk 
scanner (Read the documentation.) An assembler 
is only necessary if you want to assemble your own 
source code as would occur if you wanted to make 
your own changes. We always print the hex code 
to simplify entry of binary programs. 

6. Key disk protection must be removed on a 
program by program basis, although sometimes 
a procedure for one program will work on other 
programs by the same company. Write to RDEX 
with the name (^thepn^ram that is troubling you. 
If we don't have a softkey, we'll put it on the Most 
Wanted list. RDEXed 



Ken Burnell 



Since I'm writing a letter anyway, I would 
like to say that I like the "new" format with 
lots of softkeys and, especially, the new covers. 
I never did like those [expensive] flashy covers 
that you went to back in'83. I support your 
adding IBM RDEX's, I think it's a good 



survival idea. And, if you have to cut some 
more like down to six issues a year, I'd support 
that too. Anything to keep COMPUTIST alive. 

By the way, since I have mostly old games 
(own four Apple II's - no Ilgs yet) and am not 
into Adventure games, I have to admit that your 
API's are just about the most interesting diing 
in the magazine to me these days. I would like 
to see more of them. I particularly appreciated 
the one for Marble Madness. How about an 
APT for the Amiga version of Marble 
Madness? Now that we know how to get into 
the Water Maze, how in heck do you cross it? 

Keep on publishing. 



Eric Delbridge 



A.P.T.for.. 



Space Quest He 

Sierra On Line 



Mathew and John Paul Ownby's Space 
Quest ngs APT in COMPUTIST #53 for 
editing your buckazoids did not work on my 
Apple lie version, obviously. To change your 
buckazoids to 255 on the lie version, simply 
save a game in the 'a' position on your save 
game disk. Save the game after you have the 
thirty buckazoids from selling the skimmer. 
Then take out a sector editor and read track 
$00, sector $03, byte $06. Change the byte 
to $FF and write the sector back to disk. Here 
are some more playing tips if you are stuck after 
changing into a Sarien (these work with Ilgs and 
lie versions.) 

1) Instead of getting into the trunk, you can 
move the trunk, take jetpack off, open trunk, 
put jetpack in trunk, close trunk, get on the 
trunk, and open the vent. Then enter vent and 
go up the tube on the ladder. Kick the stuck vent 
and remove it; you wiU be in the laundry room. 

2) Once you've become a Sarien, exit the 
laundry and take the elevator on the left. 

3) Once out of the elevator, go left until 
you see an up elevator. Get in. Get off on the 
upper level. Go right until you get to the armoiy 
where the droid is. Show him your ID Card, 
and while he is getting your pulseray, take one 
of the gas grenades, then take your pulseray. 

4) Go left one screen. Get direcdy over the 
Sarien Guard. Drop grenade. He will be 
knocked out! 

5) Backtrack to the star generator. Search 
guard. Take remote. Press button. Walk up to 
the generator. Look at panel. Move the arrow 
to the numbers '6858'. Move the arrow to enter. 
Leave the room. If the security droid is in the 
next room, you cannot kill it. Go right to the 
generator room, then go back. He will not be 
there. If you encounter another Sarien, shoot 
him as soon as he appears or he will fry you. 
Get on the down elevator. Take the elevator to 



the right. Enter the pod. Press launch. That's it! 

<2> HELP! Does anyone know how to 
get a cab in Infocom's Sherlock Holmes 
mystery, the Riddle of the Crown Jewels? 

(^ Does any reader know how to edit 
number of planes and bombs, etc. on 
Broderbund's Wings of Fury? 



Dr. George Sabeli 



I recently purchased Sierra On-Line's new 
issue of Leisure Suit Larry for Apple n series 
computers. I looked through the back issues of 
COMPUTIST for a softkey. I could only find 
one for the Apple Ilgs. This led me to review 
the back issues for other software by Sierra. The 
softkey by Jean-Micheal Georges in 
COMPUTIST #30 contained the information 
I needed to deprotect the program. Now in 
cookbook fashion here is the softkey. 

softkey for... 



Leisure Suit Larry 

Sierra On-Line 



■ Requirements 

D COPYA 

D Sector Editor with search 

D Five blank disk sides 



I 1 I Copy an five sides using any fast copy 
program such as COPYA, Locksmith fast copy 
etc. 



2 I Search for the sequence 20 00 FF (JSR 



SFFOO). I found this on track $02, sector $08, 
starting at byte $OD. You need to search the 
Boot side only. Change this sequence to EAEA 
EA. This should give a COPYA unprotected copy 
of the game. Now you can enjoy the program 
without fear of crashing. 

I hope this information wiU be of some 
assistance to your readers. Keep up the good 
work and consider me a permanent subscriber 
to an excellent magazine. 



Brian Hatch 



Warning: The following APT's will only 
work on a cracked copy of Lode Runner. 

While making my own boards for Lode 
Runner, I often wish to borrow a board from 
the original, modify it, and save it on my data 
disk. But Lode Runner responds with "USER 
NOT ALLOWED TO MANIPULATE 
MASTER DISKETTE". If you search the disk 
for CC CF C4 C5 A0 D2 D5 CE CE C5 D2 FF (Which 
spells "LODE RUNNER" with a delete after 
it) and change the FF to 00 it will fix that 
problem. 



8 



COMPUTIST #60 



October 



I found it at track $0C, sector $0F. 

Trk Set Byte(s) From To 

$0C $0F $FF FF 00 ~ 

This sector also contains the Hi-Score 
board. Each name takes up 8 bytes. For 
example, if the Hi-Score was by BOO, who 
reached level 10 with a score of 00053545, 
the first eight bytes of the sector would read 
C2 CF CF 0A 00 05 35 45. The first three bytes are 
the name, the next is the level in hex, and the 
last four contain the score. To change the name 
to BRI on level 79, score of 99999999, enter 
C2 D2 C9 4F 99 99 99 99 at byte $00 of the sector. 



Stephen Lau 



A couple of Ilgs programs just came out, 
and it's time to get "cracking" again. I'll try 
to show how I find the protection, so that 
novices to Ilgs cracking can crack some of their 
own programs in the future. Again credit should 
be given to my friend, Danny, for his 
assistance. 

*IIgs Softkey for... 



Showoff 

Broderbund Software 



■ Requirements 

D Apple ngs with 512K 

n Sector Editor (such as Copy H Plus) 

Showoff is another winner from 
Broderbund Software. Anyone can easily make 
a slide show within minutes. I recommmend this 
program to any Ilgs user. 

A fast copy yields no errors at all, but the 
program instructs you to insert the program disk 
just before it starts. Um . . . sounds like a nibble 
count again. Since many Ilgs programs use the 
same nibble count protection, and on the same 
track (20 and 21), I try auto nibble count on 
track $20 and $21 with Copy n Plus and it 
works. As pointed out by Brain Troha in 
COMPUTIST #54, the protection code is 
similar for any software that counts track $20 
and $21 (the guy who developed it must have 
sold it to several companies). So I tried 
searching for A2 20 A0 01 and came across it on 
block $17C. 

69 LDA #$0000 
6C STA $001E1A 

70 PHP 

71 SEP #00110000 

73 LDX #$20 track and 

75 LDY #$01 side to count 

77 JSR $0057 count nibbles 

7A BCS $1091 carry set = bad sectors 

7C JSR $0076 check the no. of nibbles 





BCS $1091 


branch any error to $91 


P^r¥^*l**ll"Hr f^^ 


7F 


right before hearing the sync check. I then 


81 


LDX #$21 


track and 


searched through the memory for any jumps to 


83 


LDY #$01 


side to count 


$9000 (the start of level 8) and came across 


8b 


JSR $0057 


count nibbles 


one at $8799. 


88 


BCS $1091 


carry set = bad sectors 




8A 


JSR $0092 


check the no. of nibbles 


$8799 JSL $009000 check sync 


8D 


BCS $1091 


branch any error to $91 


$879D CMP #$0002 2 = not original 


81- 


PLP 




Wf^e BEO $87A5 


90 


RTS 


return to caller 


$87A5 JMP $80D5 continues execution 


91 




routine to tell user to 


$87A7 hangs up 



insert program disk 

Pretty simple? Since this routine remms to 
the caller after a succesfiil check, we can simple 
put a RTS at byte $70 and bypass the whole 
protection scheme. And that's it! The program 
now works like a charm. 

Make the following sector edits: 



Block Byte(s) From 



To 



$17C $70 



IE2 30A2 20 60E2 30A2 20 



*IIgs Softkey for.. 



Gauntlet Ilgs 

Mindscape, Inc. 



■ Requirements 

a Apple ngs with 256K 
D Joystick recommended 

Yes, Gaundet, as seen in the arcade, is now 
on the ngs. But don't hold your breath. If you 
think that it will be as good as the arcade, since 
it's a Ilgs specific version, don't buy it. The 
graphics of the title screen and the menu is 
great, but when you play, uh... 

I don't know how the folks at Mindscape 
could come up with such a thing for the Ilgs. 
The Atari ST version (for those who don't 
know. Atari ST has only a 512 color palette as 
opposed to Ilgs 4096) is so beautiful on the 
back of the Ilgs package that it convinced me 
to buy it. I was deeply disappointed with the 
graphics quality. 

Well, enough complaints. When I set out 
to deprotect it, I only got an error on block $07. 
When I tried to bit copy it, the program would 
boot a litde fiirther, and then hang up again. 
It couldn't be a nibble count. Frustrated, I took 
a peek at the catalog of the disk and noticed a 
file called LEVEL 8. Strange, why is there no 
LEVEL 1 or 2 or 7, but only LEVEL 8? I 
BLOADed the file and scaimed through it. I 
came across some routines that looked like a 
synchronize protection. Sure enough, I booted 
the original and there is a quick movement of 
track head before it runs. They are coming out 
with synchronize protection for the Ilgs! 

I tried copying it with Copy II Plus with 
sync option, wasted an hour, and it still would 
not boot. This time I placed a BRK right at the 
start of LEVEL 8 and the program bombed 



So I tried replacing it with LDA $009000 
and BRA $87 A5, and it worked! Later, I 
examined how it checks the disk. It seeks to 
track $00, reads the bad block, and then 
immediately seeks to the next track and reads 
the sector that it first came across. If it is not 
the same sector to be read, it proves that it is 
not the original disk. Otherwise, it continues 
to check the next track. This protection is rather 
sophisticated. I wonder why they didn't invest 
as much on making the program as they did on 
protection. They could have come out with a 
program as good as the one on the Atari ST. 

Make the following sector edits: 



Block Byte(s) From 



To 



$17C $199 22 00 90 00 C9 AF 00 90 00 80 
02 03 



*Hgs Softkey for... 



Kings Quest Ilgs 

Leisure Suit Larry 

Space Quest 

Sierra On Line, Inc. 



■ Requirements 

n Apple Hgs with 512K 
D Sector editor 

Excellence is simply the best word to 
describe Kings Quest for the Ilgs. Along with 
the traditional On Line 3-D animation and 
humors, this program has exceptional sound 
effects not found in older Sierra releases. From 
the door you open, the stone you moved, the 
goat, anything that you do has great digitized 
sound. I hope that any following Ilgs games 
would be of this quality. 

Tradition dictates Sierra protection, this one 
has a bad block on $634. 1 quickly copied both 
disks and searched for the protection code that 
Sierra has used in its earlier releases. I did the 
edit and it worked like a charm. Since many 
have already discussed Sierra protection, I will 
not explain it further. I have come up with a 
generalization on backing up any Sierra 3-D 
animated adventures. 



I t I Copy the disks and ignore any errors 
on block $634. 



October 



COMPUTIST ma 



m Search for 22 00 00 00 C9 01 00 F0 04 22 
00 00 00 22 00 00 00 AE 00 00 and change the last 
22 00 00 00 (before AE 00 00) to AF 00 00 00. 1 found 
it on mine at: 



Block Byte(s) From 



To 



$A0 $BB 



22 



AF 



I have tried this procedure on Leisure Suit 
Larry, Space Quest, and Kings Quest. So far 
they have all worked. It may work with further 
Sierra releases. 

A quick note. I have just acquired Police 
Quest and was surprised that it has no 
protection. Is Sierra dropping protection on all 
their further releases? 



Softkey for... 



Spimgboard Publisher 

springboard. Inc. 



■ Requirements 

D Apple Ilgs, ne, lie 
D 128K minimum 
D RAM disk recommended 
D Unidisk (for 3V4" version) 

This program is really high quality. 
Springboard Publisher does most things that 
Pagemaker does on a Mac. Though the program 
is quite slow, it is acceptable on a Ilgs with a 
large ram disk, and the company promises to 
release version 1 . 1 later with faster speed (free 
to owners of 1.0) and later a Ilgs specific 
version. The program comes with free artwork, 
too. 

A quick inspection reveals a bad block on 
$63F and can easily be copied by Copy n Plus. 
It doesn't work with Diversi Cache, which has 
to be turned off during the protection check. 
The program, like other Ilgs programs, takes 
a long time to load, and it's even longer if you 
use the ram disk since it copies the program 
onto it. That is where Diversi Cache came in 
handy which sped up disk loading as much as 
3 to 1 with a S12K cache (I think it belongs to 
every Ilgs users library). So I set out to 
deprotect it and make it conq>atible with Diversi 
Cache. 

Since the disk is supplied on a ProDOS 8 
disk, the bad block could and should be checked 
through the ProDOS 8 MLI subroutine, which 
is 20 00 BF. The command forablockread is 8(9. 
So I broke into the monitor with Diversi Cache 
when it told me to insert the original disk, and 
searched for 20 00 BF 80. Bingo, I found it at 
$7778. Searching for the call to this routine 
reveals the following. 

76E9 JSR $77EF setupprefixs 

76EC BCS $7726 and other routines 

76EE JSR $772E 

76F1 BCS $7726 



76F3 LDX #$96 


restore narker to 96 


76F5 JSR $778B 




76F8 BCS $7726 




76FA LDX #$06 


block $63E 


76FC LDY #$3E 




76FE JSR $7778 read 


7701 BCS $7726 


if error tlien not original 


7703 LDX #$06 


block $63F 


7705 LDY #$3F 




7707 JSR $7778 read 


770A BCC $7726 


if no error then not original 


770C LDX #$D6 


set marker to D6 


770E JSR $778B 




7711 BCS $7726 




7713 LDX #$06 


block $63F 


7715 LDY #$3F 




7717 JSR $7778 read 


ink BCS $7726 


if error then not original 


771C LDX #$96 


restore marker 


771E JSR $778B 




7721 LDX #$00 


clear accumulator 


7723 RTS 




7726 LDX #$96 


restore marker 


7728 JSR $778B 




772B LDA #$FF 


set FF in accumulator (fail) 


772D RTS 





Since it expects a zero in accumulator on 
returning, simple enough, we can just put CLC, 
LDA #$00, RTS at the start of the routine and 
it should work. I sector edited it but it doesn't 
work! What have I missed? I entered the 
monitor again and found that the code CLC, 
LDA #$00, RTS that I had put in had been 
scrambled. Incidentally, I found that the code 
is self-relocatable (just like Ilgs programs) and 
any locations with direct memory addresses are 
changed before it is executed. Such as the first 
instruction has been changed to JSR $77EF 
instead of $8122 on disk. So, this time I put 
the patches at $76FA, since these instructions 
do not address memory directly and so will not 
be changed. And it now works! 

Make the following sector edits: 



Block Byte{s) From 



To 



$2B9 $14B A2 06AD3E 18 A9 00 60 

Tips for cracking Ilgs Z%' disks 

If you want to crack 3W disks, first try 
fast copying it. Notice any errors. Then boot 
and see what disk operating system it used 
(ProDOS 8 or 16). If it is PRODOS 16 and has 
a bad block, search for 22 A8 00 El 22, the 
command for block read through ProDOS 16. 
If it is ProDOS 8, try searching for 22 00 BF 80. 
The program might read the block through a 
direct smart pott call, but that's very unlikely. 
If you don't have any errors, this must be a 
niU>le count. (Except some EA stuff like Instant 
Music or Deluxe Paint that use bit insertion) 
Try searching for A2 20 A0 01 . Hope this helps. 

I have a very severe problem with my Ilgs. 
When I first bought it, I had the old ROM 



(version OO). Last year I bought Wordperfect, 
and it works well. In January, I received an 
update to 2.0 that used the standard Ilgs 
interface. However, it doesn't work. The 
program needs the new ROM and I promptly 
contacted my dealer, they said they don't have 
the new ROM right now, and they have to get 
it from Apple. Fine. I can wait. During this 
time, I noticed some problems using Sierra 
adventures with Diversi Cache on the old ROM, 
the program crashed when a particular sound 
is generated. Three months later, no answers. 
I call back my dealer and they say they haven't 
got it yet. It is very true what the RDEX editor 
said in COMPUTIST #54, that "Apple dealers 
are uniformly unhelpful unless you want to buy 
some software or hardware at their inflated 
price". Well, if anyone knows how to get a new 
ngs ROM without going through local dealers, 
or if I can substitute an EPROM, let me know 
through COMPUTIST. Has anyone got the 
same problem? If any more programs come out 
that do not work on the Ilgs old ROM, I wUl 
bomb my dealer. Any suggestion is greatly 
appreciated. 

<2) Lastly, so many readers are 
recommending Senior Prom that I have some 
comments. What should we Ilgs owners do? Be 
jealous of He and He owners? I urge any Ilgs 
owners to write to COMPUTIST crying for a 
ngs Senior Prom and hope that Cutting Edge 
will come out with one so that we Ilgs owners 
can also benefit fi°om it. 
Happy cracking. 



Bill Jetzer 



I have discovered a bug. The bug is either 
in the May or June issue. In the Ma y issue, the 
RDEXed told J. D. Tischer to use IcSBESC I 
when activating the 2 hidden CDA's on the 
AGS. In the June issue, Guille rmo C astano de 
la Sema says you must press iKSCi . He says 
nothing about the Open-apple key or the Ctrl 
key. 

By the way, I personally don't care if you 
include IBM or Macintosh softkey s in RDEX, 
as long as they are kept in their own section. 
I am referring specific^y to Daiyl C. Keppler's 
letter in the June issue. He says that he won't 
accept your publishing IBM material and he 
doesn't like your {wblishing Macintosh material 
either. The way I see it, it's just more for his 
money. The cost of subscription hasn't gone up, 
and there's still the same amount of Apple n 
softkeys and programs. If, in the future, he is 
asked by a business or school to deprotect IBM 
or Macintosh software, he will be glad to have 
the information readily available. 

C2) I have a He with the enhanced 
ROM and when I'm in the monitor and press 
[be! IhktomiI , I get something like this: 
M=00A=FFX=00Y=FFP=00S=FF 



10 



COaiPUTIST #60 



October 



What does the M stand for? It's not even 
mentioned in the Apple He Reference Manual, 
and changing its contents seems to have no 
effect upon anything. 



i 



The correct keys are ItfSHKSETl . As to 
the "M=00", You've got me. Anyone out 
there have any ideas? 
RDEXed 



Reading From Protected Disks 

■ Requirements 

D Super lOB 1.5 

One of the most popular techniques for 
deprotecting software is the swap controller. 
Although it can be relatively easy to use, and 
if you are a novice it might be your only 
alternative, it can be frustrating if you don't 
have a convenient way into the monitor. Also, 
the RWTS subroutines take up an additional 10 
sectors of disk space each. So I decided to find 
a better way. After disassembling DOS's 
RWTS subroutine and reviewing The DOS 
Alterer (COMPUTIST #37), I have come up 
with a series of pokes that will eliminate the 
need for most swap controllers. For E>OS 3.2 
(13-sector) disks, however, you must use a 
swap controller in order to get the copy into 
DOS 3.3 format. You can use the pokes with 
RWTS. 13 in a swap controller as shown at the 
end of the article to avoid having to capture the 
protected disk's RWTS. For a particular poke, 
refer to the tables at the end of the article. 

Ignore Address/Data Prologues 

It is possible when reading from a disk to 
ignore one or two address and/or data markers. 
This is useftil for disks whose markers differ 
from track to track. A good example of this is 
General CSiemistty #8, whose softkey appeared 
in Computist #54. The first and thiixl address 
and data markers are different on several tracks, 
requiring over thirty separate data lines in the 
controller. Instead, you could tell DOS to ignore 
die first and third address and data markers, and 
it should do just fine. 

You can safely tell DOS to ignore any one 
of the three address or data maricers, or the first 
and third, or the second and third. You may 
not ignore aU three, or the first and second. 

WARNING: It seems that DOS 3.2 is more 
picky than DOS 3.3. Apparentiy, it only works 
to ignore address and data markers 
"sometimes". Also, in the sample DOS 3.2 to 
DOS 3.3 controller, in line 1010, ST and LS 
should both be set to 12 instead of IS. 

Ignore Address or Data Checksum 

Checksums provide DOS with a way to be 



sure the data and address has been correctly 
written to or read from the disk. Protected disks 
will sometimes alter these checksums, thereby 
preventing normal DOS fxota reading the disk. 
You can, however, tell DOS to ignore the 
address or checksum or both, usually with no 
problem. You should be carefiil when ignoring 
checksums, as it may allow erroneous 
information to pass as valid data. General 
Chemistry #8 dso uses this as a form of 
protection. 

Ignore Address or Data EpUogues 

Some disks use epilogue bytes that deviate 
from the normal DE AA, as a means of 
protection. Some disks set them to a particular 
value, but some ignore them altogether. You 
can ignore either the address or data epilogues 
or both, with no harmfiil side effects. This is 
yet another one of General Chemistry #8's 
protection schemes. 

Ignore Read Errors 

This is probably the most widely used 
method of reading protected disks. By telling 
DOS to ignore any read errors it comes across, 
it will ignore bad epilogues, so you need only 
one poke instead of two. However, it will also 
ignore all other read errors. If you know there 
are bad epilogues and you use this technique, 
but the disk still can't be read, use the "Ignore 
Epilogues" pokes instead of this, and then try 
otfier pokes to counteract the other errors. 

Ignore Track 

Sometimes, a protected disk will modify the 
track values after the address markers. A good 
example of this is Lords Of Conquest. On track 
$6, the values after the address markers would 
indicate track $5. You can tell DOS to ignore 
the track value, and the track can then be read. 
In this case, the track contained no vital 
information once the disk was deprotected, but 
only made writing the controller easier. But 
there's no reason why another program 
wouldn't put usefiil code on a track such as this. 

Standard RWTS Locations 

I have included a table of standard RWTS 
locations to be used with a sector editor to make 
modifications to WORKING BIT COPIES 
ONLY. Never modify an original disk! There 
are two blanks in the tables: writing the address 
and data checksums. This process involves 
more than just one poke, and I don't know a 
lot about it. If someone reading this has any 
information, I'm sure it could be of use to 
someone. 

Example Controllers 

If you have Lords Of Conquest, type in the 
controller at the end of the article and save it. 



Install it into Super lOB 1 .5 and run it. I know 
that a softkey for Lords Of Conquest appeared 
in Computist #53, but my subscription started 
with Issue #55, so I don't know what that 
controUer looked like. I made up this one 
myself. 

Also included is a sample swap controller 
for converting a disk from DOS 3.2 to DOS 
3.3. It first loads in RWTS. 13 in line 10010. 
In line 1011 , it swaps the two RWTS routines. 
Modifications are made in line 1012, and the 
two RWTS routines are swapped back in line 
1013. At that point, the copy process continues 
normally. You could also convert all the DOS 
3.2 pokes to their relocated (start = $1900 
instead of $B800) addresses and skip lines 
1011 and 1013. 

I have talked about General Chemistry #8 
quite a bit, but I don't have it or the article 
accompanying its softkey. I got all my 
information fi'om the library disk which was 
sent to me by the good people at Computist 
because some of my softkeys appeared in that 
issue. I won't even attempt to write a new 
controller without the original disk to 
experiment with. 

Controller 

1000 REM LORDS OF CONQUEST 
1010TK=0:LT=35:ST=15:LS=15:CD=WR;FAST=1 
1020 POKE 48584,71 : GOSUB 490: GOSUB 610 
1030 PORE 48584 , 36 : GOSUB 490 : Tl = TK : TK = PEEK 
(TRK) - 1: RESTORE : GOSUB 310:TK = Tl: 
GOSUB 610: IF PEEK (TRK) = LT THEN 1050 
1040 TK = PEEK (TRK) : ST = PEEK (SCT) : GOTO 1020 
1050 HOME : PRINT "CMPY'DONE" : END 
5000 DATA 2'CHANGES 
5010 DATA 3,9,239,96 
5020 DATA 12,4,221,7 

Checksums 



- J356B 1050 - JEAFD 

1010 - $2544 5000 - $1BC6 

1020 - $BCF7 5010 - $BF6C 

1030 - $DC83 5020 - $8D69 
1040 - $A65A 



Controller 

1000 REM SAMPLE CONTROLLER, DON'T TYPE IT IN! 
1010TK=0:LT=35:ST=12:LS=12:CD=WR:FAST=1 

101 1 GOSUB 430 : REM SWAP RWTS ROUT I NES TO MAKE 
MODIFICATIONS 

1012 REM MAKE MOD I F I CAT I ONS TO RWTS . 13 HERE 

1013 GOSUB 430 : REM SWAP RWTS ROUT I NES AGA I N 
1020 GOSUB 430: GOSUB 460: GOSUB 610 

1030 GOSUB 430: GOSUB 460: GOSUB 610: IF PEEK 

(TRK) =LT THEN 1050 
1040 TK = PEEK (TRK) : ST = PEEK (SCT) : GOTO 1020 
1050 HOME : PRINT "COPY'DONE" : END 
10010 PRINT CHR$ (4) "BLOAD'RWTS,13,A$1900" 



October 



COMPUTIST #60 



11 



Reading from protected DOS 3.3 disks 

Description Hex Decimal Description 



Hex Decimal 



Address Marker #1 

Check 

Ignore 

Address Marker #2 

Check 

Ignore 

Address Marker #3 

Check 

Ignore 

Address Checksum 

Check 

Ignore 

Address Epi logues 

Check 

Ignore 

Read Error Flag 

Check 

Ignore 



$B957 
F0 
00 

$B961 
F2 
00 

$B96C 
E7 
00 

$B98A 
B7 
00 

$B98F 
FB 
0E 

$8942 
38 
18 



47447 

240 



47457 

242 



47468 

231 



47498 

183 



47503 

251 

14 

47426 

56 

24 



Data Marker #1: 
Check: 
Ignore: 

Data Marker #2: 

Check: 

Ignore: 

Data Marker #3: 
Check: 
Ignore: 

Data Checksum: 
Check: 
Ignore: 

Data Epi logues: 

Check: 

Ignore: 

Track Checker: 
Check: 
Ignore: 



$B8E9 
F4 
00 

$B8F3 
F2 
00 

$B8FE 
E7 
00 

$B92E 
13 
00 

$B933 
FB 
6A 

$BDC8 
24 
47 



47337 

244 



47347 

242 



47358 

231 



47406 

19 



47411 

251 

106 

48584 

36 

71 



Standard DOS 3.3 RWTS Locations 

Reading 
Description Hex Decimal 



Writing 
Hex 



Dec i ma I 



Address Markers: 



Address Checksum: 
Address Epi logues: 

Data Markers: 



Data Checksum: 
Data Epi logues: 



$B955:D5 
$B95F:AA 
$B96A:96 
$B96E:00 
$B991:DE 
$B9gB:AA 
$B8E7:D5 
$B8F1:AA 
$B8FC:AD 
$B900:00 
$B935:DE 
$B93F:AA 



47445,213 
47455,170 
47466,150 

47470,0 
47505,222 
47515,170 
47335,213 
47345,170 
47356,173 

47360,0 
47413,222 
47423,170 



$BC7A:D5 
$BC7F:AA 
$BC84:96 

$BCAE:DE 
$BCB3:AA 
$B853:D5 
$B858:AA 
$B85D:AD 

$B89E:DE 
$B8A3:AA 



48250,213 
48255,170 
48260,150 

48302,222 
48307,170 
47187,213 
47192,170 
47197,173 

47262,222 
47267,170 



Reading from protected DOS 3.2 disks 

Description Hex Decimal Description 



Hex Decimal 



Address Marker #1 


$B978 


47480 


Data Marker #1: 


$B90A 


47370 


Check 


F0 


240 


Check: 


F4 


244 


Ignore 


00 





Ignore: 


00 





Address Marker #2 


$8982 


47490 


Data Marker #2: 


$B914 


47380 


Check 


F2 


242 


Check: 


F2 


242 


Ignore 


00 





Ignore: 


00 





Address Marker #3 


$B98D 


47501 


Data Marker #3: 


$B91F 


47391 


Check 


E7 


231 


Check: 


E7 


231 


Ignore 


00 





Ignore: 


00 





Address Checksum 


$69AB 


47531 


Data Checksum: 


$B94F 


47439 


Check 


B7 


183 


Check: 


13 


19 


Ignore 


00 





Ignore: 


00 





Address Epi logues 


$B9B0 


47536 


Data Epi logues: 


$6954 


47444 


Check 


FB 


251 


Check: 


FB 


251 


Ignore 


0E 


14 


Ignore: 


6A 


106 


Read Error Flag 


$B963 


47459 


Track Checker: 


$BDBB 


48571 


Check 


38 


56 


Check: 


24 


36 


Ignore 


18 


24 


Ignore: 


4D 


77 



I was surprised when I looked through 
COMPUTIST back issues section and couldn't 
find a softkey for EDD HI. Here is my softkey. 
I have also included a small program which will 
allow the user to decide whether or not the disk 
being copied must be write-protected. 

Softkey for... 



Essential Data Duplicator III 

Utilico 



■ Requirements 

D 128K Ap^ple 

D 1 disk with at least 62 sectors free 

Recently, a teacher at my school gave me 
his copy of EDD HI, saying tfiat he had no use 
for it. I looked through the back issue section 
of my latest COMPUTIST to see if someone 
had already deprotected it. I found several 
softkeys for EDD IV, but none for EDD m, 
so I took it upon myself to remedy the situation. 



The Protection 

The protection was quite good, as you 
might expect from a copy program. When I 
booted the disk, the hi-res title picture was 
loaded almost immediately and the disk arm 
made a series of rapid movements— halftracks 
no doubt. However, after the program was 
loaded, it was completely loaded. It never read 
anything else from the disk. The best route 
seemed to be to convert it to a BRUNable file. 

I tried using a small machine language 
controller with EDD HI which was to leave me 
in the monitor as soon as the program was 
loaded, but it didn't work. It seems that EDD 
in trashes all the memory not occupied by the 
program. I tried hiding the controller in the 
language card, but that didn't work either. 
Although it only requires 48K, EDD in also 
turns off the language card in case the computer 
has 64K. Finally, I booted it into the auxilliary 
memory of my He, moved the data back into 
main memory, and saved it as a binary file. 



The Procedure 



I 1 I First, boot a disk with at least 62 
sectors free: 

PlbfV 



— tables continued on next page — 



I 2 I I don't have XFER.BOOT, but with 
a little help from an enhanced lie programmer's 
guide, I came up with the following routine. 
The disassembly shows what you have entered. 

CALL-151 

300:A9 00 8DEDe3A9C68DEE03382C58 
FF4C14C3 



12 



COMPUTIST #60 



October 



standard DOS 3.2 RWTS Locations 






Description 


Reading 
Hex 


Decimal 


Writing 
Hex 


Dec i ma 1 


Address Markers: 


$B976:D5 
$B980:AA 
$B98B:B5 


47478,213 
47488,170 
47499,181 


$BEF5:D5 
$BEFA:AA 
$BEFF:B5 


48885,213 
48890,170 
48895,181 


Address Cliecksum: 
Address Epilogues: 

Data Markers: 


$B98F:00 
$B962:DE 
$B9BC:AA 
$B908:D5 
$B912:AA 
$B91D:AD 


47503,0 
47538,222 
47548,170 
47368,213 
47378,170 
47389,173 


$BF29:DE 
$BF2E:AA 
$B893:D5 
$B898:AA 
$B89D;AD 


48937,222 
48942,170 
47251,213 
47256,170 
47261 , 173 


Data Checksum: 
Data Epi logues: 


$B921:00 
$B956:DE 
$B960;AA 


47393,0 
47446,222 
47456,170 


$B8DE:DE 
$B8E3:AA 


47326,222 
47331,170 



0300 LDA #$00 Put $Cm into $3ED.3EE 

0302 STA $03ED 

0305 LDA #$C6 

0307 STA $03EE 

030A SEC Ser /or Wain -Card 

030B BIT $FF58 Set V flag to use m stack 

030E JMP $C314 Go to the KFER routine 



I 3 I Turn on your SO column card (He 
users can skip this part). 

3 fBPl 



rT~| Boot the EDD HI disk. 
6 [bp1 



I B I Once you hear the beep (He users will 
also see the serial number/copyright page) press 
IBHB8KTI to regain control. EDD IE is now 
in auxiliary memory. All you have to do is 
move it into main memory. 

CAU-tSl 

300:18 AO 00 4C 11 C3 

3F8:4C 00 03 

800<800.3FFF[1t| 

0300 CLC Set for Aia'* Main 

0301 LDY #$00 Opthndonllc 

0303 JMP $C311 Go to AUmOVE routine 
03F8 JMP $0300 Point Ctrl-Yveaor to our routine 

I 6 I Make the program jump to the 
copyright notice when BRUN. 

800:60 OC was F2 26 



I 7 I Put the last used slot into $FF for 
EDDin. 



CA4:AD E9 B7 85 FF 



was CD 36 IC D0 37 



I 8 I For some reason, when an error 
occurs, flow of the program goes to $3EE8 
where a message appears telling you to insert 
the EDD disk to verify a file and then the 
computer hangs. An RTS at the beginning of 
this routine stops it: 

3EE8:60 y^as 84 



I 9 I You can now save EDD in as a binary 
file. 
BSAVE EDD in, A$800, 1.$3800 

You now have a deprotected version of 
EDDUI! 

Notes 

I didn't include the hi-res picture as part 
of the file, as loading it would only increase 
the file size to 90 sectors and increase loading 
time greatly. 

If you use EDD III a lot, you must have 
a steady supply of write-protect tabs; it requires 
the origind disk which you are copying to be 
write-protected at all times and won't let you 
proceed until it is. For this reason, I have 
written a small utility that lets you turn this 
feature on or off. Type in the listing at the end 
of the article. Make sure you save it before you 
run it because it modifies the starting location 
of the APPLESOFT program and then re-runs 
itself. When you run it you will be prompted 
to insert the disk with the deprotected version 
of EDD in. Then you will be asked if you want 
the original disk to be required to have the 
write-protect tab. Answer "Y" for yes, or press 
"N" or <RETURN> for no. The program will 
then make the proper pokes to the file and 
prompt you to insert a disk for saving the 
modified version. Press any key to save the 
resulting program. 

By the way, I found something interesting 
at the back of the manual (which dates back to 
1984). Under the heading "General 
Reconunended Reading" was the name and 
address of Hardcore Magazine. (COMPUTIST) 



EDD in UtUity{X} 



IREM* 

2 REM* EDD III UTILITY * 

3 REM* BY BILL JETZER * 

4 REM* 

10 IF PEEK (104) <> 64 THEN POKE 104,64: POKE 

103,1: POKE 16384,0: PRINT CHR$ (4) 

"RUNEDD'lirUTILITY" 



20 CALL - 1220: HOME : PRINT CHR$ (21) : TEXT 
30 VTAB 1: HTAB 13: INVERSE : PRINT "EDD' 1 1 1' 

UTILITY" : NORMAL: POKE 34,1 
40VTAB11:GOSUB130 
50PRINTCHR$(4) "BLOADEDD' 1 1 1 " 
60 HOME : VTAB 10: PRINT'DD'YOU'WANT'EDO'I I I'TO' 

REQUIRE' ORIGINAL' DISKS' TO' BE' WRITE' 

PROTECTED?'NO" CHR$ (8) CHR$ (8) ; 
70GETA$: IFA$ = "N" OR A$ = CHR$ (13) THEN PRINT 

: POKE 2079,76: POKE 2080,104: POKE 

2081,8: GOTO 100 
80 I F A$ = " Y" THEN PR I NT "YES" : POKE 2079 , 48 : 

POKE 2080 , 71 : POKE 2081 , 32 : GOTO 100 
90 GOTO 70 

100 PRINT :GOSUB 130 
110 PRINT CHR$ (4) "BSAVE' EDD' III, A$800, 

L$3800" 
120 END 
130 HTAB 13: PRINT"INSERrDISK*WITH" : HTAB9: 

PRINT "DEPROTECTED'FILE'VERSION" : HTAB 

16: PRINT "OF'EDD' III" 
140 PRINT : HTAB 8: PRINT "PRESS' ANY' KEY' TO' 

CONTINUE" :WAIT49152,128: POKE 49168,0: 

RETURN 



Checksums 


1 - $97CE 


60 - 


$54ED 


2 - $F48B 


70 - 


$3FBB 


3 - $B8EC 


80 - 


$81F2 


4 - $3E53 


90 - 


$2A60 


10 - $4DC0 


100 - 


$7D52 


20 - $2A83 


110 - 


$BE3D 


30 - $1FAD 


120 - 


$5980 


40 - $2F7C 


130 - 


$B24A 


50 - $ADA3 


140 - 


$8111 


Softkey for... 


Death Sword 






Epyx 





■ Requirements 

n Super lOB 1.5 
n 1 blank disk 

-or- 
D A normal ProDOS disk with BASIC. 

SYSTEM and a file copier 
D 1 ProDOS formatted disk whose volume 

name is /DEATH.SWORD 

The protection used on Death Sword is 
fairly simple. First, it uses altered epilogues 
which stop a whole disk copier firom reading 
it. Second, it uses a "nibble find" routine which 
searches tiie disk for a pattern of bytes which 
are located somewhere on track $0, probably 
somewhere in the large sync byte area at the 
beginning of the track. If the pattern isn't found, 
the disk reboots. 



October 



COMPUTIST jf«0 



13 



To deprotect Death Sword, type in the 
controller at the end of the article and save it. 
Install it into Super lOB l.S and run it. 

Death Sword is under ProDOS format, and 
it incorporates the nibble finder into the 
ProDOS boot loader blocks. A two byte sector 
edit is performed by the controller to jump over 
the nibble finder: 



Trk Set Byte{s) From 



To 



$0E $04-05 A9 1 



F0 79 



If you would rather have the game in a 
completely normal ProDOS format, follow this 
procedure: 

I 1 I Boot the Death Sword disk. 

I 2 I After the ProDOS message is 
displayed, watch the disk drive light. When it 
flashes off and then on again, hit CTRL-RESET 
and you will be left in the monitor. 

I 3 I Insert a normal ProDOS disk and start 
your file copier by executing the ProDOS quit 
code: 

3M:2« MBFSSeSIOOOOOO N309G 



i 4 I You will be asked for the volume 
name of your disk, type it in this format: 
/V0LU1IE.NAME 



I 5 i You will be asked for the next 
SYStem program you want to use. If your file 
copier is a SYStem program, (such as 
UTIL.SYSTEM fi-om Copy H Plus v6.0 and 
up), type in its name. If your file copier must 
be run from BASIC, type in BASIC.SYSTEM. 

I 6 I Copy all the files from the Deadi 
Sword disk onto an already formatted ProDOS 
disk whose volume name is /DEATH.SWORD. 

I 7' I The ProDOS used on Death Sword 
has been modified to ignore epUogue bytes. It 
can easily be converted to a the normal Apple 
version. First boot a ProDOS disk and get into 
BASIC. Load the file: 

BLOAD PROI)OS,AS20a9,TSTS 

Make the changes: 
5SED;D0 was 90 

55F7;D« was 9® 

56CC:38 was 18 

Save the file back to the disk: 
BSAVE PRODOS,A$20M,TSyS 

A Few Notes 

Death Sword's "nibble find" routine 
searches for the following sequence: FC EE EE 
FC E7 EE FC E7 . There must be something magical 
about that sequence, because I found that same 
pattern of bytes on Animate by Broderbund, and 
World Karate Championship by Epyx. 

That's all for now. Now go out there and 
dismember some barbarians! (Don't worry 



about the mess; the gremlin will clean it up). 



Controller 

1000 REM DEATH SWORD 

1010TK=0:LT = 35:ST=15:LS=15:CD=HR:FAST=1 
1020 POKE 47426,24: GOSUB 490: GOSUB 610 
1030 POKE 47426 , 56 : GOSUB 490 : Tl = TK : TK = PEEK 

(TRK) - 1: RESTORE : GOSUB 310 :TK = Tl: 

GOSUB 610 
1040 IF PEEK (TRK) = LT THEN 1060 
1050 TK = PEEK (TRK) : ST = PEEK (SCT) : GOTO 1020 
1060 HOME : PRINT "COPY'DONE" : END 
5000 DATA 2'CHAN6ES 
5010 DATA 0,14, 4, 240 
5020 DATA 0,14, 5, 121 



Checksums 



- $356B 1050 - $9114 

1010 - $2544 1060 - $FEE3 

1020 - $B5FB 5000 - $AFE0 

1030 - $BB1C 5010 - $BE26 

1040 - $C168 5020 - $5A51 



IVI.M. McFadden 



EDASM Transfer UtiUty 

■ Requirements 

n EDASM (ProDOS version) 

One of the more popular assemblers these 
days is the ProDOS version of the old DOS 
Toolkit assembler, EDASM. It is available 
through Apple as ProDOS Assembly Tools. 

Even though it operates under ProDOS (or 
perhaps because of it), EDASM can be rather 
slow at times - especially when creating more 
than one code file from a single source file. 

Every time EDASM creates object code, 
it must check to see if there is an old file with 
the same name, delete it if there is one, create 
a new file, and begin writing. On most disk 
drives, this takes a little bit of time. Although 
the time span is much shorter than it used to 
be under DOS 3.3, it is still annoying. 

A much better idea is to load EDASM onto 
the built-in RAM disk, and use it there (you 
must have an extended 80-col card on a He. 
The He and Ilgs have it built-in). Complicated 
disk accesses are accomplished in fractions of 
a second. Ilgs owners have an added bonus: 
while the Ilgs fast mode cannot enhance floppy 
drive speed, it will cut /RAM disk access time 
in half. 

If we transfer BASIC.SYSTEM (so that we 
can return to BASIC and test our program) and 



the three EDASM fUes, we wiU stiU have 43 
blocks left - more than enough for most 
programs. It is recommended, however, that 
you store your source files on more permanent 
media. It should be possible to select files as 
"/mmm/trans.f ' while your prefix is "/ram", 
allowing you to save files to a disk but assemble 
to RAM. 

But it would be a real pain to break out 
Copy n Plus or the Filer every time we want 
to assemble something, so there must be a better 
way. 

Here is a quick and easy solution: a 
program which automatically copies the four 
files from the currently prefixed disk to /RAM. 
In fact, this program will copy just about 
anything that fits into memory, since all 
essential data is preserved. 

TRANS will copy these files: 

BASIC.SYSTEM 
EDAiSMwas Edasm. System, I renamed it 
to make it easier to type. 
EDASM. ED 
EDASM. ASM 

EDASM Transfer uses the ProDOS MU 
(Machine Language Interface) directly to copy 
the programs. Look at the assembled listing. 
Every JSR MLI is followed by a one byte 
command code, and a two byte pointer to a 
parameter list. 

When copying the files, several different 
steps involving seven different MLI calls are 
required: 

1) TTie source disk's PREFIX must be read. 
Then the main loop begins: 

2) The PREFIX is set to read the source 
disk. Here the parameter lists are set to point 
to the filename. 

3) A GET FILE INFO call is made to read 
in informations such as file type, creation type, 
and other goodies. 

4) The source file is OPENed (prepared to 
be read). 

5) A GET EOF call is made to find out the 
file length. 

6) The file is READ into memory at 
$2000. 

7) The source file is CLOSEed. 

8) The PREFIX is s« to the destination disk 
(/RAM). 

7) A new file is CREATEd on the 
destination disk, with the same characteristics 
as the original. 

8) The destination file is OPENed. 

9) A call is made to WRITE the file, and 
then it is CLOSEed. 

Control is finally returned to BASIC, with 
the prefix set to /RAM. Occasionally, an error 
will occur during processing. The program will 
stop, a two digit hex number will be printed, 
and you will be dumped unceremoniously into 
the monitor. 



14 



COMPUnST MO 



October 



Possible error codes 

$27 - Generic I/O error. Check disk drive. 

$2E - Volume switched. Leave the disk 
alone during copy. 

$42 - Too many files open. Close a few, 
and try again. 

$45 - Volume not mounted. Make sure that 
the source prefix is set to the disk you are 
reading from (NOT "PREFIX.Dl"), and that 
there is a /RAM volume. 

$46 - File not found. Make sure all of files 
are there. 

$47 - Duplicate file name. Some or all of 
the files are already on /RAM. 

$48 - Disk full. Too much stuff is on 
/RAM. 

$49 - Volume directory full. See above. 

There are others, but they are unlikely to 
appear. Consult one of the manuals listed at the 
end for further reference. 

If you type in the hexdump, BSAVE 
TRANS, A$1000, L$164 when you are done. 
(If you use the source listing you will notice 
something odd... it's written in Merlin 
assembler format. I switched assemblers a short 
while ago (Merlin is SO much nicer), but there 
are veiy few changes required (the STR opcode 
just puts the length byte before the string; the 
REV opcode puts the string in backwards). 

X Source code is available on the library disk 
for this issue. RDEXed 

To use, type "-TRANS". It will tell you 
what files are being copied. Note that the prefix 
MUST be set to the source disk. 

For more information on ProDOS and 
ProDOS MU calls, see the ProDOS Technical 
Reference Manual (from Apple) or, better yet, 
Beneath Apple ProDOS (from Quality 
Software). 



1000: 


A9 00 85 02 2000BFC7 


$C0D9 


1008: 


2E11A0 0DB9 561120 


$8996 


1010: 


EDFD8810F7 20 00BF 


$1AE9 


1018: 


C6 2B11A5 02 0AA8B9 


$2344 


1020: 


DA10 8D0E118D1A11 


$F9B5 


1028: 


8D3A1185 00B9DB10 


$5A63 


1030: 


8D0F118D1B118D3B 


$30B3 


1038: 


1185 01A0 01B100F0 


$CB10 


1040: 


08 09 80 20EDFDC8D0 


$D9B7 


1048: 


F4 20 8E FD 20 00 BF C4 


$B8CA 


1050 


1911A0 04A2 04B919 


$13AC 


1058: 


119D0D11C8E8C0 08 


$8788 


1060: 


D0 02 A0 0E C0 12 90 EE 


$CFD8 


1068: 


20 00BFC8 3911B0 64 


$576A 


1070- 


AO3E118D40118D52 


$4909 


1078 


11 20 00 BFDl 51 11 AD 


$D84B 


1080 


53118D43118D4B11 


$34FE 


1088 


AD54118D44118D4C 


$6E67 


1090 


1120 00BFCA3F11B0 


$0B4D 


1098 


3B20 00BFCC4F1120 


$14CF 


10A0 


00BFC6 311120 00BF 


$2CAE 


10A8 


C0 0D11B0 27 20 00BF 


$9F25 


10B0 


C8 3911AD3E118D48 


$4B53 



10B8: 


1120 00BFCB4711B0 


$0670 


10C0: 


13 20 00BFCC4F11E6 


$4B81 


10C8: 


02A5 02CDE210F0 03 


$8DE4 


10D0: 


4C1510 60 20DAFD4C 


$924E 


10D8: 


59 FF E3 10 Fl 10 F8 10 


$5070 


10E0: 


021104 0CC2C1D3C9 


$C83D 


10E8: 


C3AED3D9D3D4C5CD 


$0F44 


10F0: 


00 05C5C4C1D3CD00 


$5358 


10F8: 


08C5C4C1D3CDAEC5 


$0FA9 


1100: 


C4 0009C5C4C1D3CD 


$47E1 


1108: 


AE CI D3 CD 00 07 00 00 


$5E8F 


1110 


C3 00 00 00 01 00 00 00 


$076B 


1118 


00 0A 00 00 00 00 00 00 


$B78E 


1120 


0000 00 00 00 00 0000 


$076E 


1128 


0000 00 0100 03 0100 


$AD80 


1130 


03 01 34 11 04 2F 52 41 


$D90C 


1138 


4D 03 00 00 00 18 00 04 


$FA50 


1140 


00 00 20 00 00 0000 04 


$CE72 


1148 


00 00 20 0000 00 00 01 


$BFF2 


1150 


00 02 00 00 00 00 8D BA 


$E953 


1158 


E7 EE E9 F9 F0 EF E3 A0 


$F3D6 


1160 


F7 EF CE 8D 


$5BEA 



Amper QuickDraw 11 Routines 

■ Requirements 

D Apple ngs 

A while back I wanted to do some quick 
super-hires graphics fix)m Applesoft on my Ilgs. 
Since I didn't have a program that would let 
me do this, I decided to write one myself. 

When you BRUN AMPERQD, tfie file will 
set up the ampersand vector at $3FS to point 
to itself, and then start up the QuickDraw 
toolbox. If you BRUN it again, it wUl realize 
that QuickDraw is running and exit without 
doing anything. 

You will then have the following 
commands at your disposal: 
& HGR Clear screen to current super-res color 
(320 mode). 

& HGR2 Like HGR, but in 640 mode. 
& ON Turn super-res on. 
& TEXT Turns super-res off. 
& HCOLOR = im set color to nn (O - IS). 
& HPLOT aexprl, aexpr2 
& HPLOT TO aexpr3, aexpr4 
& HPLOT aexprl, aexprl TO aexpr3, 
aexpr4 (TO aexpr, aexpr...) Plot a point at 
xx,yy, or a line if two or more points are given. 
The syntax is exactly the same as the Applesoft 
HPLOT statement. 

While it doesn't support fancy box or circle 
drawing, it does provide the same rudimentary 
commands that BASIC programmers have 
come to know and love. 

Notes on AmperOD 

The code runs from $7000 - 7 IFF. 
QuickDraw uses a buffer which runs fi-om 
$7200-$74FF. 32K at $El/2000 - $E1/9FFF 



is used for screen memory, and an additional 
SK or so is set aside for various uses. Note: 
if the direct page buffer (OO/720O - 00/74FF) 
gets mangled, C^ickDraw will probably hang 
after the next call. 

Despite assurances to the contrary, the 
QDShutDown call does NOT fi«e up the Super 
Hires graphics memory. This makes it 
hazardous to shut C^ickDraw down, because 
it will refuse to restart if the screen memory 
is in use by anyone. The memory must be freed 
first, but the Memory Manager has conspired 
with QuickDraw to prevent this from 
happening. (A DisposAll call returned without 
errors, but the Memory Peeker CDA showed 
it to be still in use!) 

If you munge the buffer or manage to shut 
down QuickDraw, the only way I know of 
restarting it M to clear the memory handles with 
IdSMgETl . Note that it IS possible to 
BSAVE a good copy of the direct page buffer, 
and then BLOAD it if damage occurs. 

If you would like to try ficeing the memory 
yourself, AmperQD always uses UserlD 1080 
(the 128th ID issued to an application). I chose 
to use a constant UID because of the spasms 
C^ckDraw had regarding who was using the 
Super Hires page. 

The code was assembled with Merlin 16, 
although any assembler that supports macros 
and the ftill 65816 instruction set will work (i.e. , 
ORCA/M). The code is fairly straightforward, 
using Applesoft to parse the options and Ilgs 
toolbox calls to draw lines, change colors, etc. 
Note that the toolbox calls do no range 
checking, and neither do I. 

I have included a brief BASIC program that 
shows off AmperQD 's features. While 
AmperQD may not be as fancy as other similar 
programs, it is the most intuitive and probably 
the shortest (410 bytes or so). 



i 



As always, to conserve space, the source code 
is not printed here but is available on the library 
disk for this issue. RDEXed 

AMPERQD.TEST 

100 PRINT CHR$ (4) "BRUNAMPERQD" 

110&HCOLOR=1:&HGR 

120 REM try &hgr2 also! 

130 FOR A = TO 319: IFA/20= INT (A/20) THEN 

& HCOLOR= A / 20 
140 & HPLOT A, TO A, 199: NEXT 
150 & HCOLOR= : & HPLOT 1 , 1 TO 318 , 1 TO 318 , 198 

TO 1 , 198 TO 1 , 1 : & HCOLOR= 7 : & HPLOT TO 

318 198 
160 FOR DL=1 TO 1000: NEXT 
170 & TEXT :& ON: GOTO 170 

Checksums 



100 
110 



- $3AAC 140 

- $6A01 150 



$101C 
$AE5C 



October 



coMPirnsT#60 



15 



120 
130 



$07D5 
$7790 



160 
170 



$0026 
$D41D 



Save the following code after you enter it. 
BSAVE AHPERQD, A$7000, L$19A 



7000: A9 4C8DF5 03 18 FBC2 
7008: 30 A9 93 70 8D F6 03 F4 
7010: 00 00 A2 04 06 22 00 00 
7018: El 68 F0 03 82 43 01 A2 
7020: 01 02 22 00 00 El A2 03 
7028: 02 22 00 00 El F^4 00 6D 
7030: F4 00 00 F4 00 00 AD C0 
7038: 70 48 A2 04 02 22 00 00 
7040: El 90 46 F4 00 00 F4 00 
7048: 00 48 A2 0B 2A 22 00 00 
7050: El 68 8F 82 70 00 68 8F 
7058:84 70 00F4 00 00F4 6D 
7060: 70 A2 0C 20 22 00 00 El 
7068: 38 FB 4C 59 FF 51 44 53 
7070: 74 6172 74 55 70 20 45 
7078: 72 72 6F 72 20 77 61 73 
7080: 20 24 00 00 00 00 0D 0A 
7088: 00 A2 04 36 22 00 00 El 
7090 : 82 62 00 AE AD 70 CA 30 
7098:33DDAE70D0F8 20B1 
70A0: 00 18 FB C2 30 48 8A 0A 
70A8: AA68 7CB4 70 06 9190 
70B0: B4 89 92 93 CF 70 D4 70 
7068: EA 70 F5 70 00 71 29 71 
70C0: 8010 00 00 00 00 00 00 
70C8:00 00 00 00 4CC7DEA9 
70D0: 00 00 80 03 A9 80 00 48 
70D8: A2 0416 22 00 00E1AD 
70E0: C2 70 48 A2 04 15 22 00 
70E8: 00 El A2 04 0A 22 00 00 
70F0:E182 6E00 60A2 04 0B 
70F8: 22 00 00 El 82 63 00 60 
7100: 38FB20F8E6 8A8DC4 
7108: 70 0A 0A 0A 0A 18 6D C4 
7110: 70 8D C2 70 8D C3 70 18 
7118: FBC2 30ADC4 70 48A2 
7120: 04 37 22 00 00 El 82 39 
7128: 00 E2 30 B2 B8 C9 CI F0 
7130: 23 C2 30 20 65 71 A2 04 
7138: 3A 22 00 00 El AD C6 70 
7140: 48 AD C8 70 48 A2 04 3C 
7148:22 00 00E1E2 30B2B8 
7150:C9C1D0 0E38FB20B1 
7158: 00 18 FBC2 30 20 65 71 
7160: 80 E3 38 FB 60 68 8D CA 
7168: 70 38 FB 20 67 DD 20 52 
7170: E7A5 50 8DC6 70A5 51 
7178: 8D C7 70 20 BE DE 20 67 
7180: DD 20 52 E7 18 FB C2 30 
7188: A5 50 8DC8 70ADC6 70 
7190: 48 AD C8 70 48 AD CA 70 
7198:48 60 



Alan Zimbard, M.D. 



$852F 

$0A8D 

$58F8 

$1F4F 

$7DEC 

$394C 

$CBF3 

$5B12 

$2E4B 

$E969 

$0DDD 

$8485 

$2EF0 

$8FFD 

$5650 

$24E2 

$62F8 

$1202 

$0A87 

$6C68 

$0265 

$77B9 

$A381 

$4C5B 

$4CA3 

$B504 

$D698 

$51BE 

$FCB9 

$61EE 

$BF54 

$8363 

$A996 

$F713 

$94F3 

$4464 

$CF43 

$2E20 

$B14F 

$FE49 

$3532 

$7134 

$724F 

$8EC4 

$2AE2 

$EDC1 

$0838 

$FBB3 

$2B46 

$9700 

$86DA 

$7E2E 



Here are some answers to the questions 
posed by Dorothy Dow in COMPUTIST #55. 



Q. Do I need DOS 3.3? 

A. The Ilgs (or any Apple II for that matter) 
does not need a Disk Gyrating System (DOS) 
to function. If you turn on your computer 
without a disk in the drive all the instructions 
in ROM still load normally and you can dither 
away to your hearts content writing programs 
etc. , but you will not be able to save any of your 
work. 

The Disk Operating System, whether DOS 
3.3 or ProDOS controls the way your computer 
deals with peripherals like disk drives, printers, 
modems etc. Without the System your computer 
doesn't know these things exist. Apple's DOS 
(whether DOS 3.3 or ProDOS) does not reside 
in ROM and must be loaded in from disk in 
order to be active. The Ilgs is neither a DOS 
3.3 or ProDOS machine but runs under 
whatever operating system has been loaded into 
its memory. ProDOS, however, is the only 
system that will take full advantage of the Ilgs' 
awesome capabilities. 

Older applications (games etc.) that used 
DOS 3.3 have a copy of this DOS on the disk. 
All you do is boot the disk and you're off and 
running. Your Ilgs, with few exceptions, will 
be able to run any DOS 3.3 application. You 
do not need to understand the way the operating 
system works. As with ProDOS everything is 
taken care of for you. 

ProDOS was developed through an 
evolutionary process to improve DOS 3.3. All 
the patches and improvements individual 
programmers made to the old DOS were 
incorporated into ProDOS. Unless you plan to 
write programs that will operate under the rules 
of DOS 3.3 there is no need for you use it. 
ProDOS and DOS 3.3 are actually more alike 
than different and if you're going to take the 
time to learn programming you might as well 
be current and learn to use ProDOS 
conventions. If you want to study DOS 3.3 for 
historical interest a copy of the DOS 3.3 
SYSTEM MASTER disk (containing DOS 3.3 
plus a variety of utilities) is available from 
APPLE CO-OP, 290 Southwest 43rd ST. 
Renton, Washington 98055. (206) 251-9798. 
Another excellent source on DOS 3.3 is "The 
DOS-Talk Scrapbook" by Tom Weishaar 
(accompanying disk also available) publisher of 
Open-Apple. The address is Open - Apple, P.O. 
Box 11250 Overland Park, Kansas 66207. 



i 



When following a soAkey procedure that calls 
for DOS 3.3, it's best to stick with the requirements 
list. At least until you know enough about 
programming to be sure that any substitutions mil 
work RlXXed 

Q. What is GPLE? 

A. GPLE is the Global Program Line Editor 
by Neil Konzon published by Beagle Bros. 
Software 6215 Ferris Square, Suite 100 San 
Diego, CA 92121 (619) 452-550O. It is a utility 



which allows editing of BASIC program lines 
much as you would do on a word processor, 
avoiding Apple's tedious "Escape Mode" 
editing. 

A It is only necessary if you intend to do a lot 
of BASIC programming. There are other utility 
programs that do much the same. .... RDEXed 

Q. Do I need a CD ROM to enter the Monitor? 
A. As far as entering the Monitor, there is no 
need to purchase a CD ROM to have this ability 
on the ngs. If you have the latest (2.©) ROM 
upgrade (you will see ROM VERSION 01 on 
the screen during booting) do the following: 

I 1 I Turn on your computer. You do not 
need a disk in the drive. 



I 2 I Press |BRESET| to get the Applesoft 
prompt. 

CALL -151 to enter the Monitor 

» Shift-3 



I 3 I Now bring up the control panel by 
pressing IdBESCl . You will see two new 
CDA's (Classic Desk Accessories) caUed Visit 
Monitor and Memory Peeker. Choose Visit 
Monitor and there you are! These two new 
CDA's remain accessible until you power- 
down. This method cannot be used with certain 
protected programs that run with interrupts 
disabled, meaning you can't get to the Desk 
Accessories. 

A second method which I use, while not 
cost free, has the advantage of working with 
all programs plus the ability for making hard 
copies. The Fingerprint GSI, from Thirdware 
Computer Products, 4747 N.W. 72nd Avenue, 
Miami, FL 33166, (305) 592-7522 is a printer 
control card for slot #1 designed to give you 
additional control over Ilgs graphics by freezing 
any program and t ^dng c ontrol of the computer 
until you press lESCl . When the special 
"Fingerprint" key is hit the program halts and 
a menu screen appears. From here one 
keystroke takes you to the Monitor. You can 
dump the screen to a printer anytime you want. 
Hitting the escape key returns you to the 
original program. I have found it to work with 
all programs, protected or otherwise. 

I hope this information has been helpful. 



Michael Smith 



Softkey for.. 




■ Requirements 

D COPYA 

D Sector Editor 

n One Blank Disk 



16 



coMPunsT tno 



October 



An examination of the orginal disk reveals 
that the epilog bytes have been changed from 
DE AA to AA DE . All that needs to be done is to tell 
DOS 3.3 to ignore epilog errors, copy the 
orginal disk with COPYA, and normalize epilog 
checking on the backup disk's DOS with some 
sector edits. 



I 1 I Boot DOS 3 . 3 , tell it to ignore address 
and data epilogues. 

CALL-151 
B988:18 60 
B925:18 60 



I 2 I Use COPYA to copy the disk. 
RUN COPYA 

I 3 I Make the following sector edits on the 
backup disk. Be sure to write the modified 
sector back to the disk. 



Trk Set Byte(s) From 


To 


$00 $03 $99 AA 


DE 


$00 $03 $A3 DE 


AA 


$00 $03 $F5 AA 


DE 


$00 $03 $FF DE 


AA 



Have fun with your new backup disk. 



Edward Teach 



Softkey for... 



Mastertype v2.1 

Scarborough 



■ Requirements 

n Apple He or He with 128K 

D COPYA 

D COMPUTIST ISSUE #55 

Charles Taylor was just a little quicker then 
1 was on this disk, but his softkey was a great 
help to me. The problem that he was having 
was in trying to place a faster DOS on the disk. 
The secret to this protection, other than that 
already discussed in issue #55, is that the read 
translate table has been altered. Setting this back 
to an abnormal value allows the disk to be 
cataloged. To fix this disk do the following: 

m Run COPYA and wait till the 
Slot/Drive prompt comes up, then press iBCl . 

RUN COPTA 



70 

CALL-151 

BAAA:00 

B942:18 

3D0G 

RUN 



Now let COPYA do its thing. After it gets 
done type CATALOG and the files that did not 
appear before will now be readable. When 
entering the sector edits from Mr. Taylor I did 
not use the flashing characters. BRUN, 
BLOAD and CATALOG were typed just as 
they appear on this page. (Unless of course you 
see flashing letters on your page). Since the 
HELLO file is an EXEC file type: 

UNLOCK HEUO 

DELETE HELLO 

10 HOME: HGR: VTAB24 

20 7 "MAKE SURE 'CAPS LOCK' KEY IS 

DOWN": VTABl 
30 7 CHR$(4) "BLOAD DM" 
40 POKE 41868, PEEK (43634): POKE 41869, 

PEEK (4363S) 
SO 7 CHR$(4) "BLOAD LOGO" 
60 7 CIIR$(4) "BRUN AUXLOAD.OBJ" 
SAVE HELLO 
LOCK HELLO 

The only problem remaining is that the 
program will run, but will not catalog itself 
from within the program. This is not a major 
problem since you can now catalog the disk. 
If you select catalog from the screen prompt, 
the disk will tell you to reboot, but it will at 
least now run under a fast DOS. Also, using 
a normal DOS means that you do not have to 
swap between a data disk and the program disk. 
Enjoy! 

Crossword Magic 4.0 by Mindscape 

This is really a request for help. This disk 
has been making me nuts for about six months. 
Have you ever worked on a disk and knew what 
the protection was, but could not figure a way 
around it? 

Crossword Magic 4.0 is really inventive 
in the way it is protected. There is no DOS used 
to load the program into the memory. The entire 
disk is loaded by the BOOT ROM, using track 
$00, sector $00. This is the reason that all 
the tracks have a track number of $00. It also 
slows down the examination of the code on the 
disk. However, I hope that giving the 
information I have discovered about the disk 
will allow someone out there to suggest the next 
step for me to try. First things first. My initial 
step is always to make a COPYA version of the 
disk to examine the code. This duplicate will 
not boot into track one, but lets make a copy 
anyway. Add the following lines to Super lOB 
1 .5 and EXEC in any simple controller to make 
a copy: 

525 I F CO = RO AND ET = 1 THEN GOSUB 710 

526 I F CD = WR AND ET = 1 THEN GOSUB 730 

527 I F CD = RD AND JH = 1 THEN POKE 47426 , 24 
700 REM I GNORE TRACK # ' S ON SOURCE D I SK 

710 POKE 48621,76: POKE 48622,16: POKE 

48623,190: RETURN 
720 REM F I X DOS ' TRACK VER I FY ROUT I NE 



730 POKE 48621,164: POKE 48622,46: POKE 
48623,204: RETURN 

10115 A$ = " IGNORE TRACK NUMBERS ON SOURCE N" + 
CHR$(8): HOME: VTAB12: GOSUB 450: GETA$: 
IFA$ = "Y"THENET=1 

10116 A$ = " IGNORE CHECKSUMS AND EPILOGS N" + 
CHR$(8) : HOME: VTAB12: GOSUB 450: GETA$: 
IFA$ = "Y"THENJH=1 

What these changes do is poke DOS to 
jump past the verify track routine (line 710), 
then restores the track verify (line 730) and then 
allows any data checksum or epilogue to be 
ignored (line 527). Answering the two new 
questions "Y" Oines 10115 and 10116) allows 
the Super lOB to copy the disk. I have installed 
these modifications in my permanent copy of 
the Super lOB since many disks simply need 
the epilogues ignored. This, with any generic 
controller, copies most disks. 

Now that we can read the copy of the disk. 
Read track $00 sector $00. Starting at byte 
$59 and going through byte $7F is the loader 
program. 



0859 A9 09 
085B A2 09 
0850 20 82 08 

0860 20 00 09 
0863 20 82 08 
0866 A9 55 
0868 A0 01 
086A A2 0B 
086C 20 B2 08 



LDA #$09 Set page 9 

LDX #$09 

JSR $08B2 Load page 9 

JSR $0900 

JSR $0882 

LDA #$55 Set page 55 

LDY #$01 

LDX #$0B 

JSR $08B2 Load page 55 



It goes on to load pages $04, $02 and $07, 
the text pages and the keyboard buffer. All of 
this with the BOOT ROM and direcdy accessing 
the stepper motor. Now the really fiin part. 
Search the disk for occurrences of C08C (disk 
access). Most of them look like a normal DOS, 
however, at track $02, sector $0B and track 
$0E, sector $00 are some sort of signatore 
check. (Read a few bytes store them in specific 
memory locations). Such untrusting people at 
Mindscape! I tried placing "00" (break) at 
various locations and then saving the code 
(0860:00 00 00, move page 9,boot a DOS, 
save page 9) the problem with this is that as 
soon as I try to reload over the screen locations 
the code gets trashed. My next try was to move 
C600.C6FF to 9600 and try to modify it to 
ignore track numbers (if Christopher Dean can 
do it why can't I). This resulted in another 
failure. I am about to officially give up on this 
disk and admit defeat. So tell me, does 
Mindscape get to win this one? 



Stephen Lau 



Just after I sent a letter to RDEX, I received 
COMPUTIST #56 and was wondering why the 
Goonies softkey doesn't work for Jack R. 
Nissel. Well, I have to apologize. Jack, I 
carelessly omitted the info on how to make a 



October 



COMPUTIST #60 



17 



Datasoft RWTS which is needed by the 
controller, and also I left out line lOOlO in 
the controller which loads the RWTS. The 
controller in the softkey used the RWTS we are 
supposed to create to read in data. Since the 
RWTS has now been omitted, the controller 
will bomb. Also, the reason that you drop into 
the monitor when you used the copy you made 
with the controller in Computist #44 before 
writing is that you have a Ilgs, and that you have 
the new ROM. I just got the new ROM from 
the dealer and verified that the routine that I 
used in the controller to make the patches is not 
there now in the new Ilgs ROM. 

So, if you want a backup of Goonies, do 
as Jack says in COMPUTIST #56. 

To apologize to Jack and all other 
COMPUTIST readers who tried the softkey, 
here is the Zorro softkey that Jack requested. 

Softkey for... 



Zorro 

Datasoft 



The softkey for Zorro by Clay Harrel is 
incomplete. Since Jack asked for a softkey for 
Zorro, I examined the one in COMPUTIST #44 
closely. Yes, Qay Harrel defeated the signature 
check, but he did nothing to the flags for 
checking! These flags are later checked by the 
program, your disk will still boot as though it 
passed the test, but whenever you pick up 
something, it falls, which makes the game 
impossible to complete. So, here it is, Jack, 
hope that softens some of your frustration due 
to the Goonies softkey. 

I 1 I Use the controller for Goonies & 
Zorro (from COMPUTIST #44), answer Z to 
Zorro & Goonies. 



I 2 I Make the following edits to the copy. 

Trk Set Byte(s) From To 



$0C $07 $6D 


A5 07 


A9 00 


A.P.T.for. 








Tbexder 

Sierra On Line 





For those Ugs Thexder owners who are 
about to smash their monitors for the game over 
message, do the following sector edits: (to a 
backup of course!) 

Block Byte(s) From To 

$586 $27 F8 38 ADAS 59 F8 38 ADAS 59 
F0 80 

And now you have infinite shields and 
energies! ! ! So crash into anything and waste the 
master computer. 



Alien Mind 

I'm glad that the quality of Ilgs games 
continues to improve. By this time you should 
have already seen (if not owned) Alien Mind 
and Defender of the Crown. I was suprised to 
find that Defender of the Crown is not protected 
(as far as I can tell), and that Alien Mind is 
severely protected. 

Alien Mind is the only Ilgs program that 
is not supplied on a PRODOS 8 or 16 disk. The 
disk has normal block/sectors fix)m track $00 
through track $02 side 1 , the rest use a address 
header of D5 AA AA and 4 & 4 encoding to 
read in stuff. Since the loading of the operating 
system (usually PRODOS 16) is completely 
bypassed and most of the program is stored as 
4 & 4 encoding, the program loads in lighting 
speed. The screen appears in about 3 seconds, 
and the sound in about 10 seconds. 

Deprotection will require a program 
utilizing extensive calls to smart port to read 
in each track and write them in normal format 
(kind of like Super lOB swap controller). The 
program has to be modified to read blocks. 
Numerous other minor things make this task 
very difficult, if not impossible. The only 
solution seems to be to use Copy n Plus to bit 
copy it. However, no one realized that the 3^^" 
bit copy program of Copy n Plus was so poor 
before the release of Alien Mind, since no 
program required a bit copy of so many tracks. 
If you bit copy a normal disk with Copy n Plus, 
you will find more bad block errors on the copy 
than your fingers and toes can count. Even with 
specific headers and carefiil manual bit copying, 
the disk will hang at some place (probably a 
bad block). To make things worse, there seems 
to be a synchronize protection too Quckily, the 
routine responsible for the check resides on 
track $00, and so is modifiable if needed). 
Well, I'm giving up. Any Ilgs expert's help is 
greatly appreciated, how about Mr. Brian 
Troha? 

*ngs Softkey for... 



Paperboy 

Mindscape 



■ Requirements 

D Apple Hgs with 256K 

D Copy n plus or any block editor 

More junk from the famous Hgs junk 
maker. This time a friend of mine bought it and 
so I'll help him to make a back up. The 
protection is similar to that on Gauntlet (see 
page 9) and has a read error on block $007. 
The disk bombs after the title page is shown. 
I cataloged the disk, hoping to see a level 8 file. 
Well, no luck this time. Tracing through the 
program, however, I was able to find the 
offending code. 



CLC 

XCE 

REP X00110000 

LDX #$2142 

LDY #$0000 

JSL $009000 

SEC 

XCE 

STA $2145 

CLC 

ADC #$98 

STA $21CB 

RTS 



clear carry flag 
switch to native mode 



check 

set carry flag 

switch back to emulation mode 

store result at 2145 

clear carry flag for adding 

add 98 

store at 21CB 

return from subroutine 



Notice that the code is very similar to that 
on Gauntlet. A look at the subroutine finds that, 
upon a successfiil check, it returns with the 
accumulator holding $02 (same as Gauntlet). 
So I overwrote the subroutine with the following 
code: 

LDA #$02 

STA $2145 
CLC 

ADC #$98 

STA $21CB 
RTS 

The disk works now and seems to have no 
problems. 

I 1 I Copy the disk and ignore the error on 
block $007. 

I 2 I Sector edit: 



Block Byte(s) From 



To 



$D0 $128 1SFBC2 30A2 A9 02SD45 21 
42 21 A0 00 00 18 69 9S8DC6 
22 00 21 60 



Softkey for.. 



Mavis Beacon Teaches Typing 

Electronic Arts 



■ Requirements 

D Apple n, ngs with 512K 

n Copy n Plus or any other block editors 

Mavis Bacon Teaches Typing is a very 
good program that teaches, of course you know 
from the title, typing. The graphics are very 
nicely done, witii guide hands and car racing 
to help you to type fast. A fast disk copy reveals 
some errors on track $4F and the protection is 
not compatible with Diversi Cache. I booted the 
disk and was prompted to insert the original 
disk. I bombed into the monitor with Diversi 
Hack (or you could use visit monitor) and 
scanned for a read block command, \22 A8 00 
El 22\<n/0 . FFFFP, where n is the bank number 
you are searching. 



18 



coBapunsT /rao 



October 



Bingo, I found one at $03/D5E6. Tracing 
back, I found the subroutine starts at $D5BB. 
However, this routine does not check for any 
read errors, so this must be done at the main 
routine. This time I searched for \22 BB D5 
03\<3/0.FFFFP. 

This time I found three occurences at 
$043F, $046D and $049A. Tracing 
backwards, I found the subroutine starts at 
$03A0. Since the routine is quite long, I won't 
list the code. However, you could follow my 
procedure and list the code yourself at your 
leisure. A search for the call to $03A0 turns 
up $6C9F. I replaced the call with a LDA 
instruction and bingo, it works! So, disk copy 
the disk and make the foUoing sector edits. 



Block Byte(s) From 



To 



$3B3 $8D 



F4 3A 06 F4 01 
00 22 00 00 00 



F4 3A06F4 01 
00 AF 00 00 00 



Softkey for. . . 



Magical Myths 

Unicorn Software 



■ Requirements 

D Apple II, Ilgs with 512K 

n Copy II Plus or any other block editor 

Magical Myths is an educational program 
that teaches Greek Myths. The program 
employs very nice graphics and crystal clear 
digitized voice that tells you "That's right" , 
"Whoops!", "Please type in your name", etc. 
A fast copy yields no error at all. Hmm, 
probably a nibble count. A search for A2 21 A0 
01 found the offending code: 



PHB 


save data bank 


PHP 


save status bank 


PHK 


save program bank 


PLB 




PHA 




JSL $006A66 


initialize 


PLA 




SEP %0011000ia 




LDX #$21 


track 21 


LDY #$01 


side 


JSR $6A3F 


count nibbles 


BCS $1191 


if read error bombs 


CPX #$B0 


count 


TYA 




SBC #$1D 




BCC $1189 




CPX #$78 




TYA 




SBC #$1E 




BCS $118D 




LDX #$20 


track 20 


LDY #$01 


side 


JSR $6A3F 


count nibbles 


BCS $1191 


if read error bombs 



CPX #$40 count 

SBC #$1F 
BCC $1189 
CPX #$08 
TYA 

SBC #$20 
BCS $118D 

RTL 

Since the subroutine returns to the caller 
if the count is successful, I placed a RTL at the 
start of the subroutine, and it works! 



Block Byte(s) From 



To 



$1EE $141 8B08 4BAB48 6B08 4BAB48 



More on Tower of Myraglen 

As requested by Jim Hart, I am listing a 
disassembly of the protection of Tower of 
Myraglen. But please note that the code is quite 
scattered and includes some other set up 
routines to confuse the cracker. So I ignored 
some parts of the code and you should also 
ignore any code without comments. You could 
disassemble it yourself by first diskcopying the 
disk, ignoring the error on block 7. Boot the 
copy and when it says "Boot from orig inal 
disk", eject the disk and press |BRKSET| two 
times. When the "Ch eck start up device" 
message appears, press |BRESKT| once more. 
You should be in BASIC. Enter the monitor and 
type 1/81EFL. Then just fool around. 

The main call is to this subroutine: 



CLC 


clear carry flag 


XCE 


native mode 


REP #30 




PHD 


save registers 


PHB 




PHX 




PHY 




JSL $018302 




BCS 8211 




JSL $8216 




JSL $018307 




PHA 




LDA $87C7 




PHA 




A disassembly of the call to 8302 yields: 


PHK 


store program bank 


PLB 




STX 87BC 


store device name 


STY 87BE 


store device name 


JSL $E100A8 


caliPRODOSie 


20 00 


20= get device number 


BC 87 01 00 0187BC = addr of parm table 


BCS 8327 


error bombs 


LDA #$000043 




AND #00FF 




TAX 




LDA $87C0 


store device number 



STA $85A6 
STX $85A8 
RTL 

Thus the first call is only to get the device 
number, which is needed to issue a read block 
command. The second call to $8216 sets up the 
screen. The final call to $01/83D7 is really 
messy, through some subroutine calls (JSR) and 
branch instructions, control is passed to $8894: 



LDA #$FF 


set data buffer 


STA $8A9D 




LDA #$00 




STA $8A9C 




REP #$30 




JSL $E100A8 


caliPRODOSie 


22 00 


22 = read block 


99 8A 01 00 


$01/8A99 = addrofparmtbl 


REP #$10 




SEP #$20 




PHP 


manipulate result 



A look at the parm table list: 

8A99: 0100 device^ from 1st call 

AA00FF00 data buffer 
07 00 00 00 block to read 

Thus the program set up (through some 
confusing jumps) a read block $007 command, 
and the result should be a read error. The 
routine finally returns with a value of $0B in 
the accumulator. In the softkey I changed the 
compare accumulator with #$OB, branch if not 
equal instructions into a load accumulator with 
#$OB, branch always instructions. Hojje that 
helps, Jim. 

Some Notes on Electronic Arts 

I would like to clear some confusion over 
the protection on Electronic Arts (EA) 5 1/4" 
disks. Please note that for all Apple drives, if 
you write something on a specific track, the 
signal will bleed over to the adjacent half-tracks. 

Most EA programs before Legacy of 
Ancients have a read error on track $06 using 
fast copy. This was often incorrectly referred 
to as a nibble count by COMPUTIST 
contributers. Track $06 gives a read error 
because it has an image of track $05 written 
on it. Tracks 5, 5.25, 5.5, 5.75 and 6 all have 
an image of track 5 (probably written with a 
special extra wide head). 

Earlier EA stuff (like Seven Cities of Gold 
& Adventure Construction Set) only check the 
sectors on track 5, 5.5, and 6, and expect all 
tracks to have no read errors and a track mark 
of 5. You cannot just copy track 5, 5.5 and 6, 
since if you copied track 5 and then 5.5, the 
signal at track 5.5 will bleed over to track 5, 
making it unreadable. But it is possible to copy 
these disks by bit copying track 5.25 and track 
6, since the two tracks we wrote this time are 
separated by three-quarter tracks, it is far 
enough to prevent the two from interfering with 



October 



COMPUTIST ^0 



19 



each other, and since track 5 and track 5.5 are 
only .25 track from 5.25, both 5 and 5.5 will 
have a valid image of track 5 by just writing 
5.25, therefore track 5,5.5 and track 6 will all 
be readable. Later EA disks (like Sky fox) check 
all tracks (5, 5.25, 5.5, 5.75 and 6) making 
them impossible to bit copy. 

Some Notes on Epyx 

On almost all Epyx programs from 
Summer games to Arctic Antics, a protection 
known as Prolok is used. This protection is also 
used by many other firms (like Broderbund in 
Wings of Fury and Where in Europe is Carmen 
Sandiego). The disk (usually track $00) has 
a sector with about $5B bytes of 96 followed 
by 100 bytes of E 7. The first few E 7s following 
the last 96 have a specific number of zero bits 
following each of them, and the protection 
checks for them. This bit insertion protection 
for a series of bytes is impossible to copy with 
normal bit copiers, since bit copiers cannot 
determine the exact number of zero(es) after 
each byte, let alone determine the exact number 
of zero(es) after a series of bytes. You can only 
copy it with EDD or Copy U Plus by using very 
advanced parameters. You can just bit copy it 
with EDD IV Plus if you happen to have enough 
bucks to buy it. EDD IV Plus has a hardware 
card that enables it to read the extra zero(es) 
after each byte. 

The read routine usually looks like this: 



2012 LDA #$80 


set up no. of tries 


2014 STA $67 




2016 LDX $6B 


load slot no. 


2018 DEC $67 




201A BEQ 207A 




201C JSR $B944 


read address header 


201F BCS $207A 


error bombs 


2021 LDA $2D 


get sector no. 


2023 CMP #$05 


should be 5 


2025 BNE 2018 


else re-read 


2027 LDY #$00 


max. no. of nibbles 




before data header 


2029 LDA $C08C,X 


read a byte 


2020 6PL $2029 




202E DEY 




202F BEQ 207A 




2031 CMP #$D5 


find data header 


2033 BNE 2029 


if not retry 


2035 LDY #$00 


should find E7 in $h 




bytes 


2037 LDA $C08C,X 


read a byte 


203A BPL $2037 




2030 DEY 




203D BEQ 207A 




203F CMP #$E7 


find first E7 


2041 BNE $2037 




2043 LDA $0080, X 


read second byte 


2046 BPL $2043 




2048 CMP #$E7 


should be E7 


204A BNE $207A 


else bombs 


2040 LDA $0080, X 


read third byte 



204F BPL $2040 




2051 CMP #$E7 


should be E7 


2053 BNE $207A 


else bombs 


2055 LDA $C08D,X 


clears the latch 


2058 LDY #$10 


max. no. of errors 


205A LDA $0080, X 


read a byte 


205D BPL $205A 




205F DEY 




2060 BEQ $207A 




2062 CMP #$EE 


findEE 


2064 BNE $205A 




2066 LDY #$07 


checl(7bytes 


2068 LDA $0080, X 


load a byte 


206B BPL $2068 




206DOMP ($1E),Y 


IE contains 80 and IF 




contains 20 hence it is 


206F BNE $207A 


comparing the bytes to 


2071 DEY 


bytes at location 2080 


2072 BPL $2068 




2074 JSL $130A 




2077 OLC 




2080; EEEEFOE7EEFOE7 



00011111 
00111111 
01111111 

11111111 



11110010 
11100101 
11001011 
10010110 



110- 
10- 
0— 



A legal byte always has its hi-bit set (1). 
You don't see a nibble dump with bytes less 
than 80, do you? To understand the routine you 
need to know how the disk drive reads a byte. 
The drive has a latch, and the latch is eight bits 
wide. When the drive reads a byte, the highest 
bit (7th) of the data byte enters first into the 
lowest bit position of the latch. The next bit 
(6th) then enters into the lowest bit of the latch 
pushing the first bit over to the next bit position. 
This continues untU the highest bit of the data 
(7th) has been pushed into the highest bit (7th) 
of the latch, then the BPL intruction (test to see 
if bit 7 is not set) of the read loop is not taken 
and so a byte is read. Then when the latch 
holding a byte detects another set bit (1) coming 
(the 7th bit of the next byte), it clears itself to 
$00 (8 zero bits) and lets the 7th bit enter into 
the lowest (Oth) bit of the latch and the whole 
process is repeated. Any extra zero bits after 
a byte are not read into the latch. The byte in 
the latch is simply held longer than usual as the 
latch waits for the next set bit (1) of the next 
byte to be read. The following example shows 
a bit stream consisting of a FF 96 loading into 
the data latch. 

00000000 11111111 10010110 The latch clears 
itself as it detects a 1 bit coming (from 
the 7th bit of FF), assuming it just read a 
byte. 

00000001 11111111 0010110- 7th data bit 
enters latch as bit 0. 

00000011 11111110 010110- 6th data bit 
enters, 7th data bit shifted left to bit 1 
of latch. 

00000111 11111100 10110— and so on.,. 

00001111 11111001 0110 



The 7th data bit entered the 7th bit position 
of the latch, the BPL instruction is not taken, 
the accumulator then holds FF, the byte is thus 
read. 

If the next byte is 96, then when the latch 
detects the first set (1) bit of the 7th data bit 
of 96 (1001 01 10), it clears the latch and the 
whole process is repeated, got it? Suppose the 
FFisalObitsyncbyte(1111111100),soithas 
2 extra zeroes. When the latch reads all of the 
bits of the FF byte (1 1 1 1 1 1 1 1), it then reads a 
O bit, and it does nothing, the latch still holds 
the FF. It then reads another bit, which is also 
zero, and so it does nothing again. Then it reads 
a 1 bit (from the 7th bit of the next data byte), 
and it clears itself and repeats the whole load 
and shift process. So, to a LDA C08C,X and 
BPL instruction, sync bytes and normal bytes 
are the same, only that sync bytes stay in the 
latch longer. 

Traditional nibble copiers used this kind of 
command to read nibbles, hence it is impossible 
to determine the number of zeroes after each 
byte, they simply don't appear in the latch. So 
nibble copiers have to rely on the user and make 
intelligent guesses as to where the sync bytes 
are. More advanced copiers like EDD use 
another kind of read routine enabling it to 
determine the number of zeroes after each byte 
with high accuracy (but not 100%, that's why 
EDD cannot copy Prolok protection). That is 
the reason why EDD is so powerful, but 
discussing it's read routine is out of the scope 
of this article. 

Prolok protection uses a different I/O 
technique, using LDA C08D,X to deliberately 
clear the latch before the whole byte is read. 
One thing to notice is that the series of E7s 
have 1 , 2, 0, 1 , 2, 0, 1 , and 1 zeroes after each 
of them respectively. (See box below.) 

Now look back into the subroutine, after 
finding the data header, the routine looks for 
the first E7, then it reads two more, thenit clears 
the latch\ At this time, the first 3 bits of the next 
E7 have already entered the latch, asAare cleared 
by the LDA C08D,X command . Thus the 2nd 
bit of the fourth E7 becomes the 7th bit, the 1st 
bit becomes the 6th bit and the Oth bit becomes 
the 5th bit, the extra zero becomes the 4th, the 
7th bit of the next byte becomes the 3rd, and 
so on until the 4th bit of the next byte becomes 
the Oth bit. The byte read becomes an EE, 
instead of E7 in the nibble dump. Notice that the 
extra zero after the first E7 is read into the latch 
as part of a bit of EE . In this way , the pattern of 



I EE II E7 I I FC II EE I I E7 I I FC II EE II EE I 
E7E7E71110011101110011100in0011111100111011100111001110011111100111011100111011100111 
I E7+1 I I E7+2 I I E7+0 II E7+1 I I E7+2 I I E7+0 II E7+1 I I E7+1 I I E7+0 I 
Al I of the remaining E7s are normal (without extra zeroes) . 



20 



coMPunsT mo 



October 



extra zeroes after each E 7 can be determined to 
be 1, 2, O, 1, 2, O, 1, and 1 by making sure 
that the bytes read after clearing the latch are 
EE E7 FC EE E7 FC EE EE. If this all sounds too deep 
for you (its rough water for the novice), try 
reading Beneath Apple E>OS, and Disk and Disk 
Hardware in Copy n Plus menu appendix A. 
Hope this solves the conftision. 

For Mr. Ron Balewski: The Locksmith 6.0 
auto boot code tracer, traces disks by emulating 
the 6502 CPU. Since emulating requires much 
more time to run the same program, your 
computer will not be able to keep up with disk 
access as usual. Everything, including disk 
reading, will be slowed down. In order to make 
disk access possible, the designer reads the 
whole track into a buffer, and whenever a byte 
is to be read, the tracer returns a byte from the 
buffer. This makes tracing possible. When you 
use it to trace Arctic Antics, however, it will 
still return bytes from the buffer whenever a 
byte is to be read. So even if the clear latch 
command is taken, the byte read (expected to 
be EE) will still be a E7, since that is what the 
tracer read into the buffer well before the 
protection routine is running. Got it? 

Well, enough of this for now. See you next 
time. Happy cracking. 



Ron Oippold 



Softkey for.. 



Ultima V 

Origin 



Ultima V provided another clear example 
of copy protection coming between the user and 
the program. The computer that I use most of 
the time is an Apple Ugs with the old Disk II 
drives, on which Ultima V runs perfectly. 
However, at times I have to move to a Ilgs with 
a DuoDrive, and the game will not even boot 
at all on this computer. A call to Origin only 
revealed that "Ultima V will not work with 
DuoDrives. " I don't know if that's totally true 
or not, but it certairfly was valid in my case, 
so the only thing to do was to break Ultima V. 

Here, we are in luck. Of the eight disk 
sides, only the boot disk is protected, and the 
protection is pitiful. Ultima V was seven months 
overdue, and my guess is that they didn't have 
the time to put a decent protection on the game. 
With that background, let's take a look at the 
boot disk. 

With a nibble editor (Copy II Plus, etc.) 
or some other utility, it can be seen that tracks 
$00, $01, and $02 are not protected at all, 
which makes the job that much easier. Now, 
examine track $03. Predictably enough, the 
checksums and epilogues are altered. However, 
there is one more tricky detail. The sectors are 
not numbered from $00 to $0F, but from $11 



to $20! And that's the whole protection. 

There are a couple of easy ways to fix this, 
but I chose one that most people could relate 
to: Super lOB 1.5. We wUl modify RWTS to 
read the Ultima V disk. Luckily, the elimination 
of one of the routines to check the epilogues 
will leave just enough room for the code to 
translate the sector numbers. I realize that the 
code that I have provided for the controller and 
the RWTS routine are lengthier than necessary, 
but they are easier to understand. 



I 1 I Boot a normal DOS 3.3 disk. 

I 2 I At the Applesoft prompt, enter the 
monitor. 

CALL -151 

rrn Make a copy of RWTS. 
1900<B800.BFFFM 



I 4 I Disable some checking. 
1A2D: 18 60 



I 5 I Disable the rest of the checking, and 
translate sector numbers. 

1A88: AO 00 38 AS 2D E9 11 85 2D A9 AA 18 



Here's what you just entered: 

A0 00 LDY #$00 preserve original exit value 

38 SEC 

A5 2D LDA $2D 

E9 11 SBC #$11 

85 2D STA $20 

A9 AA LDA #$AA preserve original exit value 

18 CLC 

60 RTS 



I 6 I Save the RWTS to disk for Super lOB 
to use. 

BSAVE ULTIMAV.RWTS,A$1900,L$800 



I 7 I Use Super lOB and the Ultima V 
controller to copy the boot sides. 



I 8 I Copy the rest of the sides any way you 
want to. 

That's all! There shouldn't be any "hidden 
protection" popping up later, as I have 
completed the game with no such problems. It 
is, by the way, an excellent game, and well 
worth the money. 

Controller 

1000 REM ULTIMA V CONTROLLER 

1001 REM 1ST PART: THE 1ST 3 TRACKS 

1010TK = 0:LT = 3:ST=15:LS=15:CD = WR:FAST = 1 

1020 GOSUB 490: GOSUB610 

1030 GOSUB 490: GOSUB 610: IF PEEK (TRK) = LT 

THEN 1050 
1040 TK = PEEK (TRK) : ST = PEEK (SCT) : GOTO 1015 
1050TK = 3:LT = 35:ST=15:CD = WR 
1060 GOSUB 360: GOSUB 490: GOSUB 610 
1070 GOSUB 360: GOSUB 490: GOSUB 610 



1075 IF PEEK (TRK) =LT THEN 1100 
1080 TK = PEEK (TRK) : ST = PEEK (SCT) : GOTO 1060 
1100 HOME: PRINT "COPrDONE" : END 
10010 PRINT CHR$ (4) "BLOAD'ULTIMAV.RffTS, 
A$1900" 

Checksums 

1000 - $356B 1060 - $A448 

1001 - $7F4B 1070 - $2104 
1010 - $3D93 1075 - $C4E7 
1020 - $337B- 1080 - $78EA 
1030 - $DDCB 1100 - $ABA7 
1040 - $44DE 10010 - $8E3F 
1050 - $2404 



Jack R. Nissel 



Softkey for... 



Railroad Works 

CBS Software 



Softkey for... 



LazerMaze 

Avant-Garde 



■ Requirements 

D A blank disk for each title 

D FID from your DOS 3.3 system disk 

□ A way to reset into the monitor 



I 1 I Boot your DOS 3.3 system disk. 
Insert a blank disk in the drive and INITialize it. 

mrr HELLO 

DELETE HELLO 



I 2 I Boot the original disk and when the 
Applesoft prompt appears reset into the 
monitor. 

I 3 I Remove the original disk and insert 
the initialized disk. Move the RWTS to a safe 
place and boot your initialized disk. 
6800<B800.BFFFM 
C600G 



I 4 I Put the disk with FID into the drive. 
CALL-151 
BLOAD nD,A$803 
B800<6800.6FFFH 
803G 



I 5 I Follow the prompts and copy all files 
from the original to the blank disk. When asked 
for the file name enter " = " and when asked 
if you want prompting enter "N". 

You can put a fast DOS on your copy but 
for Railroad Works use Pronto-DOS since 
Diversi-DOS will not allow the copy to boot 
properly. 



October 



coMPUTisT jrao 



21 



fSoftkeyfor.. 



Softkey for.. 



Ace Programmer 
Robomatb 

Mindplay 



Both of these titles can be deprotected by 
using the softkey for Mindplay software in 
COMPUTIST #52 

*Ugs Softkey f or... 



Kings Quest I (GS) 

Sierra On-Line 



■ Requirements 

□ A blank 3.5 disk 

n Any fast copy program that can ignore errors 

D A sector editor 

j t I Copy the original disk to your blank 
disk and ignore a read error if one is 
encountered. 

I 2 I Scan the disk for 00 F0 IE 22 00 and 
change the F0 to 80. 1 found it on block $073, 
byte $1D7. 



Block Byte(s) From 



To 



$073 $1D7 F0 



I 3 I Write the sector back to the disk. 
*ngs Softkey for... 



Aesop's Fables (GS) 

Unicom Software 



■ Requirements 

D 2 blank 3.5 disks 

D Any fast copy program 

D A sector editor 

I ^ I Copy both of the original disks to your 
blank disks. 

I 2 I . Make the following sector edit to 
disk 1. 



Block Byte(s) From 



To 



$316 $1B0 F0 



I 3 I Write the sector back to the disk. 



Scott M. Simon 



Type! by Broderbund has been on the most 
wanted list for quite a while. This krack was 
right under our noses, so let's get started and 
get a readable copy from the original disk. 



Type! 

Broderbund 



22 



■ Requirements 

D Apple II and up 
D Editor 
D Disk 

I 1 I First, let's use COPYA and DOS 3.3 
minus some error checks. Boot a DOS 3.3 
system disk. 

LOAD COPTA 

BLOAO COPT.OBJO 

70 

CALL-151 

B942:18 

B925:18 60 

3D0G 

RUN 

I 2 I When COPYA is finished get outyour 
sector editor (like COPY H Plus) and sector edit 
the disk to wipe out the nibble count routine. 

Trk Set Byte(s) From To 

$00 $0A $2D-2E 20 00 01 EAEAEA 



Softkey for.. 



Tales Of Fantasy Series: 

The Dark Tower 
The Frog & The Fables 



Microzine 



■ Requirements 

D 64K Apple H and up 
D COPYA 
D Copy II Plus 
D Blank Disk 

The Tales of Fantasy series by Microzine 
is quite good for a story book game. The disk 
is fairly simple to deprotect. Upon examination 
of the copied disk, I located a IMP to reboot 
(4C OO C6). I then examined the disk and 
changed a LDA command to load track $06. 
That enabled me to catalog the disk. After 
looking at the catalog. I noticed a couple of hello 
programs and experimented to find the right one 
to load. I then used the rename feature of COPY 
II Plus and renamed the startup file to HELLO. 
The disk still did a disk check but I found that 
all that was need was to change one command 
from 83 to A0 on track $0 1 , sector $07 . That was 
it and it works for both programs. 

I 1 I First, let's use COPYA and DOS 3.3 
minus some error checks. Boot a DOS 3.3 



system disk. 

LOAD COPTA 

BLOAD COPT.OBJO 

70 

CAU-151 

B942:18 

B92S:18 60 

300G 

RUN 



I 2 I When COPYA is finished use COPY 
II Plus to sector edit the disk to wipe out the 
nibble count routine and change the startup 
program to HELLO. 

Trk Set Byte(s) From To 



$00 $06 $42 

$0C $49-4B 
$01 $07 $72 



34 

4C 00 C6 

B3 



06 

EA EA EA 



Softkey for.. 



Arctic Antics 
Spy vs Spy in 

Epyx 



■ Requirements 

D 64K Apple II and up 

D COPYA 

D Sector Editor 

n Blank Disk 

This disk was a little more difficult. I want 
to thank Glen Craig for his assistance and 
Willem Moolenaar COMPUTIST #50 for the 
right routine to insert and get this Epyx disk 
working. Basically all I did was to get the disk 
in a readable format to find the nibble count 
routine. Then I listed the machine code for that 
track and knocked out any branches that would 
pass the nibble routine. With the routine that 
Willem provided, I was able to get the disk to 
load and run. So my thanks to both of you. Here 
is what I did. 



I 1 I First, let's use COPYA and DOS 3.3 
minus some error checks. Boot a DOS 3.3 
system disk. 

LOAD COPTA 

BLOAD COPT.OBJO 

70 

CALL-151 

B942:18 

B92S:18 60 

3D0G 

RUN 

t 2 I When COPYA is finished get out your 
sector editor (like COPY II Plus) and sector edit 
the disk to wipe out all branches as listed, then 
change the nibble count routine to a load 
routine. 



COMPUTIST <rao 



October 



Trk Set Byte(s) From 



To 



$00 $0B $51-52 


D0F4 


EAEA 


$5A-5B 


D0 4C 


EAEA 


$63-64 


D0 43 


EAEA 


$76-77 


D0F4 


EAEA 



Insert Willem Moolenaar's 

Trk Set Byte(s) From 


routine. 

To 


$00 $0B $7A-87 A0 07 BD 8C C0 
10 FB 99 F0 00 
EA 88 10 F4 


EA EA A9 FC 85 
F0 85 F3 A9 EE 
85 Fl 85 F2 






David L. Perez 1 


Softkeyfor... 


RAD Warrior 

Epyx 



■ Requirements 

n Apple He 
D Disk Drive 
D Blank disk 
D DOS 3.3 disk 



I 1 I Boot your DOS 3.3 system Disk. 

I 2 I Tell DOS to ignore checksum & 
epilog errors and use COPYA to copy the 
original to your blank disk. 

POKE 47426,24 
RUN COPTA 



I 3 I Make the following sector edits to the 
copy. 

Trk Set Byte(s) From To 



$00 $05 $43-44 
$4C-40 
$55-56 
$68- 



? EAEA 
? EAEA 
? EAEA 
? EA EA EA EA EA EA A9 FC 

85 FO 85 F3 A9 EE 85 Fl 

85 F2 



Softkey for.. 



Mind Prober/Mind Over 
Minors (the Teaclier's edition) 

Human Edge Software 



This program is the equivalent of Mind 
Prober, i.e. it asks whether the person you are 
assessing is friendly, out going, quiet, etc. Then 
aftei- answering agree or disagree to 65 
questions, the program assesses the responses 
and outputs a report on the subject to screen 
or printer. The Teacher's Edition is very helpful 
in explaining what tact the teacher might take 



with some students. I deal with many behavior 
disordered children and have found this 
program very usefiil. However, it writes the 
assessment when complete back to disk. I was 
apprehensive about writing information back to 
the original, so I set out to back it up. I had 
a difficult time, so after I had a bit-copy, I 
decided to unprotect it. 

I found I could COPYA it but it wouldn't 
run. When I cataloged the directory I found a 
couple of interesting things. First was a file 
called Runtime. Runtime is short for Runtime 
Library. It is the pre-emptive program used with 
BASIC programs that have been compiled into 
machine language. I knew that in loading the 
main Mind Over Minors program I would first 
have to have the Runtime Library program in 
memory. I then tried to BLOAD/BRUN a 
couple of the other files on the disk. Then I 
decided on the obvious, which was to load and 
list the Hello program. In this loader they first 
BLOAD RUNTIME then BRUN GR.OBJ.. I 
wrote my own loader then saved it as my Hello 
program to the COPYA copy of my Mind Over 
Minors. The program now runs fine minus the 
protection scheme. 

I 1 I Use COPYA to copy the program disk 
and disks #1, #2 & #3. 

I 2 I Put the program disk in the drive. 
UNLOCK HELLO 
DELETE HELLO 



I 3 I Enter this short hello program and 
save it to the program disk. 
4000 PRINT CHR$(4)"BL0AD RUNTIME" 
CHR$(13) CHR$(4) "BRUN GR.OBJ." 
SAVE HELLO 

You're done! 
"1; Softkey for... 



Wagons West 

Focus Media 



The softkey for American People by Focus 
Media (COMPUTIST #56) also works on 
Wagons West. 



John Bishop 



Slow speeds for Arcade Games 

So you've got yourself some nice games 
to play with on your computer. But while you're 
blasting away at the aliens or driving furiously 
through the mazes, your little brother or sister, 
or your young child, just sits and stares. Sure 
the games look fiin, but they're just too fast for 
the little kid's reflexes. So what do you do? 
What any good computist would do: jump into 



the code and slow the game down. 

Although it might seem at first like a 
monumental task to dig through the two 
hundred or so sectors of data in the typical game 
just to try and slow it down, it really isn't very 
hard. It took me just twenty minutes to complete 
the process the first time I tried it. There are 
a couple conditions that the game must meet 
before it can be patched. First, it must be 
deprotected. Fortunately, with back issues of 
COMPUTIST, this isn't too hard. Second, the 
easiest modifications are done to single load, 
single file games. "Slow-ups" can be done to 
whole disk programs, but these are more 
complex. 

The general idea behind the modifications 
is that you want to add a bit of code to the 
program that does nothing but waste time. The 
simplest way to do this is with a five byte loop: 

A9 XX LDA #$xx 
IQ A8 FC JSR $FCA8 

where xx is any number ($00-FF) with 
higher numbers producing longer delays. The 
trickiest part is finding somewhere to put the 
loop. Every game that uses the joystick 
pushbutton must address either $C061 or 
$C062. If the game uses the joysUck it must 
use location $C07O. And every game that uses 
the keyboard must address location $C00©. 
By searching the file for one of these locations, 
and then replacing it with a jump to your delay 
loop, you can slow down the whole program. 
An extremely useful utility for doing this is 
Enrique Gamez's Crucial Code Finder (CCF) 
found in COMPUTIST #6. If you don't have 
this handy utility, any file ZAP program should 
work. Let's go step by step through the process 
on the old classic Galaxian. 



I 1 I First turn on the computer and 
immediately press iQRESETl . then zero all 
RAM memory. 

300:00 
30K300.BFFFM 



I 2 I Now boot the disk with Galaxian on 
it, and BLOAD the file. Search through 
memory for empty spaces . Stay away from the 
hi-res pages ($2OOO-$60OO) because they 
often get written to and moved about during the 
game. The best places to try are very high and 
very low memory locations. When you find a 
suitable place, write it down. For some reason 
I usually use $BA69, I don't even remember 
why any more. 

I 3 I BRUN your ZAP program, or if 
you're using CCF, BRUN it. If you're using 
CCF, be sure to note the BLOAD address of 
the game by checking locations $AA72 and 
$AA73 before you BRUN the utility. The start 
of the game is stored here in lo/hi format. For 
my copy of Galaxians, it was $1FDC. 

Now search the program for the bytes AD 
61 C0. You might find these bytes more than 



October 



COMPUTIST <j«0 



23 



once. Write them down. If you're experienced 
in poking through games, you'll quickly 
recognize which one is the pushbutton reference 
that is important. Otherwise, trial and error with 
modifying each reference should quickly 
produce the proper one. 

I 4 I When you fmd the bytes (I found them 
at $2AA5 with CCF) change them to a JSR to 
the free space in memory you found earlier: 

2AA5:29 «9 BA 

If ywi're using a ZAP program, you'll have 
to write this sector back to disk and continue 
the rest of the process by hand each time you 
BRUN the game. 

I 5 I Now insert the delay loop, add on the 
pushbutton reference you overwrote earlier, and 
RTS back to the main program: 

BA69:A9 n 20 A8 FC AD 61 CO 60 



I 6 I Check out you're handywork by 
starting up the game: 
IFDCG 

The only flaw to this is that you have to 
add the mod to the program each time you play 
it, and this can get tedious. One way to solve 
this problem is find out where the game starts, 
count backwards $09 bytes, and put the delay 
loop there (don't forget to tell the program to 
JSR there instead of $BA69 if you do this). 
Then count back $03 bytes before the delay 
loop and add a jump to the start of the program 
(4C DC 1 F) . BS A VE the whole game back to disk 
with a starting address $OC bytes less and a 
length $OC bytes more. This doesn't always 
work though because many games go through 
several memory moves after they are loaded, 
and you're mod might get overwritten. Another 
place to squeeze the loop in is where the game 
changes the reset vector. If there's a couple 
extra bytes to this code you can often put the 
delay loop there. Other places are at Ihe end 
of hi-res pages and where copy protection 
routines used to be. 

Don't save the modified file over your 
original. Make a backup for safety in case it 
doesn't work. 

Here are modifications for some of the 
games I have. Be careful when you do these 
because the locations might be different for your 
copy . Remember: "xx" isa number you select 
to set the delay. Larger numbers are longer 
delays and make the game run slower. Enter 
a number for the "xx" when you make these 
mods. 

Autobahn 

B40:20 OO 90 

9000:A9 xx 20 A8 FC AD 00 CO 60 

7FDG 

Genetic Drift 

43E0:20 69 BA 

BA69:A9 xx 20 A8 FC AD OO CO 60 

FFDG 



Buzzard Bait 

79E©:20 69 BA 

BA69:A9 xx 20 A8 FC 2C 70 CO 60 

7FDG 

Sabotage 

216C:20 69 BA 

BA69:A9 xx 20 A8 FC AD 00 CO 60 

IDOOG 

Spy's Demise 

69DE:20 69 BA 

BA69:A9 xx 20 A8 FC AD OO CO 60 

3FEDG 

A.E. Stingray 

This slow down mod is my favorite because 
it allows for variable speeds. By holding down 
pushbutton 1 (the one that doesn't shoot) you 
can slow down the game. Just release the button 
when it gets to the speed you want. If you 
overshoot and make it too slow, keep holding 
down the button and the speed will slow all the 
way down and then jump back up to normal. 



UTIL.l 
UTIL.2 



Trk Set Byte(s) From 



To 



$13 $05 $24-26 AD61C0 20 6103 

$06 $09-0B AD 61 C0 20 61 03 

$07 $E5-E7 AD61C0 20 6103 

$02 $04 $65- A9 00 F0 14 A9 4C 59 FF AD 62 

01 D0 10 A9 02 C0 10 03 EE 6A 

D0 0C A9 03 D0 03 A9 01 20 AS 





08A9 04D0 04 FCAD61C0 60 


Be 

disk! 


sure to write all these sectors back to 




Swampfox 1 


Softkeyfor... 


J&SGradebook 

J & S Software 



■ Requirements 

D Apple n. He, Dgs 

D /RAM Disk with at least 150K 

n Apple System Utilities Disk 

Note: When I refer to /RAMS use the name 
of your /RAM Disk. 

I 1 I Boot the J & S Grade B ook disk . 
When the title page comes up press IrksktI . 

BLOAO PR0D0S,TSTS,A$2000 

CREATE /RAM5/PR0D0S,TSTS 

CLOSE 

BSAVE /RAM5/PRODOS,TSTS,A$2000,$3AOe 



I 2 I Boot the Apple System Utilities disk. 
Format a blank disk with the volume name 
"TEST" and copy ProDOS 1.1.1 to /TEST. 
(Not enough room for a newer version.) 

I 3 I Copy the following files to /RAM5. 
SYSUTIL.SYSTEM 
UTIL.O 



I 4 I Quit and exit to BASIC. 
•/RAM5/PR0D0S 



I 5 I Put J & S Grade Book in drive 1 and 
copy all files from J & S Grade Book to /RAM5 
except PRODOS and SWITCHI.l. 

I 6 I Boot the Apple System Utilities Disk. 
Copy all files from /RAM5 to /TEST except 
PRODOS, SYSUTIL.SYSTEM, UTIL.O, 
UTIL.l, and UTIL.2. Quit to BASIC. 

I 7 I Change the startup program. 
UNLOCK /TEST/STARTUP 
LOAD /TEST/STARTUP 
100 POKE 768,96:POKE 771,96 
SAVE /TEST/STARTUP 
LOCK /TEST/STARTUP 

All done. 



Marc Batchelor 



A Patch for Copy II Plus 



v6.?, 7.?, 8.? 



It seems strange to not be writing in with 
a softkey, but I do have a quick and dirty 
modification to Copy 11 Plus v8.3 that relieves 
a lot of irritation. As the program stands, it is 
great. It has a lot of utilities, and its bit copy 
routines are among the best available. But there 
are some irritating facets about the program that 
can really drive you batty. 

For example, the format disk routine; 
When you want to format a disk, you simply 
choose the FORMAT DISK option, and after 
selecting the operating system under which to 
format, you also must select the disk drive. You 
are then prompted to insert a disk, and you must 
press " Y" saying that you are ready to format. 
After the format is over, you are prompted to 
press return (although any key wUl do) and you 
are returned to the main menu from where all 
this began. Now, this is fine if you only want 
to format one disk. However, I buy my disks 
in bulk (quantities of lOO or more), and I like 
to get them all formatted at once. This business 
of returning to the main menu every time is 
ft^strating. I have to press return through 
several options and press that one "Y". But 
there is a fix for this. 

$9390 is the start of the formatting routine. 

$93 A 1 is the bulk of the formatting code. 

$636B is the message printing routine. 

$6C7C-755A are all of the messages. 

A little explanation of the message printing 
routine is in order. If you load the accumulator 
with a value, and then perform a JSR to $6B6E, 
one of the messages (stored between $6C7C and 



24 



coMPUTisT #eo 



October 



$755 A) will be printed. This is the best way 
to compact code and minimize run time. So to 
try it, type: 

(Ml 

:65 
6B6EG 

You should see the message "FORMAT 
COMPLETE". If not, you did something 
wrong, and should try it again. Any way, this 
is the message that we want to find as it is the 
end of the formatting routine. So, halt Copy II 
Plus during execution and search for: A9 65 20 
6E 5B. Didn't work did it? I tried the very same 
thing. The problem is that there are two (2) 
messages printed at the end of the formatting 
routine. Message 1 being "FORMAT 
COMPLETE" and the other being "PRESS 
RETURN TO CONTINUE". Search memory 
for: A9 65. Success, we find an A9 65 4C 08 7C at 
$948C. At $7C08 is a JSR to $6E6B followed 
by an LDA and then another call to $6E6B. This 
is the ticket. All we have to do is re-route the 
call to the beginning of the formatting routine, 
and we are set. 



I 1 I Use a disk searcher to locate A9 65 4C 
08 7C and change it to 4C 90 93 EA EA 

You are done! Now, instead of telling you 
that the formatting process is complete and 
returning to the main menu, the program says: 
"INSERT DISK TO FORMAT", "READY 
TO FORMAT?". Just press 'Y' to format 
another disk or 'N' or escape or anything else 
to escape. 



Bill Wilson 



Softkey for. . . 



NATO Commander vl.2? 

MicroProse 



■ Requirements 

D Blank Disk 
n Sector editor 
D Apple He 
D One disk drive 

NATO Commander is an older (1984) 
game published by MicroProse and simulates 
a World War III battle for Europe on an 
operational level. As with most MicroProse 
software, they have abused and insulted the user 
by installing incredibly pervasive copy- 
protection on NATO Commander. I ended the 
title of this crack with a question mark, since 
MicroProse is infamous for having yet another 
undiscovered layer of protection. As it stands, 
this softkey will at least allow a user to get into 
the main game routine. I have not extensively 
play-tested beyond this point, but would not be 
surprised if, at some point in the game, all 



Warsaw Pact units turn into full-strength 
armored divisions or something similar. Note 
that this is only conjecture on my part. 

Let's take a look at the protection I found 
and disabled on the disk. MicroProse avoided 
obvious measures such as changing address and 
data marks on the disk, so the disk will copy 
easily with a copy program that will ignore the 
errors on track $22, such as the Locksmith Fast 
Copy. How very considerate of them. Any 
catalog attempt will only generate a "Disk 
Full" message. The game uses DOS 3.3 (or 
something very similar) and the catalog track 
is located on track $07. If you wish to be able 
to catalog the copied disk, copy track $07, 
sector SO, to track $11, sector $0. (An empty 
sector on Vl.2 .) Additionally, the DOS is 
copied into RAM at $DDOO - $FFFF. I suspect 
the motivation here was to make more room for 
program code, however, this move of DOS will 
no doubt confuse would-be disk crackers if 
they've never heard of the "high-DOS" 
technique. 

The "Hello" program is binary and fairly 
obviously named "HELLOPROT.OBJ". Its 
function is to make a nibble count on tracks 
$21.5 and $22. If it likes what it sees, the 
address $DB3A (the Applesoft interpreter entry 
point) is stored in reverse-byte order at $02O0. 
Here is another cute little twist. The program 
loads on memory page 2, which is the keyboard 
buffer. Any attempt to control-reset into the 
monitor and examine it will "plow" several 
bytes of code, since keystrokes were made. This 
is beatable in this case by loading the program 
from disk (using normal DOS 3.3 booted from 
another disk) into an address like $O80O so 
it can be examined at leisure. If the nibble count 
goes well, the accumulator and Y-register are 
loaded with bytes that point to a command (in 
ASCII at $02A9). The command is "Ctrl-D 
(alert DOS a command for it follows) RUN \ 
Ctrl-M (Return key)". Then it jumps indirectly 
to the address pointed to by $020O. "\" is the 
name of the initial Applesoft file to be run. Of 
course, the effect of this is to run "\". 

All of the Applesoft programs on disk are 
also protected! They have an anti-list capability 
built into them that works in this manner. Every 
few lines, there is a REMark statement followed 
by eight control-H's (backspaces to cover the 
statement from prying eyes), eight spaces, a 
control-M (carriage return), a control-D (to 
signal DOS), and the command "FP". When 
listing, the Applesoft lister prints characters to 
the screen or printer. By outputting the control- 
D, DOS is alerted and the FP (similar to the 
"NEW" conunand) command is executed. The 
FP is followed by $00 's which indicate an end 
of program. This is infuriating protection, since 
the A/S programs can only be listed for one or 
two lines before the FP command is executed 
and trashes the listing. If you wish to list the 
A/S programs, scan the entire disk for the bytes 



"04 46 50". Change the "04" in each case 
to "20" (space). Without the "04" (control- 
D), the FP will be ignored by DOS and the 
program will list normally. Why doesn't this 
protection blow out the A/S program when it 
is running? When the program is running, the 
FP won't stop it since it is inside a REM 
statement. The A/S interpreter ignores all lines 
starting with REM. It is not necessary to change 
the 04's for this crack, however, it should be 
done if you want to examine the program logic. 
The next layer of protection I discovered 
involved the process of chaining the A/S 
programs. The program "C" (for Chain, I 
imagine) is used to chain A/S programs. C loads 
at $0208 (again where it is hard to examine) 
and is activated by an A/S call to $03C1, the 
entry point for C. This code follows: 

03C1 4E 22 02 LSR $0222 

Change byte at $0222 from $91 (STA) to $48 (PHA) 

03C4 A4 0A LDY $0A 
load value $9Ffrom he $0A into Y 

03C6 30 02 BMI $03CA 

Always branch over next two bytes that are there only to conjuse the 

listing 

03C8 AD 2D A9 LDA $A92D 
looks legitimate, but not used 
03CA A9 BB LDA #$BB 
get 1st byte of 'jump through stack' address 

03CC 0E CF 03 ASL $03CF 

modify^ the byte in $BCFfrom $A4 (LDY) to $48 (PHAj this pushes 

the 1st byte of the 'jump through stack' address onto the stack 

03CF A4 LDY 

before modification 

03CF 48 PHA 

after modification 

03D0 4C17 02 JMP $0217 

go to next part of code these three bytes are not in the Cfile-they 

are placed at this address by earlier program instructions 

0217 AD83C0 LDA $C083 
access specific higher memory banks 

021A AD83C0 LDA $C083 

021D 98 TYA 

xfer value of$9Fpom Y to accumulator 

021E 69 02 ADC #$02 

add $02 to $9F to get $A1 in accumulator 

0220 05 D6 ORA $D6 

logical-OR value $A1 with value $82 stored at address $D6. This results 

in $A3 being stored in accumulator 

0222 91 8D STA ($8D),Y 

original value at $222-changed by action at $3C1! 

0222 48 PHA 

push second byte of jump through stack address onto stack, leaving 
a return address of$BBA3 after next RTS is executed 

0223 8D 25 02 STA $0225 

modifies instruction, but is only present to camouflage- the actual 
instruction sequence 

0226 60 RTS 

jump through stack to $BBA3 



October 



COMPUTIST #60 



25 



At SBBA3, the program "P" (for 
protection, doubtlessly) is called at RAM 
$D©00. This program executes more nibble 
counts and stores the values 00 F9 DO 07 DO 
07 OO OO OO OO starting at address $0026 
if the nibble counts succeed. If the nibble count 
is good, the accumulator is loaded with $00, 
if not it is loaded with $FF. "P" then returns 
to the routine at $BBA3. The $BBA3 routine 
checks the accumulator. If the accumulator is 
not zero, it pushes an RTS opcode into $BCCF, 
thus rendering that subroutine disabled. If the 
accumulator is zero, a LDX immediate ($A2) 
opcode is pushed into $BCCF, rendering it 
functional. Then, a jump is made to $0208, 
which is the first byte of "C". The chaining 
process goes on normally from there. 

How did I find all of this? I made a bit- 
copy of NATO Commander so that the nibble 
counts would succeed. Then I modified the A/S 
code on disk with a sector editor. The 
modification turned on the text screen and 
jumped to the system monitor at $FF59. The 
modification was placed in the instruction that 
preceeded the A/S instruction to CALL 961 
($3C1). I booted the disk and was rewarded 
with a "beep" and the monitor prompt. Once 
in the monitor, I scanned the code following 
$3C1 at my leisure. 

To defeat this, I made sector edits to "C", 
"S.2" (this has the SBBA3 routine), and "P". 
These follow: 



03C4 A0 9F LDY //$9F 
alwm load Y mih wlue $9F 
03D0 4C 17 02 JMP $0217 
ensure these insimctiom are present 

(Sector edits are at the end of this article.) 

S.2 



BBA6 EA NOP 

remove branch instruction that disables 
BBA7 EA NOP 

routine at $BCCF 



D000 A0 09 LDY #$09 

prepare to move ten bttes 

D002 B9 28D4 LDA $0428, Y 

from $D428-$D431 

D005 99 25 00 STA $0026, Y 

to $26-$2F 

0008 88 OEY 
adjust loop counter 

0009 10 F7 BPL $0002 
loop until ten bvtes moved 

D00B A9 00' LDA #$00 

force accumulator to be zero 

0000 60 RTS 

return to routine at $BBA3 

0428- 00 F9 00 07 D0 07 00 00 00 00 bytes stored b\ good 

nibble count 



This completes the modifications to NATO 
Commander. As I said before, I offer no 
guarantees that this is a complete deprotect. 

Here are the sector edits (and cookbook 
instructions): 



1 1 1 Copy 


NATO Commander with a 


copier (such as 


Locksmith Fast Copy) that will 


ignore errors on track $22. 


1 2 1 Sector Edit: 


Trk Set Byte(s 


From To 


$04 $0A $07 


A9 17 80 01 03 A9 3A8D00 02 




A9 02 80 02 03 A9 DB 80 01 02 




A9 . , . A9 82 85 D6 4C 




A102 


$00 $0A $C0 


A4 0A A0 9F 


$CC 


00 00 00 4C 17 02 


$0B $03 


C8 CB 


$03 $09 $05 


18 90 0F 9A 96 A0 09 B9 28 04 




21 01 60 05 AA 99 26 00 88 10 




96 DE AA 05 F7 A9 00 60 


$0E $47 


D0 08 EA EA 






1 3 1 If you 


want to be able to catalog the 



disk and load its programs from DOS 3.3, copy 
track $07, sector $00, to track $11, sector 

$oo. 



I 4 I Ifyou want to list the A/S programs, 
search the disk for all occurences of 04 46 50 
and change the 04 to 20. 

Let me know via letters to the Apple RDEX 
editor if you discover further protection in the 
game. Thanks. 

I have play-tested the game a bit and found 
to my chagrin that if you don't have the 
"countercodes" asked for by the program, the 
game map will not update unit movement after 
turn one. I left the instructions for the game 
packed away at my parent's home 2,000 miles 
away! This seems to be yet another protection 
measure: if you don't have the game 
documentation, you can forget playing beyond 
turn one! Can anybody send me the 
codes/countercodes via the RDEX editor? 
Please! That's another one I owe MicroProse. 



The Pirate King 



Softkey for.. 



Apple GEOS v2.0 

Berkeley Softworks 



■ Requirements 

D COPYA 

n A sector editor 

D Eight blank disk sides 



The Lock 

The origional GEOS boot disk has a hidden 



bit pattern on one of its tracks. This pattern 
cannot be sector copied because it is not in any 
of the sectors. It also cannot be bit copied 
because part of it is written as sync bytes (extra 
zeros in the bit stream). Instead of trying to 
analyze the pattern I decided to remove it. 

Bootup 

The first stage of boot is located on track 
$00. The main portion of the GEOS code is 
then loaded from tracks $Oi through $OD. The 
code of both sections on the disk is 
"scrambled", making it impossible to search 
the disk for code. I decided to make my search 
in RAM. 

After booting each section into RAM, I 
studied the code and found two subroutines that 
checked for the bit pattern. At the end of each 
routine I found two exits: one for "pass", and 
one for "fail". I decided to modify each "fail" 
exit to indicate "pass". 

Further Security 

The first boot section was written in such 
a way as to make it difficult to analyze. Most 
of the code is "protected" with a checksum 
check. This means that if the code is modified 
the sum of the bytes will change, causing the 
execution to bomb. It turns out that swapping 
two bytes preserves the checksum. The other 
routine was not protected in this way, so 
changing a single byte worked fine. 

The Patch 

Since a disk search was impossible, I had 
to study the code in RAM to find out which 
sectors loaded where in RAM. This helped me 
to determine which sectors needed to be 
modified. Each byte in the sector is 
"EXCLUSIVE-OR"ed with some value 
(different for each byte, I think) while being 
loaded into RAM. I didn't care what this value 
was for each byte, but I knew some facts from 
Boolean algebra. I was able to determine what 
to change the disk byte to. After making the 
changes to the disk I soon had GEOS up and 
running. 

Warning 

As with all software this softkey may not 
work on all versions of GEOS. Ifyou run into 
any other version of GEOS, let me know. 

nr~| Copy all GEOS disks using COPYA 
or any sector copier. 

I 2 I Apply the following sector edits to 
/GEOS.BOOT and /GEOS.BACKUP. 



Trk Set Byte(s) From 


To 


$00 $05 $BD C6 

$C0 57 

$04 $03 $FC 7F 


57 
C6 

5F 



26 



coMPUTisT mo 



October 



^B 



Jeff Hurlburt 



The 



Ratings 

^^^<!<! SUPERB 

^<3<J<J EXCELLENT 

^^<J VERY GOOD 

<?<J GOOD 

^ FAIR 

(S) POOR 

d)® BAD 

d)®® DEFECTIVE 



TimeOut from Beagle Bros 

■ Requires: 

D "Appleworks" 2.0 or later 
D 128K Apple 11 series 
D one 3W or 5 '4" drive 
n 512K Apple Ilgs and two 3'/2" drives 
recommended 

One might suppose that, being the most 
widely used word processor in the known 
universe, "Appleworks" would leave little 
room for improvement. Well, how about 
printouts in multiple Ilgs/Mac fonts, spelling 
checking, on-line thesaurus, custom macros, 
word counts, and file encryption?— for starters! 
These and other most-wanted enhancements 
come to you via Beagle Bros's "TimeOut" 
series. 

"TimeOut" is a collection of separately 
packaged units (e.g. "TimeOut SuperFonts", 
"TimeOut DeskTools", etc.), each of which 
comes with its own manual and software on 
both 3V4" and 5V*" media. Whether you add 
just one or all (thirteen or so) units, 
"Appleworks" will boot about as quickly as 
before and, in fact, look and act much the same. 

Except for a mod so that RESET now 
returns you to the main "Appleworks" menu, 
and a set of handy OPTION key commands 
from "TimeOut UltraMacros", "timeOut"s 
features are accessed via a special menu called- 
up when you enter CMD-ESC. You have, so 
to speak, stepped out of "Appleworks" (hence 
the notion of "time out"), into a world of 



related applications. Suppose, for instance, that 
you are editing a document and wish to check 
your spelling. If "TimeOut QuickSpell" has 
been added to your copy of "Appleworks", 
then entering CMD-ESC and selecting 
"QuickSpell" loads TO.QUICKSPELL; and 
the routine checks your spelling and lists 
'unknown' words — all in about 15 seconds for 
a lOK document on a Ilgs. Following standard 
protocol, one or more ESC's gets you out of 
a "TimeOut" application and back into 
"Appleworks" . 

Naturally, the kind of power boost 
represented by "TimeOut" comes with a price 
tag beyond mere dollars and cents. Your 
souped-up "Appleworks" will cost some 
memory and a fair chunk of disk space — how 
much depends upon the number of units you 
'tack on'. Another expense is greater system 
complexity, especially on 5 W " and single-drive 
3'/4" setups. Basically, the more memory and 
disk space you have on-line, the simpler things 
become. On a two-drive, 1 .25 Mbyte Ilgs, even 
a comprehensive "TimeOut" implementation 
(e.g. seven or eight packages) is nearly 
'transparent'; but, for the ne/5 'A " user, running 
a big "TimeOut" setup is likely to be the 
decisive experience in a move to the Ilgs. 

'Getting a handle' on "TimeOut" and 
assessing tradeoffs is easy once you identify the 
main components. First, there is the system 
'glue', TIMEOUT itself. This is a patch to 
"Appleworks" which locates and hooks up 
your '^TimeOut" applications, presents the 
menu, and launches selected fiinctions. Any 
"TimeOut" package can handle the patching; 
and, unlike some "Appleworks" add-ons, it 
need be done only once. 

At the second level are the applications, 
files with names like TO.THESAURUS and 
TO.FILEMASTER, which do the actual work. 
Often these must access font, dictionary, 
synonym, and other support files. The typical 
"TimeOut" package also includes a BASIC 
program to handle installation plus 
TO.UTILITIES, a 'housekeeping' application 
which lets you "configure" other applications. 
Finally, there will usually be one or more 
example files referenced in manual tutorials. 

When you first patch "Appleworks" you 
tell the BASIC installer program where 
TIMEOUT is to look for the application files 
(e.g. a pathname) and whether or not to expect 
more than one diskette during startup. Later, 
via the "Utilities" function, you configure each 
application. That is, you tell "QuickSpell" 
where to look for its dictionaries, "Thesaurus" 
where to find its synonyms file, etc. . You may 
also specify that an application (not just its 
location) be loaded upon booting. This 
"memory-resident" configuration option lets 
a fimction respond more quickly, but at the 
price of additional memory and longer boot 
times. As illustrated in the earlier "QuickSpell" 



example, non-resident applications are fast 
enough for most situations; AND they use 
almost no memory except when actually 
selected. 

In principle, "TimeOut"s approach is both 
flexible and simple; but things become a bit 
dicey when it comes to simplifying the business 
of user installation. Rather than just listing and 
describing each application file and each support 
file; and leaving it up to you to decide where 
to move what; Beagle Bros wants you to depend 
upon its in-package BASIC installers. 
Unfortunately, some of these will transfer 
applications files, but no support stuff. Many 
will insist upon taking you through TIMEOUT 
patching, whether or not "Appleworks" is 
already patched; and some installers work just 
fine. The manuals, excellent in other respects 
(tutorials, hints, etc.), are similarly 'spotty'. 

Happily, setting up your "TimeOut" stuff 
IS easy. The secret is Apple user common sense 
and a dash of 'hacker' nerve. The common 
sense says; "Use 'Copy II Plus' to move any 
needed files the installer omits". Hacker nerve 
says: "I may forget something; but, what the 
heck!" Indeed, if you do forget something, 
"TimeOut" will let you know without bombing 
your diskettes—- this is a very forgiving system. 

In the long run, unless you are running a 
hard disk, the REAL challenge is 
ARRANGING all those nifty "TimeOut" files. 
(Everyone knows that hard disk types have 
infinite capacity, right?!) For 3'/2", two drive 
systems, the most convenient BIG setup is to 
put all the TO.xxx-named applications files and 
smaller support files on the same diskette as 
"Appleworks". Larger support blocks (e.g. 
"QuickSpeir's dictionaries, "SuperFonts"s 
font files, etc.) can go on your 'standard' startup 
data disk. This way, "Appleworks" startup 
time is increased only a few seconds. 

Beagle Bros claims that its "TimeOut" 
products will be compatible with 
"Appleworks" version 2.0 or later. No doubt. 
Beagle has some kind of commitment from 
Claris; but it doesn't take a marketing whiz to 
see that "Appleworks" is a much more 
attractive product now, than it was last year. 
Whatever additional improvements Claris may 
introduce, I suspect "TimeOut" compatibility 
will be staunchly maintained. It took Beagle 
Bros and "TimeOut" to drag dear old 
"Appleworks", 'kicking and screaming', into 
the Ilgs era. 

The Packages 

This month's focus is upon what I consider 
to be the 'basic two' "TimeOut" units. Other 
members of the series include "QuickSpell": 
a spelling checker/corrector with provisions for 
customized dictionaries and word counting, 
"Thesaurus": a synonym finder, "Graph": for 
creating bar, pie, etc. charts from spreadsheet 
data, "UltraMacros": to add ready-made or 



October 



COMPUnST #60 



27 



custom commands, "DeskTools": for an on- 
line calculator, calendar, notepad, etc., and 
"SideSpread": a utility for lengthwise printout 
of many-columned spreadsheets. 




by M. Somonsen 
$69.95 Beagle Bros 



Of all the "TimeOut" packages, 
"SuperFonts" has to rank as THE essential 
"Appleworks" enhancement. Now you can get 
proportionally spaced printouts in one or more 
Ilgs/Mac fonts (including nearly fifty on- 
diskette files) in character sizes ranging from 
6 through 127 point. 

After setting options for Page Setup (i.e. 
y/n for "Tall Adjusted" and "50% 
Reduction") and Print Quality ("Draft", 
"Standard", and "High"), just about 
everything else is in-document programmable. 
You sjjecify font, size, and style (e.g. regular, 
italics, outline, shadow, and inverse) via simple 
"< >" commands. For example, 
"<l=times.l2>" and "<2 = new.york.l2>" 
at the start of a document, load in the two fonts 
and assign reference numbers. Subsequent 
"<2>" and "<1>" entries in the text then 
switch between the fonts during printout, with 
"<OB>" (for "Outline Begin"), etc. to handle 
style shifts. Similarly, "<pl =FROG.PIC>", 
"<p2= GAME.MAP>", ... load in and tag 
hires or double hires PICTURES! As with font 
changes, a simple command (e.g. "<pl>") is 
all you need to printout the picture. Supporting 
virtually every popular Apple compatible 
printer, if "TimeOut" can be said to have a 
'flagship package', "SuperFonts" is it! 




<5<J 



While "Appleworks"s built-in file- 
handling capabilities are usually adequate, this 
is small comfort on those occasions when 
something more is needed. Well, "FileMaster" 
is not "Copy II Plus-in-'Appleworks' "; but 
it comes close enough to earn a few cheers. For 
any on-line disk, files may be cataloged, copied, 
compared, renamed, locked/unlocked and even 



rearranged. Of course you may also copy, 
compare, and format disks, as well as create 
and copy subdirectories, and use "erase" to 
quickly produce data diskettes. 

"FileMaster"s way of doing things does, 
admittedly, take some getting used to. For 
instance, assigning Disk and File activities to 
separate menus means that, occasionally, one 
must enter CMD-RETURN to specify a 
"current disk". Yet there is no on-screen 
prompt for this option, nor for any of the 
"special" file commands. Among the latter is 
"View Files", a very handy way to look at 
(CMD-V) or printout (CMD-H) a full-screen 
listing of up to 100 names in the current file 
list. "Arrange Files" (CMD-A) lets you 
arrange a file list alphabetically or by size, type, 
or date. Finally, while "FileMaster"s standard 
file listing is slightly more informative than 
"Appleworks"s own; it's too bad Beagle 
passed up the opportunity to build-in a for-real 
CATALOGing function. Still, 'warts and all' 
the first time you NEED one of "FileMaster"s 
new fiinctions, you will be mighty glad it's just 
a CMD-ESC away. 



Gauntlet 

by Atari Games 
$39.95 Mindscape 




d) 



■ Requires: 

n 256K Ilgs 

D one 3'/2" drive 

D joystick optional 

Direct from the arcade parlor to you, 
"Gauntlet" is a blow-away-the-monsters, top- 
view maze adventure with at least one unusual 
attribute. For the lone player, controlling a 
single hero, the premium is squarely upon quick 
response and accuracy, joystick control is 
indispensable, and a speedy demise is all but 
assured. BUT, should you (or, better, another 
player) opt to bring a second character into the 
fray, the game becomes ridiculously easy. 
Controls are responsive and so simple (mainly 
movement and 'fire') that keyboard-only 
direction of the second hero poses no great 
inconvenience. 

Listing a choice of four characters (warrior, 
Valkyrie, elf, and wizard), a few well-defined 
monsters, and numerous power-enhancing 
items— all in a many-leveled dungeon of multi- 
screen mazes— "Gauntlet" documentation 
promises an interesting strategy challenge. 
Regrettably, as usually happens with gaming 
parlor retreads, the promise goes unfulfilled. 



Sound, just 'passable', and graphics are the first 
casualties. In double hires color, the tiny hero, 
monster, and item figures emerge as blocky 
splotches, often against a vast expanse of gray 
maze floor. You are assured that the "animation 
of the arcades" is right there "on your home 
screen'; but, at this resolution, who can tell? 

Still, the more imaginative adventurer 
might tolerate such deficits, were there 
something resembling a real challenge and/or 
a solid goal. "Gauntlet", however, urges you 
to "go as far as you can" and to score the 
maximum points. Since, as long as one hero 
is alive, the other can always regenerate, getting 
to 'Level whatever' of the dungeon is no great 
feat. True, his/her points are reset to zero; but, 
with no High Scores record, why should anyone 
care? 

As might be anticipated, being virtually 
immortal and supplied with inexhaustible 
supplies of ammunition (hammers, arrows, 
etc.), does tend to 'wash out' the alleged special 
attributes of your heros. Indeed, "Gauntlet", 
itself, is a wash-out. Somehow, we got to Level 
25 before falling victim to the only really 
dangerous 'monster' in the whole dungeon: 
Boredom! 



Fast Frames, Updates, etc. 



Softswitch Replies 

Responding to the June review of Roger 
Wagner Publishing's "SoftSwitch", both Roger 
Wagner and Ken Kashmarek (the author) have 
zeroed-in on my comment to the effect that 
saving 133K seems like overkill for 64K or 
smaller programs. Roger Wagner notes: "The 
main reason we always save 133K chunks in 
saving programs is to reduce not only the 
amount of potential confusion to the user, but 
also the likelihood that his program would crash 
if he were to ask to save an incorrect memory 
size." 

Ken Kashmarek comments: "If SoftSwitch 
was to be successful, there is every compelling 
reason to switch the entire 128K. There were 
too many failures when this was not done. We 
cannot accurately determine, under all 
circumstances, what memory in bank 1 was or 
was not being used. Most users don't know, so 
they could not make the correct selection. The 
memory options you suggested were all tried 
and discarded as prone to failure." 

' 'While you felt we were saving too much 
memory, some SoftSwitch critics felt we were 
not saving enough. The 133K includes 5K of 
IIGS Desk Manager saved areas that belong to 
the running application. We did not include the 
shadowed hires, double hires, and super hires 
areas (a whopping extra 48K)." 



28 



COMPU'nST #60 



0<:toiier 



As to my questioning of the decision not 
to switch ProDOS 16 programs, Ken observes: 
"Of the commercial applications available, 
none stay within 512K. Even code from Apple 
Computer cannot load in a bare bones 256K 
anymore .... Thus, for the expanded memory 
card within the budget of most IIGS owners 
(one megabyte size), it is not possible to switch 
one ProDOS 16 application." 

Defending the Crown 

In Cinemaware's new ad venture/ wargame, 
"Defender of the Crown", crunching the 
opposition takes a lot of practice. You can take 
it on the chin for however many sessions it takes 
to 'learn the ropes'; OR you can employ a touch 
of Realtime Situation Control to make those 
'practice games' into victories! 

As usual, the "Visit Monitor" CD A (or 
some equivalent) must be installed before 
booting the game. During play, press CMD- 
CTRL-ESC to call up the CDA menu, select 
"Visit Monitor", and enter O3/BC00.BC2F 
(RETURN) to view the main status bytes for 
you and your five rivals (arranged in six-byte 
sets). Whether "Wolfric the Wild" or some 
other Saxon, your parms are always first in each 
set: INCOME ($03/BC03), LEADERSHIP 
($03/BC0F), JOUSTING ($03/BC15), 
SWORD FIGHTING ($03/BC0B), and 
TREASURY ($03/BC2D). 

For long play, with plenty of opportunity 
to practice jousting, sieges, and sword fighting, 
all you really need is a big army. This you 
obtain by juicing-up your treasury (e.g. 
$03/BC2D: FO). Of course, you will certainly 
want to try your hand at raids and fair maiden 
rescues(!); so, just boost your sword fighting 
skill (e.g. $O3/BC0B: IF). Thusly imbued with 
truth, justice, and raw power, you are ready 
to hone your technique AND to guarantee that 
the Crown of England doesn't fall into the 
wrong hands! 

Bootable Backups 

Regarding Brian Troha's fine "Multiscribe 
3.0 Ilgs" exposition (COMPUTIST #56): why 
not just $0F6: 82 47 OO (in block $538) and 
hop over everything? 

i; ^ i: a VOTE!!! i^ ^ ^ ^ 

To celebrate the '88 elections, it seems only 
proper to stage an Official Computist 'Best New 
Stuff vote. Sections are 1. Best Game, 2. Best 
Adventure, 3. Best Sports Simulation, 4. Best 
'Productivity' Package (e.g. painters, word 
processors, etc.), 5. Best Utility (e.g. copiers, 
DOS enhancers, etc.), 6. Best Music Package, 
7. Best Miscellaneous (i.e. whatever). 

Rules: To qualify, a 'candidate' must be 
a 1987 or 1988 release for the Apple lie or Ilgs. 
You may vote in any or all sections. You may 
list up to three products per section. Each list 



should be headed by the section name followed 
by titles in order of preference, (i.e. First 
listed= "1st Place", etc..) A product may be 
listed in more than one section, if it fits. Be sure 
and note version (He or Ilgs), if it matters. Feel 
free to jot down any comments; but try to keep 
everything, ballot plus comments, to no more 
than two sheets. 

Each voter gets just one ballot. However, 
up to four voters may send their ballots in a 
single envelope, as long as each ballot is signed. 
Ballots should be sent to me at 7814 Santa 
Elena, Houston, Texas 77061. The deadline is 
November 30, 1988. The results should be in 
print by the January issue. 

Don't miss this chance to support the 
products YOU like. VOTE '88!!! 

Vendors 

Beagle Bros.: 6215 Serris Square, Suite 100, 
San Diego, CA 92121 (800-345- 1750, in 
California call 800-992-4022) 
Cinamaware: 4165 Thousand Oaks Blvd., 
West Lake Village, CA 91362 (805- 
495-6515) 

Mindscape: 3444 Dundee Road, Northbrook, 
IL 60O62 (312-480-7667) 



Michael J. Paris 



Low cost alternate Languages 



I suspect that there are a number of people 
who are interested in learning new computer 
languages but who can't justify the cost of the 
high priced packages. I wish that I had known 
about the sources available when I first started 
exploring new languages. 

Here is an sample of what can be obtained 
for a reasonable sum (under $50) and what 
source(s) can be used. 

FORTRAN, COBOL, Pascal, Forth, C, 
and BASIC are all languages that are well 
known and are fairly common. Furthermore, 
most of them are popular on microcomputers. 
Even though FORTRAN and COBOL are more 
often thought of as belonging on mainframes, 
they are also available for many small 
computers, including Apples. 

There is a problem, however. How can 
someone who is interested in learning one or 
several new languages develop a feel for them 
without mortgaging the old homestead to 
purchase the latest and greatest version of each 
one? It is not unusual for the price of a language 
system to be several hundred dollars. 

It doesn't seem to be well known, but there 
are a number of sources of low cost languages 



and even though they may not all be full- 
featured, they can easily provide a good taste 
of the essence of the language. In fact, some 
of the low cost versions are (or claim to be) 
complete sets or even supersets of the standard 
language. Some, of course, are only subsets. 
Even so, they can provide enough of a base in 
the language for a budding programmer to 
decide whether it is worth the additional money 
required to move up to a full implementation. 
Quite a few of the versions available will 
only run under either MS-DOS or CP/M. Since 
the only way that I am aware of for running 
MS-DOS programs on an Apple is with a 
$500 -(- Applied Engineering Transporter 
setup, I am going to concentrate on the CP/M 
systems. 

There are a variety of sources for CP/M 
cards. I bought mine from a discounter who sold 
the Applied Engineering Z-80 Plus which 
comes with its own operating system (a CP/M 
work-alike called CP/AM). I have seen ads for 
it recently for around $10O. That is the largest 
single expenditure required. The language 
systems are all much less expensive. 

If you already have a Gold Card or a PCPI 
card or any of the other CP/M adaptors for your 
Apple then you will not need to worry about 
obtaining either the hardware or (probably) the 
system software since you have some kind of 
workable setup right now. If you are lucky, 
your system includes the CP/M utilities like 
PIP, DDT, ASM, and several other handy 
(though not absolutely necessary) files. 

It is also possible to get CP/M cards for 
under $40. The main problem with these is that 
they rarely come with an operating system. 
There are some public domain CP/M-type 
systems around but you will need a friend who 
has a running system to get yours up and going. 
CP/M is very different from either DOS 
3.3 or ProDOS. On the other hand, if you have 
any experience with MS-DOS you will find that 
the conversion is pretty simple. MS-DOS was 
a take-off of sorts on CP/M. Your best bet is 
to get a few good reference books at your local 
bookstore because the documentation that 
comes with the CP/AM system is rather sparse. 
Some other systems may be better documented 
so it may pay to wait until you know for sure 
what your system is like before you get too 
many books. On the other hand, a couple of 
good references (such as CP/M Bible by Waite 
and Angermeyer) might be a sound investment 
in any case. 

There are some additional things that you 
may want to include that will make things 
considerably easier even though they are not 
required. A 64K machine seems to be sufficient 
for most, if not all, of the languages I have 
found. For the sake of convenience you may 
want to have some extended memory. Even the 
64K that you find on your eighty-column card 
if you have an Apple He will be helpful when 



October 



COMPUTIST #60 



29 



used as a RAM drive. I prefer to transfer most 
or even all of the files that I am going to be 
working with onto a RAM drive and do all the 
editing, compiling, and linking from there. It 
saves wear and tear on the disk drives and 
speeds everything up by a marked amount. 

I like to use a 3 '/2 " drive for most of my 
work because it stores things more quickly and 
I can put all the related files on the same disk. 
The newer CP/AM system allows its use and 
I can keep an entire language system together. 

Now to the languages. The ones that I have 
found that run under CP/M are Nevada 
FORTRAN and Nevada COBOL from Ellis 
Computing (5655 Riggins Court, Suite lO, 
Reno, Nevada 89502). C from MIX Software 
(1132 Commerce Drive, Richardson, Texas 
75081). Turbo Pascal from Borland 
International (call 1 -800-255-8008 for orders 
or the dealer nearest you). 

There also a number of others available that 
I have not had a chance to work with. For 
example, Ellis publishes a version of Pascal, 
a version of PILOT and a version of BASIC 
along with an editing system. All of these run 
under CP/M as do a variety of public domain 
languages such as ACTOR, BASIC-E, PILOT, 
FELIX, and others too numerous to list. 

Nevada FORTRAN v.3 is a subset of 
FORTRAN IV. It sells for about $40 and 
comes with a manual of which roughly 170 
pages are devoted to the language and the way 
it is implemented under CP/M. An additional 
50 pages (approx.) cover the assembler module 
and use thereof. This version of an 808O/Z-8O 
assembler is included with the FORTRAN 
package. No tutorial is supplied although there 
are several example programs listed for both 
the FORTRAN section and the assembler 
section. If you want to learn FORTRAN with 
this package you would do well to get at least 
one good textbook/tutorial for the language. 
This version includes several extensions to the 
ANSI standard and also omits several ANSI 
standard components such as double precision 
and EQUIVALENCE statements. 

Naturally, you do not expect full 
mainframe capability on a 64K system. On the 
other hand, this package provides a great deal 
of power for the money and when you master 
the system you will not need much additional 
work to feel at home with a lull implementation. 
That, after all, is the reason for getting a $4© 
system instead of a $400 system that requires 
more memory than you can shake a stick at. 

The assembler module can be used to 
assemble some of the source files found in the 
public domain programs that abound. Be careful 
though, some assemblers that operate under 
CP/M require slightly different formats and you 
may find that a file needs to be edited before 
it will assemble correctly. This is not a problem 
that is confined solely to Z-80 and related 
systems. It is also true for 6502 assemblers. 



Try assembling an S-C assembler source file 
with the Merlin assembler and you will see what 
I mean. The situation is not necessarily bad, you 
just need to be aware that different 
programmers have different priorities and 
therefore will produce assemblers that handle 
source files in a different manner than others. 

Nevada COBOL is similar to Nevada 
FORTRAN in a way. It sold for about $40 but 
unfortunately has been discontinued. It may be 
possible to obtain it from a vendor who still has 
it in stock or a used software dealer. It appears 
to me to be a subset of COBOL 74. The 170 
page (approx.) manual contains a brief 
introduction to the language, a short primer, and 
several example programs. Once again, you 
will be best off if you get a good 
textbook/tutorial to use wifli this version. Quite 
a number of commands are not available but 
can usually be worked around without too much 
trouble. COBOL is a verbose language and it 
is not surprising that something had to be left 
out to make it fit into a microcomputer. 
Nonetheless, the compromises that had to be 
made seem to be well chosen and, for the price, 
you will be getting a lot of useftil experience 
with the language. 

Ellis publishes a book of applications 
programs for their version of COBOL; it is 
about 75 pages long and contains four packages 
for budgeting, personal finance reporting, 
labeling, and a PRECOBOL processor. 

If you are going to use the Ellis packages, 
you will want a text editor of some kind. Ellis 
sells an EDIT program that is considerably 
better than the primitive editing programs that 
come with the CP/M system (ED or TED). 
There are other editors that I prefer, but this 
one is not at all bad, and there are several very 
desirable features. 

Turbo Pascal. When it comes to Pascal, 
everyone has heard the name of Turbo Pascal. 
It is a very good, fast, forgiving system. I don't 
suppose that it is the very best that there is, but 
for the money (or even a lot more) it can't be 
touched. It frequently sells at discount for less 
than $40 although the latest prices that I have 
seen are slightly higher. It comes with a 375 
page reference manual (some of which is given 
over to IBM-specific commands) that covers the 
Turbo system (including the editor), the Pascal 
implementation (with numerous examples), 
CP/M information, differences between Turbo 
and UCSD Pascal, and several appendices 
covering such topics as installation for specific 
hardware systems, compiler directives, errors, 
and so forth. 

The editor that comes with the Turbo 
Pascal system is good enough to use for a lot 
of things, not just writing Pascal programs. I 
have used it instead of the Ellis editor for 
FORTRAN and COBOL. It is Wordstar based 
so if you are familiar with that command 
structure you will feel right at home. If you 



don't like the key mapping, you can change it 
to whatever you want. I left it just about the 
way it came except for mapping in the arrow 
keys. Since Wordstar and Turbo both use the 
Ctrl-K as a prefix key and that is the up-arrow 
in the Apple, I made some simple changes in 
the installation so that the up-arrow would work 
as expected, moving the cursor up instead of 
putting me in a command mode. 

C. If you want to learn C, I really doubt 
if there is a bargain to match the package 
availiable from MIX. For under $40 you get 
the language, linker, and compiler system; the 
split-screen editor system; and the ASM 
package. If you are buying the system to use 
on an MS-DOS machine or with the 
Transporter, you also get C-trace, a source code 
debugger. Unfortunately, C-trace does not work 
with CP/M. Even so, the deal is unbeatable. 
The system comes with a 430 page manual 
which includes a tutorial along with the 
reference section. It claims to be a full featured, 
standard implementation of the Kemighan & 
Ritchie C compiler suitable for development 
systems used by beginning to intermediate-level 
programmers and I have no reason to doubt that 
this is so. There are a few extensions to the 
standard and only one restriction. 

You can't possibly go wrong with this 
system. There is even a money back guarantee. 
The editor is so good that I use it for all the 
programs that I write under CP/M. It has even 
more features than the Turbo system and also 
follows the Wordstar protocol. In fact the whole 
package would be worth the price for the editor 
alone. While there are probably other editors 
that can do more or even do it more easily, I 
would be amazed if you could find one at this 
price and then have a fine C system thrown in 
too. This system was voted a Best Buy by 
Computer Shopper magazine and with good 
reason. It would be worth buying a CP/M card 
just so you could run it. 

What about languages that don't require 
CP/M to run? There are several in the low cost 
range that are available. Along with several 
versions of BASIC there is Forth. 

Forth is a strange language, at least it is 
to me. Nonetheless, it is very interesting and 
very powerfiil. Best of all, it is practically free. 
A version called FIG-Forth is available from 
several public domain sources. I bought mine 
from the Big Red Apple Club (BRAC) (423 
Norfolk Avenue, Norfolk, NE 68701) for the 
cost of the disks ($3.50 each). It is written to 
run under or froin Integer BASIC. I don't know 
how it does that, but that is where you start — 
right from the ">" prompt you call up the 
screens that Forth is built with. 

FIG-Forth comes on a pair of disks with 
all the documentation contained on the disk. It 
is pretty sparse information though. As before, 
I recommend getting a good textbook/tutorial 
before tackling too much. 



30 



COMPUnST ttw 



October 



BASIC. As far as dialects of BASIC are 
concerned, there are a whole host of them 
running from some of the public domain 
versions such as those available under CP/M 
to the ones that sell for a fortune. Of the 
versions that can be obtained for reasonable 
cost, those from John Blankenship (DOS 3.3 
or ProDOS) are useful. They provide named 
subroutines, mixed high-resolution text and 
graphics, and easily structured programs. The 
cost has been about $25 for either version or 
about $40 for both. 

Sometimes Z-BASIC can be purchased for 
about $50, a little above the range that I have 
been considering here but a BASIC that has 
received good reviews. 

Several versions of BASIC exist that I 
would like to try out. Applesoft just doesn't 
have all the neat things built into it that I want 
and trying to attach everything using the 
ampersand hook eats up memory like crazy, not 
to mention blowing the portability. Of course, 
I can always dedicate an entire disk to a 
particular version, but that doesn't seem like 
a very good solution. On the other hand, with 
a different system or dialect, I run into the same 
problem anyway. So maybe it all comes out 
about the same in the end. 

There are other languages and versions of 
languages around that I don't know about which 
are in the price range I have limited this letter 
to. I am always looking for new horizons and 
I wish that companies like Borland would 
continue to publish their languages in CP/M 
compatible formats. I would love to get my 
hands on Prolog. I have seen RPG advertised 
but I have no idea what the price is. I expect 
that it is far above what I am willing to pay but 
maybe I would be pleasantly surprised. It is 
usually found only on mainframes and maybe 
some mini's. That is where I was first 
introduced to it. It is a fun language to work 
with and I wish I could get an Apple version. 

A final thought, you may want to transfer 
text files from one system to another for various 
reasons. If you do, you will want to get the 
Universal File Converter from Quality 
Software. It allows you to move text files 
between CP/M, DOS 3.3, ProDOS, and the 
Apple Pascal environment. 

For a minimum inital cost you can explore 
a host of new languages. If you enjoy mapping 
new territory, if you want to root around in the 
world of computer languages, or if you just 
want to keep your hand in with some of the 
languages you once learned and have nearly 
forgotten, now is the time to get started. 



Ryan Lanctot 



In COMPUTIST #58, I submitted a 
program called Infocom Decoder. 
Unfortunately, several errors cropped up 
which, I fear, were entirely my fault. Add or 



change the following lines: 
40 ONERR GOSUB 800 
210 GOSUB 850: Rem... 
570 ...:GOSUB 1000 
580 ...: GOSUB 940 
Delete line 900 

Also, in the text reader modifications, there 
should be a colon after the POKE in line 390. 

To appologize and make up for this, I have 
a hint for readers: 

Playing Tips for... 



Captain Goodnight 

Broderbund 



To get rid of the irritating "balloon", edit 
side #2. 



Trk Set Byte(s) From 



To 



$0E $09 $32 



01 



Blaine C. Miskell 



Softkey for.. 



Deatii Sword 

Epyx 



A friend just recently purchased Death 
Sword by Epyx, and wanted to find a softkey 
that would work. We started looking at back 
issues of COMPUTIST figuring to find a 
previous softkey that would work. 

We came across the World Karate 
Championship softkey in COMPUTIST #50 
and noticed that the protection scheme was 
identical. 

I used DISKEDIT from my COMPUTIST 
Starter Kit and checked track $0O, sector $0E, 
and found the bytes to be changed were 
identical. 

I 1 I Boot your DOS 3.3 system disk. 

I 2 I Tell DOS to ignore checksum and 
epilog errors and use COPYA to copy the disk. 
POKE 47426,24 
RUN COPYA 



I 3 I Make the following sector edits to the 
copy you just made. 



Trk Set Byte(s) From 



To 



$00 $0E $24 
$29 
$39 
$47 
$54 
$5D 
$6C 
$7B 



76 
71 
61 
53 
46 
3D 
2E 
IF 



5A 
55 
45 
37 
2A 
21 
12 
03 



I 4 I Write the sector back to disk. 

C2) Help wanted for: Auto-Duel by 
Broderbund. How do I load Auto- Duel onto a 
RAM card. I have a 512K RAM card by 
Applied Engineering and can get the program 
to load into RAM but the program will not 
recognize the RAM drives 1 & 2. The Auto- 
Duel disk has already been changed using the 
softkey from COMPUTIST #36. 



Jim Bancroft 



f Softkey for.. 



Science Tool Kit 

Broderbund 



COMPUTIST #46 contained the first 
softkey for Science Tool Kit from Broderbund. 
COMPUTIST #49 had a description of a 
version which used a different distribution of 
data in its boot. Apparently the distribution 
described in COMPUTIST #49 is the current 
distribution in use by Broderbund, but the 
author missed something about it. He says that 
there are still six (6) pages of data in 4&4 
encoding on track $01 but there are only two 
(2) pages of data there (pages $10 and $1 1 of 
memory). 

What this means is that the current version 
will be even easier to softkey. 

I 1 I Follow steps 1 and 2 of the 
COMPUTIST #49 softkey (or use an NMI card) 
to capture and modify the track $01 code. Then 
in step 3 use an L$200 not $600 as listed. 
This will give you the needed code from track 
$01, and you will not have unnecessary code 
to deposit onto your copy disk. 

I 2 I Use Super lOB with a modification of 
the controller in COMPUTIST #49. Change 
line 1020 to read <9 rather than <15. Then 
insert: 1040GOSUB430 : GOSUB100 : ST=ST+1 : IF 
ST<1 1 THEN 1040. Be sure you initialize the blank 
as volume #1. 

Even if you found the "bug" correcting 
1O40 in an issue after COMPUTIST #49, use 
the line 1040 1 have listed above since it is not 
necessary to have any code whatsoever written 
to sectors $0B through $OE. 

You now have a normalized disk which 
needs sector editing in order to read itself (while 
still being able to read the Tool Kits accessory 
modules) and to disable its nibble counting of 
track $01 . The Zap editor of Bag of Tricks 2 
or Tricky Dick of the CIA have the best search 
abilities 



I 4 I Force the loading of memory pages 
$1© & $1 1 of the two aditional sectors of code 
which we captured from track $01 . We are not 
loading physical sector $OE (logical sector $08) 
because it is only read while initializing data 



October 



COMPUTIST ^0 



31 



disks and it will be read into memory when you 
carry out that function later. If you want to 
personalize data disks, sector edit the text of 
sector $08 on your copy. 



Trk Set Byte(s) From 



To 



Trk Set Byte(s) 


From 


To 


$00 $00 $62-65 


FF 0E 0C 0A 


0C0AFF0E 




nibble count 

From 




1 5 1 Kill the 

Trk Set Byte(s) 


during boot. 

To 


$00 $09 $08-0A 


20 0011 


EA EA EA 



I 6 I Search the disk for the string SB D0 A4 
18 60. Change the A4 to 00 so that the disk can 
read its new normal epilog (AA) while still being 
able to read BB epilogs on accesory modules 
which may not yet be deprotected. 



Trk Set Byte(s) From 



To 



$00 $06 $6C-70 BB D0 A4 18 60 BB D0 00 18 60 
$08 $08 $6C-70 BB D0 A4 18 60 BB D0 00 18 60 

We will not kill the code at $946 in memory 
by editing memory or by editing byte $46 on 
track $00, sector $01 . This is the original code 
for the boot-up read of track $01. This code 
is apparendy harmless, so let sleeping dogs lie. 
Our new disk format is unreadable by that code 
anyway. The boot continues on its way and 
jumps to $1000 in memory just like it should. 

I 7 I At this point your disk would work the 
same as one from COMPUTIST #46 or 
COMPUTIST #49 would have. It is actuaUy a 
little better because this can read either nortnal 
or protected epilogs (AA or BB.) What both 
authors missed though was that the softkeyed 
disk could not write to itself. So, you could not 
change the working setup and save it. Finally, 
I have found out why. 

Search for the string A9 BB 8D 9B 99 which 
changes the write epilog to BB for writing in 
program disk format. Change the BB to AA 
because you changed the program disk format 
to normal. 



Trk Set Byte(s) From 



To 



$04 $0B $06 
$0C $02 $56 



AA 
AA 



I 8 I On track $OC, sector $08 at byte $57 
is a nasty piece of code (A9 BB 20 B8 98). 

Purpose: Change the second data write 
prologue byte to BB if the user tries to write with 
normal epilogs onto a program disk. 

Net effect: You will destroy track $00 
sector $02 of your softkeyed program disk, thus 
making boot-up impossible. 

This code's only purpose was to destroy 
normalized disks whenever this subroutine is 
called. Change the BB to AA and it will neutralize 
this deadly little mole. 



$0C $08 $58 



AA 



I 9 I Now the disk works great. But let's 
speed-up the boot by eliminating the delays 
which leave us admiring the credits. Search for 
the string 2C 10 C0 38 A9 96 . Put 60 in place of the 
2C and the delay is gone. It boots like lightning. 
Do a comparison boot with the original. The 
difference is fantastic. 



Trk Set Byte(s) From 



To 



$00 $0A $69 



2C 



60 



There are still two routines on the disk 
which are code to do a read of Track $01 . They 
are recognized by the BD 8C C0 followed by C9 
D4 or C9 E7. They seem to be uncalled routines, 
or perhaps we neutralized their caller or the 
location ttiat they return their values to. On my 
disk, they are sitting on track $08, sector $05 
at byte $9B and track $0C, sector $03 at byte 
$84 just waiting to do nasty things to me some 
day. For that reason I am keeping this disk 
write-protected whenever possible. Once they 
try to show-off their bad habits I can kill them. 

For the life of me I can not understand why 
Broderbund went to such lengths to protect a 
disk which is totally useless without the 
interface which comes with the program. I 
guess it prevents purchasing a "replacement" 
interface by someone who hasn't purchased the 
program or purchasing "replacements" for all 
your friends, but an exchange procedure would 
have been much more friendly. When you take 
your one and only original into a chemistry lab 
and pull it out of tfie drive to put in another disk, 
you will lose it in the first chemical spill. For 
that reason I have been advising people not to 
buy this program; since, there are oflier more 
friendly data aquisition packages around such 
as those from HRM or the Vernier Series. 

Hopefully this addition to the 
COMPUTIST #46 & COMPUTIST #49 
softkeys will make the Science Toolkit more 
usable by other teachers. 



Stanley Planton 



Another copy-protection 
scheme for DOS 3.3 

■ Requirements 

n DOS 3.3 System Master 

n DOS Boss (suggested) 

n EDDIV 

n Sector editor (COPY n Plus or equivalent) 

D Disk drive with variable speed 

D Locksmith 6.0 (suggested) 



Some of the major goals of copy protection 
are: to prevent the easy copying of an entire 
disk, to prevent the transfer of files to other 
disks, and to prevent the user from frnding out 
what's going on or to lead him astray. We can 
fairly easily meet most of these goals by a 
combination of programming and misdirection, 
in the assumption that most non-hackers won't 
be able to easily defeat our methods. 

The following is an example of how we can 
move the disk's catalog track to track $23, and 
mess around with the disk's formatting and 
DOS's internal instructions enough to meet the 
above goals. Most of these methods were 
obtained by "reverse engineering" copy 
protection methods used by commercial 
publishers; I kept on wondering "how did they 
do THAT?" and trying different techniques 
from COMPUTIST until I could replicate the 
effect. 

In the following we will make gradual 
changes to a "source" disk, then copy this disk 
to a bulk erased blank or a brand new 
unformatted disk, using EDD IV to write out 
a non-standard format to this "target" disk. I 
am presenting steps to follow in a fairly 
arbitrary order: some operations could be 
combined, or your own additions, 
embellishments, and modifications substituted. 
The reason for using a magnetically wiped disk 
is that we probably won't want to copy unused 
tracks, and the presence of unreadable and 
unverifiable magnetic "garbage" on a few 
tracks of the copy will drive some non-hackers 
to distraction as they try to copy the disk! 

I 1 I Boot your "System Master" disk. 
Enter your program to protect. 

I 2 I Using Phil Goetz' technique from 
COMPUTIST #30, modify DOS for an added 
track. 

CAU-151 

B3EF:24 

BEFE:24 

AEB5:90 

3D0G 



I 3 I Insert a blank disk in the drive and 
initialize it. Label this disk "Source". The 
result of this operation will be to produce a disk 
with a normal catalog track $1 1 (17), but with 
an added track $23 (35). 



INIT HELLO 



or whatever 



I 4 I Boot the disk you just INIT'ed. 
Everything OK so far? 

I 5 I Let's get rid of the ability to 
CATALOG the disk from its DOS. 

POKE 42350,76 
POKE 42351,0 
POKE 42352,198 
POKE 42353,170 



32 



COMPUTIST mo 



October 



Another useful approach is to use DOS 
BOSS to rename and/or reroute DOS 
commands and error statements. I've been fond 
of renaming CATALOG "DOGALOG". You 
might also try rerouting many commands to the 
INIT handler. If you make changes with DOS 
BOSS or any similar program, the preceding 
edits will be nullified, however, so be careful. 



I 6 I At this point, let's instruct DOS to 
accept either a 04 AA 95 pattern or the standard 
D5 AA 95 pattern in its address header. With the 
source disk in the drive, enter: 

CALL-151 

B954:4A C9 6A DO EF 

3D0G 

INIT HELLO or whatever 

Remember, if you RESET out of your 
program and CATALOG, the disk will 
reboot. . . We'll use these DOS instructions later 
as we change address headers on the disk. 

I 7 I Now let's move the catalog track out 
to the new track $23 (35). (To complete this 
action, you'll need an abilty to read sectors on 
track $11 (17) and to write each sector out to 
track $23 (35) with modifications.) 

POKE 44033,35 
INIT HELLO 

The first sector of the catalog track should 
now reside on Track $23 (35), sector $00. You 
should check this with a sector editor. 



I 8 I Now we want to move the rest of the 
old catalog track $11(17) out to track $23 (35) 
to follow sector $00, and make appropriate 
changes so that the catalog track will work 
correcfly in its new location. Use a sector editor 
(Copy II Plus v6.0 or higher works well) to 
READ sector $0F of track $11. Note the data 
present at bytes $01 and $02 of this sector: 11 
0E. Change the 11 to a 23, and write the changed 
sector to track $23, sector $0F. Do not write 
it back to track $11. 

The 0E value in byte $02 of sector $OFmo5f 
remain the same if you want your catalog track 
to work right: sector $0F refers DOS to sector 
$OE, sector $0E refers to $0D, etc. Each 
sector of the catalog track refers to the next 
lower sector on the track. 

Confinue for the other sectors of track $11; 
READ them from track $11, change the track 
number to a 23 , and WRITE them to track $23 . 
In each sector, the value of byte $01 will 
become 23, followed by the number of the next 
sector of catalog data, so they'll read 23 0E, 23 
0D, 23 0C, and so forth, when you're done. It is 
theoretically possible to reroute the catalog track 
to different tracks and sectors on the disk; if 
you feel REALLY creative, some 
experimentation might be called for. In this 
example, let's stick to track $23 (35). 



44033,17 to restore DOS' ability to read files 
from a normal disk, load the file(s), POKE 
44033,35 to return DOS' attention to track $23 
and SAVE the files as normal. If you used DOS 
BOSS to lobotomize SAVE and BSAVE, you 
might be regretting it. 

I 10 I Assuming that you have no further 
need for a RESET function on this disk, use 
your sector editor to read track $00 sector 
$0D. If the DOS you are using is a normal DOS 
3.3, start with byte $50. You should see a 
pattern of bytes that reads something like this; 
604CBFlD4C841D.(NotethatthelDmighthave 
a different value). Change the sequence to read; 
50 4C 00 C5 4C 84 ID instead and write the change 
back to the sector. This will reroute the RESET 
handler to $C600, the address of the disk 
controller card, forcing a reboot if someone 
presses RESET. 

The 4C 00 C5 that you substituted for the BF 
ID pattern tells DOS to always jump to the disk 
controller on a RESET. 



I 9 I Now, how do you transfer new files 
to the disk? You can boot this disk, POKE 



piFI Dig out COMPUTIST #51 (January 
'88), and follow my instructions using EDD IV 
to copy the disk you just produced to a very 
slow drive (290-295 rpm). Copy only tracks 
that are used for your programs or for DOS and 
the new catalog track $23 (35). Change address 
headers on every other track to D4 A A 95. 
Assuming that track $11 (17) now serves no 
useful purpose, either don't copy it, or copy a 
catalog track from some OTHER disk to your 
target disk. (We don't want to make things easy, 
do we?). 

When finished, you might want to 
CERTIFY unused tracks using EDD IV or 
Locksmith 6.0, or use Locksmith to FORMAT 
half-tracks in an unused area of the disk. For 
example, if tracks $03 (3) through $10 (16) 
aren't in use, you can probably format tracks 
$3.5 through $OF.5 (15.5), as long as you stay 
more than 'A track away from all used tracks. 
The reason for this is that the wide read-write 
head on the drive tends to "bleed" data into 
adjoining areas as it writes to the disk. The 
minimum safe distance is 3/4 track separation 
between a "half-track" and the nearest 
"whole" track. 

These efforts will keep many "expert 
copiers" out of mischief for a while as they try 
to replicate "nibble count tracks" and 
"synchronized halftracks" that serve no other 
purpose. If you feel really creative, you might 
use a sector editor to embed "helpful hints" 
or other snide remarks in some of these half- 
tracked areas, or use Locksmith 6.0 or EDD 
IV to write comments for would-be copiers into 
sync gaps or onto any certified tracks. Since 
a certified track looks like a "nibble count" 
track, having one of these is a good deceptive 
measure. 

The end result of this should be a disk that 
is fairly hard to copy with a bit copier, and one 



which should resist file copying, as well. The 
presence of areas of "garbage" on the disk 
works fairly well to simulate nibble count 
tracks, and addition of a few "half-tracks" in 
an otherwise unused area of the disk can drive 
many sophisticated disk copiers to despair as 
they try and retry to copy these correctly. If the 
whole disk is produced at an exceptionally slow 
speed, it will be almost impossible to replicate 
on a drive that is spinning at 300 rpm. 

Of course, this is only one approach to copy 
protection; I am sure that many COMPUTIST 
readers can improve on these techniques! How 
about it? Can someone show me how to PUT 
a nibble count on a disk? 



Gary Verbuch 



Softkey for... 



Garfield Deluxe Edition 

DLM 



■ Requirements 

n Sector Editor 
n Blank Disk 

About three months ago I was asked by a 
friend to make a copy of Garfield for him. 
Apparently he tried quite a few of the popular 
bit copiers with no results. 

The first thing I did was use a nibble editor 
to check for format alterations. Since the disk 
uses a normal 3.3 format I then made a copy 
with COPY A to avoid using an original. 

Since the DOS is a normal format I scanned 
the disk for any unusual disk reads or calls to 
the RWTS. Seems that approach won't work, 
nothing showed up from a disk scan so the disk 
read has to be self modifying code. 

When I booted the copy a screen displaying 
"DISK ERROR, PRESS C TO TRY AGAIN" 
appeared. Since the disk check appeared to be 
quite some time after booting I decided against 
a boot code trace. 

By the way, the DOS used by Garfield 
Deluxe Edition is ProntoDOS, and if you don't 
already have a copy of this fast DOS I 
recommend using it as a replacement for 3.3. 

Getting back to Garfield, as s oon as the 
prompt appeared during a boot I hit iQRESETl 
to try cataloging the disk. Fortunately, all of 
the DOS commands were not tampered with 
and I was able to load the Hello program. The 
Hello program sets Maxfiles to 1 and proceeds 
to BLOAD START and BRUN MENU. After 
dissasembling both files I found no offensive 
code in either. It's time for a process of 
elimination. The first file after START and 
MENU is LO so thats where I proceeded. L0 
loads at $60O0 and seems to have quite a bit 
of garbaged code. I don't own an NMI card so 



October 



COMPUTIST #60 



33 



interupting a file during a run seemed futile. 
The first thing LO does is JMP to $6EE9 so 
I followed the code from that point hoping to 
find a way to circumvent the disk error screen. 
The process from this point took almost an hour 
and I never did find the actual disk read. 
Fortunately, NOPing a JSR to $6FF2 bypassed 
the disk check and produced a working copy. 
I stepped thru all the menus of Garfield and 
found everything to work properly. The 
protection is only on the boot side of Garfield. 
Follow these steps to deprotect Garfield 
(Deluxe Edition only). 

I 1 I Make a copy of the original with any 
copier. 

I 2 I Using a sector editor, scan the disk for 
20 F2 6F. NOP these bytes and write the sector 
back to disk. Put away the original. 



Trk Set Byte(s) 


From 


To 


$15 $0E $FB-FD 


20 F2 6F 


EA EA EA 


Softkey for... 


Pegasus 

Lucasfilms 



■ Requirements 

D Sector Editor 
D Blank Disk 

Pegasus is a fairly good hydrofoil 
simulation. To deprotect this ware, use any 
sector editor and change the following: 



Trk Set Byte(s) From 



To 



$01 $06 $08 
$0E $07 $75 



03 

22 0121 



62 

EA EA EA 



Make sure you write these changes to disk. 



Softkey for... 



Dome Bookkeeping 

Great American Software 



■ Requirements 

D COPYA 
n Blank Disk 

In COMPUTIST #57 there is a softkey for 
Dome Bookkeeping using Super lOB. Mr. 
Shireman mentions some protection on his copy 
other than alternating address prologs (05 AA96 
and D4 AA 96). The three copies I've come across 
had no other protection than format alterations. 
I'm including this softkey for the readers who 
do not have Super lOB. Concerning the 
problem with changing the year after it was 
saved to disk, make another copy of the 
original. 



m Boot a DOS 3.3 disk and use COPYA 
to copy the disk. 
RUN COPYA 



ignore read & checbum errors 
ignore the address prolog 



70 

POKE 47426,24 

POKE 47444,41 

POKE47445,0 

RUN 

Ihjt the original away. 

Formatting Extra Tracks 

I was asked recently how to format a DOS 
3.3 disk with 36 or more tracks. All of the apple 
drives I've tested have no problems with 
formatting and using track 36. There are some 
high quality drives capable of formatting up to 
50 tracks (half and quarter tracks not included). 

Although there are quite a few methods to 
add an extra track I'll include the simplest. This 
patch will work for up to 50 tracks. 



Byte52oftheVTOC 



I 1 I Boot a DOS 3.3 disk and enter the 
following POKES. 
POKE44725, T*4 
POKE46063, T 
POKE48894, T 

T reflects the amount of tracks you want. 
If you want 36 tracks then T*4 is simply 36*4. 
Now you can initialize the disk. The VTOC will 
reflect the additional track or tracks. 



Jack R. Nissel 



Softkey for.. 



Search And Rescue 

HRM Software 



■ Requirements 

D 1 blank initialized disk 

D Demuffin Plus 

D A way to reset into the monitor 



I 1 I INITialize a disk. 
miT HELLO 
DELETE HELLO 



I 2 I Boot the original Search And Rescue 
disk. When the Applesoft prompt appears reset 
into the monitor. 

I 3 I Move the RWTS to a safe place. 
6800<B800.BFFFM 



I 4 I Put in your blank initialized disk. 
C600G 



I 5 I Put in your Demuffin Plus disk. 

CALL-151 

BLOAD DEMUFFIN PLUS,A$803 



■■BE 


^JMCW^ 1 V ^fc:= 


FFS9G 
A851G 
803G 


If you hear a beep ignore it 


1 6 1 Put in your original disk and copy all 
of the files to your blank initialized disk. 


Softkey for... 




Social Studies Vol 1 




Sodai Studies Vol 2 




MECC 



■ Requirements 

D I blank disk for each title. 
D COPYA 



I 1 I Boot your DOS 3.3 system disk. 

I 2 I Tell DOS to ignore checksum and 
epilog errors and use COPYA to copy the disk. 

POKE 47426,24 
RUNCOPTA 

That's it. 
Softkey for. . . 



Creating The Constitution 

Educational Activities 



■ Requirements 

n 1 blank disk. 

D COPYA 

D A sector editor 



I 1 I Boot your DOS 3.3 system disk. 

I 2 I Tell DOS to ignore checksum and 
epilog errors and use COPYA to copy the disk. 

POKE 47426,24 
RUNCOPTA 



I 3 I Make the following sector edit to the 
copy you just made. 

Trk Set Byte(s) From To 

$00 $03 $42 



38 



18 



Softkey for.. 



Road Rally U.S.A. 

Bantam Publishing 



■ Requirements 

D I blank disk. 

D COPYA 

D A sector editor 

I 1 I Boot your DOS 3.3 system disk. 



34 



COMPUnST #60 



October 



I 2 I Tell DOS to ignore checksum and 
epilog errors and use COPYA to copy the disk. 
POKE 47426,24 
RUNCOPTA 



I 3 I Make the following sector edit to the 
copy you just made. 

Trk Set Byte(s) From To 



$00 $03 $42 



38 



18 



A.P.T.for.. 



Kid Niki Radical Ninja 

Data East 



For unlimited men make the following 
sector edit to side 1. 



Trk Set Byte(s) From 


To 


$08 $0B $34-36 CE4A08 


EA EA EA 




Change Appleworks Cursor 



This is from the August 1988 issue of 
AppleWorks Forum, which I recommend, 
(along with Open- Apple), to AppleWorks users. 
Here is how to change Appleworks inset cursor 
from the blinking underline to a blinking 
solid-apple. 

I 1 I Get into BASIC. (You can get into 
BASIC from any TimeOut disk or from the 
System Utilities Disk that came with your 
computer.) 

I 2 I Insert a copy of your AppleWorks 
Startup Disk in drive 2. 
CATALOCm 

BLOAD APLWORKS.STSTEH,TSTS,A$20M 
POKE 11681,40 2DA1:40 

BSAVE AnWOIIKS.STSTEM,TSTS,A$2O0O 

If you use UltraMacros, type APLWORKS 
.SYS instead of APLWORKS. SYSTEM. 



Paul D. Dillon 



Softkeyfor... 



Pool 1.5 

Innovative Design Software 



■ Requirements 

D Apple He or n series 

n Super lOB 

D DOS 3.3 System Master 

In Computist #50 Mr. Dennis Gaunt 
requested help with an old game called Pool 
1 .5. It is an excellent pool simulation game and 



would be a good "oldie" for some software 
company to revitalize. 

My copy of Pool 1.5 was in DOS 3.2, 13 
sector format. Trax, from Bag of Tricks, also 
showed altered data q)ilogues and an occasional 
altered address prologue. The data epUogues 
were D3 AA EF (normal DE AA EB). The last byte of 
the data epilogues changed continually through 
EA, FA, ED, etc. 

My first break with Pool 1.5 was 
COMPUTIST #47 with Mr. Mike Newliep's 
deprotection of Championship Golf. I ran his 
controller and the disk was deprotected and 
worked, however there was a problem with the 
ball action. They occasionally stuck together. 
As Mr. Gaunt says. Copy II Plus hi-res disk 
scan showed tracks 16 through ID and track 
22 to be garbage. I then took Copy n Plus (v 
8.3) and used the Manual Bit Copy option to 
copy tracks $00 through $15 and tracks $1E 
through $21. Although still copy protected, the 
disk copied and worked without the garbage 
tracks. This showed that these tracks are not 
needed. 

Next, I followed the instructions on the 
COMPUTIST Starter Kit disk and captured the 
Pool 1.5 RWTS. I then used the Swap 
Controller from these same instructions and 
copied tracks $03-15 and $1E-21. The Swap 
Controller was also modified to copy 13 sector 
DOS 3.2 and to ignore errors. This I pulled out 
of the Super lOB article in COMPUTIST #32 
and Mr. Newliep's controller. The program 
then functioned properly and was deprotected. 
After booting the disk and receiving the DOS 
prompt, type ' 'BRUN HELLO' ' to start and run 
the program. 

I used Copy n Plus v5.5 (DOS 3.3 version) 
and copied Pronto DOS to the disk and this 
increased the speed of the boot process. Later 
versions (PRODOS Versions) of Copy Plus 
wouldn't access the dq>rotected disk to perform 
this function. 

Follow these steps to deprotect Pool 1.5 

I 1 I Boot your DOS 3.3 System master 
and make two slave disks. Delete the Hello file. 

miTHEUO 
DELETE HELLO 

I 2 I Now we need to capture the RWTS 
from fee Pool 1.5 disk. Boot the original and 
press IbmEtI after the DOS pro mpt appears. 
On my disk, I pressed IhesktI between the 
time that the prompt appears and before it leaves 
the screen. 



I 3 I Enter the monitor and move the 
RWTS to a safe place. 

CALL-151 
lMe<B8M.BFFFH 



I 4 I From the monitor, boot one of the 
slave disks and save the RWTS. Note: If you 
leave the name asRWTS.XXX, you don 'thave 



to change anything hi line 10010 in the 
controller. 

C600G 

BSAVE Rin8.]BX,A$1900,L$8M 



I 5 I Merge the Swap Controller with 
Super lOB and run it. Make sure the slave disk 
containing the captured RWTS is in Drive 1 
when you run the merged Super lOB. Put the 
other slave disk in drive 2 and follow the 
prompts and copy the original to this slave disk. 
Be sure and enter NO when Super lOB asks if 
you want to format before copying. Formatting 
here would destroy the DOS on the slave disk. 
While copying tracks $1E-21, the Apple makes 
a grinding noise as it resets to track $0O for 
each sector. It takes a little over 4 minutes to 
copy these tracks, and if it bothers you to hear 
these strange noises, this is a good time for a 
coffee break. 

Pool 1.5 should now be deprotected and 
able to function properly. Boot tfie disk and at 
the DOS prompt, enter: BRUN HELLO to run 
the program. 

I made the following changes to the Swap 
Controller listed in the COMPUTIST starter 
instructions. 

1 . Changing values for TK (starting track) 
and LT (last track) (These values must be in 
decimal format in the controller & LT needs 
to be one more than the last track that you want 
to copy; hex $21 = dec 33 so LT = 33.) 

2. Adding MB =130 (Maximum Buffer, 
should be changed to 13© only when a 13 sector 
disk is read or written.) 

3. ONERR GOTO 55© (Subroutine 55© 
in Super lOB ignores unreadable sectors & is 
usually Used with DOS 3.2.) 

4. DOS = 13 (DOS specifies the number of 
sectors to read and is initialized to 16, 1 needed 
it set for 13 sectors.) 

5. Changed line 1©50 and added line 1055 
in order to skip over the intervening tracks. 

Controller 

1000 REM POOL 1.5 

1010 TK = 3:ST = 0:LT = 34:CD = WR:MB = 130:008 

= 13: ONERR GOTO 550 
1020 Tl = TK: GOSUB 360: GOSUB 490 
1030 GOSUB 430 : GOSUB 100 : ST = ST + 1 : I F ST < DOS 

THEN 1030 
1040 I FBF THEN 1060 

1050ST = 0:TK = TK + 1: IFTK = 22THENTK = 30 
1055 IF TK<LT THEN 1030 
1060 GOSUB 360 : GOSUB 490 : TK = Tl : ST = 
1070 GOSUB 430 : GOSUB 100 : ST = ST + 1 : I F ST < DOS 

THEN 1070 
1080ST = 0:TK = TK + 1: IFBF = 0ANOTK<LTTHEN 

1070 
1090 I FTK<LT THEN 1020 
1100 HOME : PRINT "DONE'WITH'COPY" : END 
10010 PRINT CHR$ (4) "BLOAD'RWTS.XXX" 



OcUOtm 



COBSPUnST #60 



35 



Checksums 



1000 - $356B 

1010 - $5F96 

1020 - $5406 

1030 - $4207 

1040 - $FE1E 

1050 - $B57A 

1055 - $CC28 



060 - $DE8E 
070 - $D68B 
080 - $22C0 
090 - $EBAC 
100 - $8B29 
0010 - $746D 



Softkey for.. 



Solo Flight 

MicroProse Software 



■ Requirements 

D Apple He or II series 

D Sector Editor 

D Disk Copier that ignores errors 

n 1 blank disk 

Solo Flight is an excellent flight simulator 
game. You can see your aircraft on the screen 
as you fly in various states in assorted weather 
conditions or fly in a mail run game. It's a 
slower pace than the jet simulators and a lot 
easier to fly than Flight Simulator II. The letter 
in COMPUTIST #56 by the Overlord and 
Nimrod opened my eyes to another source of 
deprotection, Copy II Plus Parms. I strongly 
agree that anytime this is used, the source 
should be recognized. 

I had been trying to deprotect Solo Flight 
but had been unsuccessful. I did have a backup 
made from Copy II Plus (v 6.5). I looked at 
the parameters for Solo Flight in Copy II Plus 
(V 8.3) and only sector edits were used. I took 
my original and made a copy with Locksmith 
6.0 Fast Copy and then made the sector edits 
from the Copy II Plus parms using the Copy 
II Plus sector editor. The disk was then 
deprotected and functioned properly during use. 
There was also an alternate parm listed using 
only one sector edit, however this parm did not 
work with my copy. 

I 1 I Use Locksmith 6.0 Fast Copy or any 
copier that ignores errors and copy the original. 

I 2 I Use a sector editor and make the 
following sector edits: 



Trk Set Byte(s) From 



To 



$00 $02 $2A 



$00 $03 $A4-A5 



38 86 27 8E AD 78 04 C9 0D 

78 06 BD BD C0 B0 13 C9 09 90 

BD 8E C0 30 7C 0F A5 2A C9 0D 

AD 00 BC 85 26 B0 09C9 09 90 

A9FF9DBFC0 05 AD 78 04 85 

1DBCC0 48 68 2AA5 2ACD78 

EA A0 04 04 60 

CD 78 04 20 2A B8 



The alternate sector edit that didn't work 



with my copy was to edit track $11, sector $09, 
byte $8B and change 8Bto 11. 

I would also like to make a brief comment 
regarding the Big Blue deprotections. I think 
one point that is being overlooked in many of 
the objections to the IBM RDEX is the 
continued existence of COMPUTIST. I am sure 
that software companies would love to see this 
publication fall by the wayside. We subscribers 
need to pull together and support anything that 
will increase the subscription base and help 
COMPUTIST. I am still quite inexperienced 
and learn something new from each issue. The 
by-products of deprotection are knowledge of 
machine language programming and good 
practical use of the logic thinking process. I am 
thankful that there are people willing to work 
as a volunteer staff and continue publishing one 
of the finest educational and practical computer 
magazines on the market. One softkey that I 
would like to see on the IBM RDEX page is 
one for the new version of Lotus 123. 

Softkey for. . . 



Troll Courseware: 
Maps & Globes ■ Latitude 
Longitude 



Troll Associates 



■ Requirements 

n Apple He or II series 
D DOS system master 
D 1 blank disk 

Maps & Globes - Latitude & Longitude is 
an educational series for young children. It 
introduces a child to global geography, 
including latitude and longitude. 

I have read in COMPUTIST that it is better 
to be lucky than smart. This was the case in 
this deprotection. All attempts to back up this 
disk using the normal modes with Copy II Plus 
(V 8.3), Locksmith 6.©, and EDD IV (v 4.8) 
failed. I then checked the disk with Trax from 
Bag of Tricks. Some tracks were readable and 
showed address epilogues changed from the 
normal DE AA to AF AF and also to other 
combinations such as AF AE and AF AD. A raw 
nibble dump of the unreadable tracks showed 
address headers changed from the normal D5 AA 
96 to D4 AA 96. Trax is an excellent utility in that 
it lists all headers and epilogues on a track and 
highlights abnormalities. It will also give you 
a raw nibble dump of an unreadable track, 
allowing you a visual check of this track also. 

After investigation of the disk with Trax, 
I then used COPY A from the DOS system 
master, telling COPYA to ignore the first byte 
of the address header and to ignore both bytes 
of the address epilogue. The disk copied and 
was totally deprotected by COPYA. Both disk 



1 and disk 2 can be copied in this manner. 

I 1 I Boot the DOS System Master and tell 
DOS to ignore the first byte of the address 
header and to ignore both bytes of the address 
epilogue, then run COPYA. 
CALL 151 Enter the monitor 

B954:29 00 Ignore first byte of address header 

B988:18 60 ignore both bytes of address epilogue 
3D0G go bad to BASIC prompt 

RUN COPYA 

Your copy will then be totally deprotected. 

Merging Controllers with Super lOB 

When I first subscribed to Computist, I had 
problems merging controllers with Super lOB. 
The starter kit now alleviates that problem. 
However, If someone who is new to 
COMPUTIST wants a simple alternative, this 
is my method: 

Make a bootable DOS 3.3 disk and copy 
the following files to it. 

SUPER lOB 
CHECKSOFT 
CSAVER 
CHECKBIN 

Write and save your controllers to this disk. 
To merge programs, boot the disk and: 

BRUN CSAVER 

LOAD your. controller 

&H 'his holds your controller 

LOAD SUPER lOB 

&M this merges the two programs 

RUN & follow the prompts 

Csaver is a program published in 
COMPUTIST #13. 1 did not see it listed on the 
catalog of the starter disk that I have. It may 
be on newer copies. The other programs are 
on the starter disk. To check your entries against 
the published checksums, ente r: BRUN 
CHECKSOFT, then press [*] IreTORNI . 
You can edit and save the controller to this same 
disk. 



Dan Halfwit 



Before I begin, I wish to make one 
comment regarding SILENT SERVICE and 
F-15 STRIKE EAGLE. Everyone is going nuts 
trying to crack them, but did anyone ever try 
to copy them? It's so easy to make a 100% 
reliable copy of these games (and possibly other 
earlier releases from MicroProse) that it's a 
joke. And it works with ANY Apple Ile/IIc 
version. Simple fast copy tracks $©-$21 and 
quarter-track the last track, $22.25. For Copy 
II Plus users: 
T0-T21, Sector Copy 
T22.25 

and that's it. No mysterious mine fields or 
mutating ships. 



36 



COMPUTIST j^eo 



October 



Softkey for.. 



Star Fleet I v2.1 

Interstel/Electronic Arts 



■ Requirements 

n Any fast copier 
n A blank disk 

Star Fleet I is a great game. It's sort of two 
games in one. One with iii-res graphics, or one 
in 8(Z)-column mode. And not even any copy- 
protection! (Then why am I writing this?) 

Good question. The answer is that, even 
though they are starting to trust us (the honest 
end user), they still haven't quite let it go all 
the way. There's a large manual (exactly 1O0 
pages long), and the game prompts the user to 
enter a word from the book at random. This 
is a big pain, and no real protection scheme. 
Perhaps they never heard of a photo-copier. Just 
something else to annoy us. 

Anyway, here is how we get around this 
little problem. There are a lot of ways to start, 
but I selected this one. It was a little tedious, 
but it worked. I scanned both sides of the disk 
for every occurrence of LDA $COOO. For 
those of us who think in hex, AD 00 C0. 1 found 
them in some very interesting places. So, 1 by 
1, 1 replaced them with a JMP $C60(Z). When 
it scanned the keyboard at a given point, it 
would reboot the disk instead, giving me a 
visual clue as to where I was in the program. 
Crude, but effective. Anyway, the next to the 
last one I tried was the correct one. After using 
Copy II Plus and the disk map option, we find 
this to be in a file called PARTI . After a while, 
we find that parts of the file are encrypted. Why 
am I not surprised? That's no problem however. 
PARTI loads at $4000. At the very beginning 
we see: 



4027 LDA #00 
4029 STA $9506 
402C JSR $539C 
402F CPX #01 
4031 BEQ $4036 (+03) 
4033 JMP $40FA 
4036 LDA #01 
4038 JSR $4318 



Password Screen 

Check Result 

Did ii pass? 

No, Insull the user. 

Slan the program 



I found out the above comments by loading 
the program and executing them by hand. At 
first, I NOP'ed the JMP $40FA. I just entered 
any password and proceeded. But I was still 
called a spy. So I NOP'ed the JSR $539C. Same 
problem. So what did I miss? Being blessed 
with a Ilgs, there is a built in memory search 
routine, "xx xx xx < start. end P" where xx 
are the bytes in question, and start and end are 
the range to look at. Don't forget the P. 

We find this jump at $4144 and $4278. 
NOP them and no more problems! (Imagine my 
surprise.) So it appears that if you enter the I 



password, it loads the X-register with a 1. I'd 
rather NOP the JMP's and be safe. I played a 
full game with no surprises. For the curious, 
there is a lot of space used by the encrypted 
junk. You could erase it and replace it with 
whatever. 

Step-by-step 



I 1 I Copy both sides onto a blank disk. 
I 2 I Boot the second side. (To load DOS.) 

loci to get a prompt 

BLOAD PARTI ,A$4eOO 

CALL -151 enter monitor 

4033:EA EA EA 

4144:EA EA EA 

4278:EA EA EA 

402C:EA EA EA 

foci back to BASIC 

UNLOCK PARTI 

BSAVE PARTl,A$40eO,L$3FeO 

LOCK PARTI 

And you're done! Put a faster DOS on the 
disk or, at least, put normal DOS on the disk. 
Relax with a pizza and forget the manual. 



MOST 

WANTED 



ABM Muse 

Agent U.S.A. Scholastic 

Airhearl Broderbwid 

Algebkster Davidson & Associates 

Algebra I hitelligent Tutor 

Alien Mind PBI 

Anhk Datamost 

Apple Super Pilot 1 

Ariificial Intelligence Scholastic 

Batmce of Power Mindscape 

Bandits Sirius Software 

Bank Street Filer Broderbund 

Bank Street School Filer Sunburst Communications 

Barron's Computer SAT .' 

Battlegroup SSI 

Battlewne Aiarisoft 

Brain Bank The Obser\wor\' 

Burgertime ? 

Captain Goodnight ? 

Caverns of Callisto Origin 

Certificate Library Vol. I ' 

Chuck Yeager's Advanced Flight Trainer Electronic Arts 

Colossus TV Firebird 

Creature Venture Softsmith Co. 

Cross Clues Science Research 

Cross Country Mly Softsmith Co. 

David's Midnight Magic ? 

DB Master V4.0 Stoneware 



Deathlord Electronic Arts 

Epidemic S.SI. 

F-15 Strike Eagle Microprose 

Fay: The Masked Woman Didatech Software 

Fay's Word My Didatech Software 

Fortress S.SI. 

Fun Bunch Unicorn 

Galaxian Atarisoft 

Galactic Gladiators S.SI. 

Game Show Advanced Ideas 

Gemstone Heder SSI 

GradeBusters 1-2-3 Gradebusters 

Gutenburg Jr. Micromotion LTD 

Handicapping System Sports Judge 

Impossible Mission Ep\.\ 

Jigsaw Microftin 

Joust Atarisoft 

Killed until Dead Accolade 

Legacy of the Ancients Electronic Arts 

Little Computer Peaces House on a IMsk Aaivision 

Lollipop Dragon Society for Visual Ed 

Cursor Control Adventures 

Plotting & Programming Adventures 

Letter & Number Key Adventures 

Function Key Adventures 

Mapc Spells Tlie Learning Company 

Maxi Golf Thunder Mountain 

Micro League Baseball Micro-league Sports 

Microme HIS Scholastic 

Mr. Do Datasoft 

Mr. Pixel's Cartoon Kit Mindscape 

Ms. Pac-Man Atarisoft 

Never Ending Story Datasoft 

Odin Odesta 

On Balance Broderbund 

Peeping Tom Microlab 

Pensate Penguin 

Personal Finance Manager (PFM) Apple Computer 

PES File & Report Hgs Software Publishing Corp. 

Pirates Microprose Software 

Prime hotter Primesoft Corp. 

Principals Assistant Library Mindscape 

Print Master Vnision World 

Pro-Football Sports Judge 

Publisher Springboard 

Puzdes & Posters MECC 

Quiz Castle Didatech Software 

Rescue On Fractalis Epy.v 

Rttski Duck Softsmith Co. 

Scrabble Electronic Arts 

S.E.V.I.S. S.SI. 

Smart Eyes Addison Wesley 

Snaggle Broderbund 

Space Eggs Sirius 

Space Journey Mindscape 

Spare Change Broderbuitd 

Stellar 7 Penguin Software 

Stellar 7 Soft^vare Entertainment 

Success with Typing vl.2 Scholastic Software 

Super Factory Sunburst 

Think Tank Living Video 

Tower of Myraglen H (Hgs) ? 

Toy Shop Broderbund 



October 



COMPUTIST #60 



37 



COMPUTIST back issues 



To order, Use the back issue order form on page 42 



IM* Features: •Bool lie Utilities on any 
compatible 'Help with Ultima V •Convert Printmaster graphics 
into Print Shop graphics 'The lnvincil)le Bard (ill) •The 
Deprotection Game •Patching ProDOS 1.1.1 •The Product 
Monitor •AppleWorks and the ImageWriter II ftSoftkeys: 
•APBA Major League Players Baseball •Better Worldng: 
Spreadsheet •Better Worl(ing: Word Processor •Beyond Pinball 
•BoulderDash Construction Kit •Calendar •Calendar Crafter 
•Callfomia Games •Championship Baseball •Clip Art Collection 
vol 1 'Cours Et Gagne v1 .0 •Dazzle Draw •Everbody's Planner 
•GATO v1.3 •GoldFlnger •Jumpman •King's Quest 
•Management Edge •Movie Monster Game •MultiScribe v3.0 
•Negotiation Edge •Nightmare Gallery 'Patchworks •Picture 
Phonks •Printographer •Reader's Treasure Chest •Real Math 
•Sea Strike •Shifty Sam •Simulation Construction Kit •Snoopy's 
Reading Machine 'Snoopy's Skywriter Scrambler •Snoopy to 
the Rescue •Songwriter •Spell It! •Stickybear Reading 
Comprehension •Super BoulderDash ^APTs: •Bard's Tale 
III •Super BoulderDash •Ultima V tt Playing Tips: •Alternate 
Reality •Auto Duel •Ultima V •Where in the World is Carmen 
Sandiego /MSoftkey: •Chartmaster v6.04 •Clout vl.O 
•Copywrit •Graphwriter •Signmaster v5.04 



im* futures: •Mixing ProDOS with Thexder 
•Infocom Decoder Revisited •Cracking on the lie •Might & Magic 
Revisited 'Might & Magic Character Editor •An indepth guide 
to Ultima IV •Computing for 1-3 year olds 'The Product Monitor 
4Sofflceys: •A.I. •BoulderDash •BoulderDash Construction 
Set •DeathSword •Design Your Own Home: Architecture 
•Design Your Own Home; Interior •Design Your Own Home: 
Landscape •Pacemaker •Gauntlet •Kings Quest II •Mastery 
Arithmetic •Mterozine #26 'Muppet Slate vl.O •PFS: Graph 
•Polywriter 1 .2 •Rad Warrior •Rings of Zilfin •Seaspeller •Smart 
Eyes •Spell It! •Wings of Fury ^lAPTs: •Castle Wolfenstein 
•Marble Madness llgs •Might & Magic •Ultima IV •Ultima V 
* Playing Tips: •Coveted Mirror 'Deathlord •Might & Magic 
•Oo-Topos^lJltimalV *yVotes; 'A better way to print Starter 
Kit DOC's •Curing Fatal System Error #091 1 •Realtime Situatkin 
Control using CDAs •Chuck Yeager's Advanced Flight Trainer 
•IBIMM^f •Help Wanted! 



\Mii Features: •Electronic Art's Protection 
Language •How to find hkiden code with EOR DiskScan •Here's 
another look at •Lower Case & Infocom Games •Monsters of 
Might & Magic •A Character Editor for Rings of Zilfin •A Single 
Data Disk for all your Print Shop Graphics •The Product Monitor 
liSo/tkeys: 'American Challenge 'Arctic Fox 'Bard's Tale 
II •BoulderDash Construction Set •California Games 
•Championship Wrestling •Chief of Detectives/Drawing 
Conclusions •Deep Space •Dome Simplified Bookkeeping 
System 'Dr. Ruth's Computer Game of Good Sex •Earth Orbit 
Stations •Factory •Galaxy Search/Predicting Outcomes •Game 
Maker 'Hacker II 'Hardball llgs 'ikari Warriors •Labyrinth 
•Marble Madness •Master Diagnostics He •Math Blaster 
•Mtekey's Space Adventure •Micro<kimputer Learning Games 
•Mk;rozine #14 •Mbrozine #24 •Milliken Math Series •Mind 
Prober •M - ss - ng L - nks •Morning Star Spelling •Mountain 
CMng/Cause and Effect •Movie Monster Game •Pond •Race 
Track/Reading for Detail •Reading Comprehension Main Idea 
& Details •Rings of Zilfin •Roadwar 2000 •School 
Days/Inference •Ski Crazed •Softswitch •Sub Mission •Time 
Capsule/Reading Skills •Tuesday Morning Quarterback 
•Typewriter 'Where in Europe is Carmen Sandiego 
•Wortgefecht •Xevious tAPTs: •Deep Space •H.E.R.O. 



•Moebius •Rings of Zilfin 'Roadwar 2000 *Plapng Tips: 
• Arcticfox 'Castle Wolfenstein 'Conan 'Donkey Kong •Ultima 
IV IBM MIceys: Symphony v1 .00 •TK! 



im* Features: ^Apple llgs Secret Weapon 
•5 second fastboot into Locksmith 6.0 Fastcopy 'The Product 
Monitor •Taking the grind out of Championship Wrestling 
•Making some improvements to The Nibbler 4StMe}s: ^2400 
AD '40' Graphics Studio •Accolade Comics •Aesop's Fables 
•American People •Animal Hotel •Applewriter He •Arcade 
Album #1 •Arctic Anfics •Ballbiazer •Bard's Tale II: The Destiny 
Knight •Bard's Tale llgs •Cat'n Mouse 'Championship Wrestling 
'Chariie Brown's 1 ,2,3's 'Cobra Cavern 'Cotor Me •Create With 
Garfield •David Winfield's Batter Up! •Destroyer •Disk Optimizer 
II •DragonworW •Electronic Arts Software 'En Vacances •En 
Ville •Fantavision gs •Fight Night •Forbidden Castle •G.I. Joe 
•Garfield Double Dares 'General Manager 'Goonies 
•GraphicWriter 2.0 'Gutenberg, Sr. 'Hacker II 'Hardball 
•Hardball gs •Infiltrator •James Bond 007: A View to a Kill 
•Keyboard Kadet •Kids on Keys •Lazer Maze •Le 
Demenagement •Le Francais par Ordinateur: •Leisure Suit 
Larry in the Land of the Lounge Lizards 'Les Sports •Lion's 
Workshop •Microzine #21 •Microzine #22 •Milliken Word 
Processor •Millionair II •Multiscribe v2.0 •Multiscribe v3.0 
•Multiscribe llgs v3.01c 'Paris En Metro 'Pitfall II 'Racter 
•Railroad Works •Rambo: First Blood Part II •Realm of 
Impossibility •Same or Different 'Sea Dragon •Sea Strike 
•Shanghai •ShowOff •Shutterbug •Silent Seme llgs 'Snoopy 
to the Rescue •Snoopy's Reading Machine •Snoopy's Skywriter 
Scrambler 'Space Quest I •Space Station •Spy Hunter 'Spy's 
Adventures in Europe 'Spy's Adventures in North America 
'Stephen King: The Mist 'Story Maker •Street Sports Basketball 
•Sub Battle Simulator •Super Sunday Football •Talking Text 
Writer •Type! •Un Repas Francais •Voodoo Island •Where in 
Europe is Carmen Sandiego •Winnie the Pooh •Winter Games 
•Winter Games gs •Wordzzzearch • Worid Games gs « APTs: 
•2400 AD •Kung-Fu Master •Lady Tut •Ultima V i^ Playing 
Tips: '2m AD •Deathlord •Space Quest •Ultima IV •Ultima 
V •Wrath of Denethenor KM So^eys •Execu-Vision •MS Word 
•PC-Draw •Zork I & II tit Notes: •Not too happy with Copy 
II Plus v8.1 •Data disks cause Appleworks crash 



May im* Features: 'A Utility to Save the 
Lower 8 Pages of Memory •Bard's Tale Effects Locator •How 
to Capture Phantasie Screen Maps •Alternate Reality Character 
Editor •Updating the ProDOS Block Editor •Loading Rashcalc 
onto your RAMcard •A Copy-protection Scheme for ProDOS 
•The Product Monitor •Autoduei Car Editor tSoftlceys: 
•Alphabet Sequencing •Animal Alphabets and Other Things 
•Arctic Antics •The Boars' Store •The Boars Tell Time •Career 
Focus •Castle Wolfenstein •Charlie Brown's 123's •Charlie 
Brown's ABC's •City Country Opposites •Coveted Mirror 
'Create With Garfiekl 'Crypt of Medea •Customized Alphabet 
Drill •Customized Flash Spielling •Dig Dug •Digital Paintbrush 
System •Estimation •Fay: Word Hunter •Fix It •Focusing on 
Language Arts •Fundamental Capitalization •Fundamental 
Punctuation Practice •fundamental Spelling Words in Context 
•The Hobbit 'Homonyms in Context 'Individualized Study 
Master 'Inskle OutskJe Shapes 'Inside Outside Opposites 
'Leisure Suit Larry in the Land of the Lounge Lizards 'Master 
Diagnostics II & II + 'Mastertype v2.1 •MathematKS Series •Mr. 
and Mrs. Potato Head •Paper Models • The Christmas Kit 
•Peanuts Math Matcher •Peanuts Maze Marathon •Peanuts 
Picture Puzzlers 'Perry Mason: The Case of the Mandarin 
Murder •Railroad Works •Random House Library •Management 



Programs •Rooky's Boots v.4 •Sensible Speller 'Snoopy's 
Reading Machine 'Snoopy's Skywriter Scrambler 'Snoopy to 
the Rescue 'Snoopy Writer •Spelling Demons •Stock Market 
Simulation •Story Builder 'Story Starter 'Studk) II 'Test Maker 
'Think Quick vl.O 'Tournament Bridge •Tutorial 
Comprehension •Typing is a Ball, Charlie Brown •Under Fire 
•Word Blaster •Word Count •Word Mount •Your Personal Net 
Worth *APTs: •Under Fire IM Feature: •Flight Simulator 
RGB Modifications 



April 1988 *fea/i//es.- •Picture Loader 'How 
To Make DEMUFFIN PLUS 'Convert Print Shop graphics into 
Print Master graphics 'lower case letters For Your Apple II Plus 
•The Product Monitor •Apple He Paddle Fix •Softkey for Daisy 
Professional 'Most-Protected' Award •DOS EOR Maker 
tSoftkeys: A2-PB1 Pinball 'Animate 'Bank Street Music 
Writer 'Boulderdash Construction Kit 'California Games 
•Countdown to Shutdown •Coveted Minor 'Create with Garfiekl 
'Daisy Professional 'Destroyer 'Donkey Kong 'Expedition 
Amazon •General Chemistry Disk #8 •Graphics Studio •Green 
Gkibs & Graphic Equatkms •Kalamazoo Teacher's Record Book 
2.® •Kids on Keys •Marble Madness •Math Blaster 'Maxwell 
Manor 'Peanut's Maze Marathon 'PetroOalc 'Police Artist 
'Practkial Grammar 'Rendezvous •Ring Quest •Roadwar 
Europa •Roadwar 2(M)(D •Rocky Horror Show 'Sesame Street 
Electric Coloring Book Series 'Sesame Street Letters for You 
'Sesame Street Numbers 'Seven Cities of Gold 'Snoopy's 
Reading Machine •Spy's Adventures In Europe •Spy's Demise 
•Super Sunday Football •Talisman •Tellstar II •Top Draw 
vl.CIA •The Amerkan Challenge •The Dam Busters 'The 
Science Professor •Tubeway •Vocabulary Adventure I •Winter 
Games •Wizards' Crown •Zero-Gravity Pinball 4 APTs: 
•Expedition Amazon ^Might and Magic t Playing Tif^: 
•Beauracracy •King's Quest II 'Lurking Horror 'Maniac 
Mansion 'Stationfaii \M Feature: 'Introduction to IBM Disk 
Format, Ai^ess, and Copy-protection 'Putting Sargon III on 
harddisk WASoltkeys: •Prokey 3.0 •R:base 400 •Time 
Manager 



Martfa 1988 1 Features: 'Modify Super lOB to 
read/write every other track 'APT for Rings Of Zilfin: Turn 
yourseff into a lean, mean fighting Machine 'More Softkeys for 
M.E.C.C. software ( 1987 ) 'How To Use The Electronk; Art's 
RWTS 'APT for Realms Of Darkness: Realm's Wrecker! 
•Putting Super Boulder Dash onto a hard disk € Softkeys: 
•240® A.D. •Age Of Adventure •Apple's Core II •Arcade Boot 
Camp •ArctK Fox •Aztec •BallWazer •Bard's Tale llgs •Blue 
Powder Gray Smoke •California Games •Championship 
Wrestling •Colonial Conquest •Comprehension Skills 1,11 
•Conquering Whole Numbers •Coordinate Math •Countdown 
To Shutdown •Dataquest: The World Community •Destrojir 
•Dream House 'Dream Zone 'Earth Orbit Station 'Equation 
Math 'Forecast: Your At-Home Weather Station 'Fraction 
Concepts Inc 'Fraction Munchers 'Fraction PractkM Unlimited 
•GBA Champnnship Basketball 'Genesis 'GFL Football •Ghost 
Rider •Goonies 'Grade Manager v2.3 •Great American Cross- 
country Road Race •Hardball llgs •Ikari Wan^ior 'Jenny's 
Journeys 'Kid Niki Radical NInja 'Kung-Fu Master •Learning 
To Tell Time •Leisure Suit Larry •Let's Learn About Money 
•Let's Learn About The Library •Letters For You •Lords Of 
Conquest •Magic Spells •Math Blaster •Money Worics •Maps 
& Gk)bes: Latitude & Longitude •Marble Madness •Mcrozine 
18,19,20,21,22,23 •Mist •Morning Star Math •Movie Monster 
Game •Multiplication Puzzles •MuHiscribe v3.0c •Murder On 
The Mississippi •Music Made Easy •Mystery Sentences 



38 



COMPUTIST #60 



October 



COMPUTIST back issues 



To order. Use the back issue order form on page 42 



•Number Munchers tNumbers Count •Odell Lake •Operation 
Frog •Opposites Attract 'Oregon Trail v1.4 'Phonics Prime 
lime: Blends & Digraphs 'Phonics Prime Time: Vowels I, II 
•Puzzles & Posters 'Quotient Quest •Reader Rabbit 'Reading 
Style Inventory 'Realm Of Impossibility 'Sesame Street 'Crayon' 
series 'Shanghai 'Sons Of Liberty 'Space Quest v2.2 'Story 
Book: Pixelworks 'Story Tree 'Subtraction Puzzles 'Super Huey 
'Super Wordfind 'Tass Times In Tonetown 'Those Amazing 
Reading Machines 111, IV 'Timothy Leary's Mind Mirror 'To 
Preserve, Protect and Defend 'Tower Of Myraglen 'Troll's 
'MicroCoarseware' series 'Webster: The Word Game 'Word 
Munchers 'Words At Work: Compound It 'Words At Work: Suffix 
Sense 'WorkJ Games 'Worid's Greatest Baseball Game 'World 
Karate Championship 'Writer Rabbit 'Zoyon Patrol €APTs: 
'Buck Rogers 'Ikari Warrior 'Kung-Fu Master 'Leisure Suit 
Larry ligs 'Marble Madness 'Realm Of Darkness 'Rings Of 
Zilfin'^ce Quest llgs 'Super Boulder Dash * Playing Ti[s: 
*2i/X> A.D, 'Donkey Kong 'Infiltrator 'Space Quest llgs 'Spy 
Hunter 'Swashbuckler 'Thexder 'Ultima II ' \MSoftkeys: 
•EasyWriter 1.0, II 'Zork III 



Febniaryl988 ^Features: 'The Product 
Monitor 'Unprotecting The Unprotectable: Macintosh Softkeys! 
'A.PT. Cornucopia 'APTAIternate Reality-Dungeon: Create A 
Super-human 'Softkey for SSI's RDOS disks: 1 .ProDOS RDOS, 
2.RD0S Transfer Utility 'Making Cracked II Plus Disks Work 
On The lie ^i Softkeys: 'Apple Gradebook v2.6 'Award 
Maker Plus •Black Cauldron 'Black Magic 'California Games 
'Car Builder 'Cotor Print Shop 'Computer Ambush 'Concepts 
In Science 'Disney's Comic Strip Maker 'Elite 'Empire I, II 
'European Nations & Locations 'Fooblitsky 'Grid Designer 
'H.E.R.O, 'Ikari Warriors 'Infiltrator II 'Le Francais par 
Ordinateur 'Little Computer People's House on a Disk * Main 
Street Filer 'Master Diagnostics He * MegaFiler • MegaMerge 
'Microzine 23 'Might & Magic * Millbnaire 'Mindplay software 
•Music Construction Set •Nibbler •Operation Market Garden 
•Phantasie *Planetfall •PrintMaster Plus •Print Shop 
•Questron •Regatta •Ring Quest •Ringside Seat •Rings Of 
Zilfin •Shanghai •Silent Service •Snooper Troops •Spy's 
Adventure in N. Amerka 'Super Print 'Tass Times In Tonetown 
'Think Quick tTransylvania 'Ultima I re-release 'Where in the 
USA is Carmen Sandiego 'Worid Games *Zori( I [kUaclntosh 
softkey) *AP.r.s: Alternate Reality: The Dungeon 'Arctic 
Fox 'Bard's Tale II 'Beyond Zork 'Black Magic 'Cavern 
Creatures 'Drol 'Goonies 'Ikari Warriors •Zorro t Playing 
Tips: •Beyond Castle Wolfenstein •Championship Lode Runner 
•Conan •King's Queen II •Lode Runner •Luridng Horror 
•Station Fall •Ultima IV •Zork MA Softkeys: •Lotus 1-2-3 
•Right Simulator •PFS Report IBM AFs: •Bard's Tale 

^^ JL January 1988 feaA//i?5.- •The Crypt-arithmetic 
Helper •Using EDD IV to Modify Tracks And Sectors •Bard's 
Tale APT Dungeon Mapper Revisited •RAMfactor mod for Laser 
1 28 •Ultima IV APT edit-tables •The Product Monitor •Get Better 
Sound by using the cassette jacks •Making A Fast Boot Disk 
•Might & Magk; APT edit-tables Softkeys: •2400 AD •Aliens 
•Alphabet Zoo •Amnesia 'Bag Of Tricks •Bard's Tale I 'Bard's 
Tale II 'Battle Cruiser 'Beach-head II 'Below The Root 'Black 
Magic 'Body Awareness 'Bridge 4.0 'Carriers At War 'Catalyst 
3.0 'Centipede 'Championship Boxing 'Championship 
Wrestling 'Chessmaster 2000 'Combining The Elements 
'Commando 'Creative Contraptions 'Einstein Compiler 'Fat 
City •Fight Night •Right Simulator v2.0 •Fun with Direction 
•6BA2-0n-2 Championship Basketball •GraphicWritervl.IRA 
•Growing Up Small •HouseK)n-a-disk •Intrigue •Jet •Jungle 



Hunt •Kindercomp •Knowing Numbers 'Kung-fu Master 'Law 
Of The West 'Learning Well series •Letters And Words 'Little 
Computer People 'Make Your Own Murder Party 'Manic 
Mansion 'Master Diagnostics 'Movie Maker •Music 
Constructron Set •Pinball Constructton Set 'Pitstop •Print Shop 
Graphics Library Holiday 'Print Shop llgs •Rendezvous 
•Shapes And Patterns •Silent Service 'Sorcerer 'Spy vs Spy 
I & II 'Stargate 'Stellar 7 •Stkikybear ABCs •Stckybear Drawing 
•Stickybear Numbers •Stickybear Printer •Stickybear Printer 
Library I & II •Stickybear Townbuilder 'Super Boulderdash 
'Temple Of Apshai Trilogy 'Tomahawk 'Thexder 'Walt 
Disney's Card And Party Shop 'Walt Disney's Cartoon Maker 
'Wings Of Fury 'Word Maze 'Worid's Greatest Baseball Game 
'Zork HI AP.ls: Bard's Tale 'Lode Runner 'Might & Magic 
'Ultima IV 'W. Disney's Card And Party Shop •Wizardry III 
•Wizardry IV Playing Tps: •Autoduel •King's Quest •Manic 
Mansion •Summer Games 'Tass Times In Tonetown 'Thexder 
•Where In the Work) is Carmen Sandiego? 



December 1987 Features: •Super Boulderdash 
APT-writer •Softkeys to Activision/ MECC/ and PFS ProDOS/ 
software 'Double F-8 ROM space w/o motherboard surgery 
'Ace-Apple bimodal Switch 'Using Sider hard drives 3W, 
800K drives, & 5Vt" drives in DOS 3.3 Si^keys: 'Aliens 'Alter 
Ego 'Alternate Reality 'Amazing Reading Machines 'Amazon 
'American Challenge 'Arcade Album #1 "Arithmetic Critters 
•Award Maker 'Baseball Database 'Bard's Tale II: Destiny 
Knight 'BC's Quest for Tires 'Bop & Wrestle •Champ. Boxing 
•Champ. Wrestling •Clock Works •Commando •Computer Prep 
for SAT •ConflKt In Vietnam •Counting Critters •Crisis Mountain 
•Dataquest 50 States •Deluxe Paint II •Dino Eggs •Disney Card 
& Party Shop 'Disney Comic Strip Maker •Draw Plus •Eidolon 
•Electric Crayon ABCs •Expedition Amazon 'Pacemaker •Rrst 
Letter Fun 'Fish Scales •Fun From A-Z •Game Maker •GBA 
Champ. Basketball •GFL Champ. Football •Graphicwriter 
1.0R/1.1R 'Great Road Race 'Hacker II 'Hardball 'Infiltrator 
II 'Instant Music 'James Bond 007: A View To A Kill 'Jenny's 
Journeys 'Kung Fu Master 'Little People 'List Handler 'Manic 
Mansion 'Mastery Arithmetic Games 'Market Place 'Master of 
Lamp 'Math Rabbit 'Microzine #17 'Might and Magic 'Mission 
In Solar System 'Moebius 'Music Construction Set 'Music 
Studk) 'Number Munchers 'Paint With Words 'Paintworks Plus 
'Path Tactics •pfs:Rle 'pfs:Graph •pfs:Plan •pfs:Report 
•pfs:Write •Phonics Prime Time •Portal 'Principal's Assistant 
'Print Shop ProDOS 8 v1.4 'Print Shop Holiday Edition 
'QuickflashI 'Reader Rabbit 'Realm of Impossibility 'Robot 
Odyssey I v.2.0 'Rocky Horror Show 'Rocky's Boots v4.0 
'Saracen 'Shanghai 'Silent Service 'Skylab 'Sound Tracks 
'Speedy Math 'Spindizzy 'Street Sports Baseball 'Sub-Mission 
•Super Boulderdash •Tass Times in Tonetown •Thexder •Top 
Fuel Eliminator •Word Handler •Word Munchers •Words at 
Work •Worid Karate Champ. 'Writer's Choice: Elite 'Zardax 
V5.2.1 



November 1987 Features: •Eliminate some 
ProDOS erroneous error messages •Date/time without a clock 
card •Sector surgery: recover lost files •Generating Applesoft 
programs 'on-the-fly' •Product Monitor reviews »PLUS: How 
to convert List Handler files into standard text files •How to make 
GRAPHIC.GRABBERV3 run on the llgs •Laser 128 'absolute' 
PESElPlayir^ Tips: •Bard's Tale II 'Conan 'Donkey Kong 
•Hacker I •Hard Hat Mack •Ortjitron 'Print Shop Companion 
'Spellbreaker 'Spy Hunter 'Ultima 4/1./'. T.s: Infiltrator 'Lode 
Runner 'Montezuma's Revenge 'Swordthrust series Softkeys: 
'Addition Logician 'Animate 'Arcade Boot Camp 'Arctic Fox 



'Bard's Tale II 'Cat'n Mouse 'Counting Critters 'Dam Busters 
t 'Destroyer 'Draw Plus v1 .0 'Dr. Ruth's Comp, Game Of Good 
Sex 'Echo 1.0 'E.D.D. 4 'Gamemaker 'Hard Ball •Infiltrator 
•List Handler f •Locksmith 6.0 Fastcopy t 'Magic Slate 'Math 
Critters 'Millionaire 'Mind Mirror 'One On One 'Paintworks 
Plus v1.0 'Paintworks Plus vl.i'PHM Pegasus 'Portal 
'Quotient Quest 'Reader Rabbit 'Saunder's Chemistry CAI 
•Science Toolkit •Shanghai •Strip Poker f •Super Bunny 
•Super Sunday •Swordthrust series t 'Term Paper Writer •Thief 
•Top Fuel Eliminator •Typing! f 'Up-n-Down •Willy Byte 
•Writer's Choice Elite v1 .0 •Writing A Character Sketch •Writing 
A Narative 



October 1987 Features: •Dungeon Editor & 
Encounter Editor for Ultima HI •APT for Shadowkeep 'Softkey 
for Shadowkeep 'Softkey for Apple Business Graphtes Softkeys: 
•816 Paint GS •Amnesia •Arctic Fox •Award Maker Plus 
•Bard's Tale II •Bettemiorking Word Processor •Beyond Castle 
Wolfenstein •Black Magk) •Bookends Extended •Bop & Wrestle 
•Chess 7.0 •Chessmaster 2000 •Deluxe Paint GS •Destroyer 
•Hacker II 'Hacker II GS 'Hardball 'Infiltrator 'Instant Music 
GS 'J-Bird 'Mabel's Mansion 'Marble Madness 'Mean 18 GS 
GoH •Megabots •Might & Magic •Miner 2049er II •Mouse Word 
•Music Construction Set GS 'Music Studio GS 'New Oregon 
Trail 'Paintworks Plus 1 .0 GS 'Paintworks Plus 1 .0 GS 'Paul 
Whitehead Teaches Chess 'PHM Pegasus 'Poetry Express 
'Print Shop color version 'Rambo: First Blood part II 'Rocky 
Horror Show 'Sargon HI* 'Shanghai GS 'Spindizzy 'TelePorter 
'Temple Of Apshai trilogy 'Top Draw GS 'Transylvania 'Ultima 
I 'World's Greatest Baseball Game 



September 1987 Features: •Infocom-text Reader 
Enhancement •Color Ultimapper mod to Ultimapper IV •Towne 
Mapper utility for Ultima IV •Dungeon Mapper utility for Bard's 
Tale Hardware Corner: Interrupting Your Apple •Softkey for 
Chariie Brown's \,2,2& Softkeys: 'Guitar Wizard 'Gemstone 
Warrior 'Notable Phantom 'Micro Wine Companion 'Stickybear 
Printer 'Note Card Maker 'Starcross 'Wishbringer •Dinosaur 
Dig •Dam Busters 'Pirate Adventure 'Infiltrator 'MECC 
software 'Banner Catch 'Turtle Tracks 'PFS RIe 'Microzine 
#12, #13, #14 'Marble Madness 'Writer Rabbit 'Arcticfox 'Age 
Of Adventure 'Might And Magic 'Space Station 'Alternate 
Reality 'Mindshadow 'Gemstone Warrior •Strip Poker 
•Lucifer's Realm •Manuscript Manager •Bank Street Writer III 
•Kids On Keys 'The Missing Ring •Graphic Solution •Empire 
1, 11 'Champ. Golf 



August 1987 &/?*?>«■.■ 'Advanced Microsystems 
Technology programs 'Word Attack 'Star Blazer •Science 
Toolkit •The Color Enhanced Print Shop •Video Vegas •The 
Handlers •K.C. Deals On Wheels •Law Of The West •Break 
The Bank Blackjack •Foundation Course In Spanish •OGRE 
•Puzzles And Posters Features •The Shift Key/Lower Case 
Option For II + 'Amazing Computer Facts 'Shape Magic utility 
Review. Multiscribe 



July 1987 Softkeys: 'Mouse Calc 'Sands of 
Egypt 'Number Farm 'Agent U.S.A. •Wavy Navy •Kindercomp 
•Right Simulator Update •Raid over Moscow •Crime Stopper 
•Key Perfect 5. •The Final Conflict •Miss Mouse •Snoggle 
Features •Write Protecting the Microsoft RAM Card •Keys to 
Success on the Franklin Ace •Modified F8 ROMs on the Apple 
/// Core •Owner's Review of Copy Master II 



October 



coMpynsT #60 



"39"] 



roiUPllTlST back issues 



June 1987 Softkeys: 'Arcade Boot Camp 
•Goonies •Zorro •Coveted Mirror •Crimson Crown 
•Compubridge •Fleet System 3 •Microwave •Escape 'Catalyst 
3.0 •Number Farm •Alphabet Circus •Joe Theisman's Pro 
Football •Black Cauldron •Intern. Gran PmFeatures •Making 
DOSIess Utilities •Pixit Printer Drivers Review: Z-RAM Memory 
Expansion Board •Reading the Joystick 



May 1987 Softkeys: •Graphics Expander 

•Information Master •Certificate Maker •Elite •Catalyst 2.0 and 
3.0 •Murder On The Mississippi •Temple Of Apshai Trilogy 
•Troll Associates programs •Spell It •Regatta •Cdex Training 
programs •Think Fast Features •How to Write-Protect your Slot 
Zero •Capturing Locksmith 6.0 Fast Copy •Revisiting DOS to 
ProDOS and Back Core 'Computer Eyes / 2; a Review 74/^5 
•Sword of Kadash & Rescue Raiders •Ultimaker IV 



Apriil987 5o/?te>'5,-^LightSimulator^Beach- 

Head •Monty Plays Scrabble •Racter •Winnie the Pooh 
•Infocom Stuff, Kabul Spy, Prisoner II •Wizardry 1 & 2 •Lucifer's 
Realm •The PFS Series •Dollars and Sense 'Strip Poker 
•Coveted Mirror •Wizard's Crown 'The Swordthrust Series 
•Axis Assassin •Manuscript Manager •The Crown of Arthain 
•Address Book 'Decimals 3.0 'Dragonfire Features •Auto Duel 
Editor •Wizard's Crown Editor •Questron Mapper Core: •The 
Games of 1986 in Mm Adventure Tips •Ultima IV 

4 1 March 1987 Softkeys: •The Periodic Table 
•Gemstone Warrior •Inferno •Frogger •Story Maker •Adventure 
Writer •Mummy's Curse •Zaxxon •The Quest •Pitfall II 
•H.E.R.O. Features 'A Two-Drive Patch for Winter Games 
•Customizing the Speed of a Duodisk •Roll the Presses Part 
Two: Printshop Printer Drivers •The Games of 1986 



40 



Februarj' 1987 Softkeys: 'Adventure Writer 'E-Z 
Learner 'Mychess li 'Raster Blaster 'Cranston Manor 
'Ghostbusters 'Designer's Pencil •The American Challenge 
•Encyclopedia Britannica Programs •Crime Wave Features 
•Taking the Wiz out of Wizardry 'Adding a Printer Card Driver 
to Newsroom Core: Games of 1986 



January 1987 So/?A-e>s,' •MIDI/8 + 'Homeword 

v2.1 "Borrowed Time "Amazon •Speed Reader ][ 'Discovery! 
•M-ss-ng L-nks series 'Donald Ducks's Playground 'Mastering 
the SAT 'Copy ][ Plus 4.4C 'Master of the Lamps 'One on One 
•Bridge Baron •A.E, 'Great American Cross-country Road Race 
•Computer Preparation for the SAT •Castle Wolfenstein 
•Luscher Profile 'Skyfox 'Silent Service 'Echo Plus 
'Swashbuckler 'Randamn Features 'Electronic Disk Drive 
Swapper 'Abusing the Epilogues •Print Shop Companion's 
Driver Game Core: •Keyboard Repair 'Fixing the Applesoft 
Sample Disk 



'Breaking In; tips for beginners 'Copy ][ Plus 6.0: a review 'The 
DOS Alterer 



Castle Wolfenstein (part 2) 



December 1986 Softkeys: 'Cyclod 'Alternate 
Realty 'Boulder Dash 1 & II 'Hard Hat Mack (Revisited) 'The 
Other Side 'F-IS Strike Eagle 'Championship Lode Runner 
•Gato V 1.3 •!, Damiano •Wilderness •Golf's ^{Features: 
•The Enhanced/ Unenhanced lie •Looking into Flight 
Simulator's DOS Core: •Appavarex •Installing a RAM disk into 
DOS 3.3 



November 1986 So/i'fe;®.- •Under Fire 'Pegasus 

11 'Take 1 (revisited) 'Flight Simulator II v1.05 (part 2) 'Magic 
Slate 'Alter Ego 'Rendezvous 'Quicken 'Story Tree 'Assembly 
Language Tutor 'Avalon Hill games 'Dark Crystal Features 
•Playing Karateka on a lie •Track Finder 'Sylk to Dif Core: 



October 1986 5o/?/(re/s.' 'Flight Simulator II v 

1.05 'AutoDuel 'Critical Reading 'Troll's Tale 'Robot War 
'General Manager 'Plasmania 'Telarium Software 'Kidwriter 
v1.0 'Color UeFeatures 'Screenwriter meets Flashcard 'The 
Bus Monitor 'Mousepaint for non-Apples Core: 'The Bard's 
Dressing Room /l/T 'Championship Lode Runner 



September 1986 5o/?te/5.- 'Olympic Decathlon 

'Hi-res Cribbage 'Revisiting F-15 Strike Eagle 'Masquerade 
'The Hobbit 'Pooyan 'The Perfect Score 'Alice in Wonderland 
•The Money Manager •Good Thinking •Rescue Raiders 
Feature: Putting a New F8 on Your Language Card Core: 
•Exploring ProDOS by instaling a CPS Clock Driver 



August 1986 SoUceys •Crisis Mountain 'Terripin 
Logo 'Apple Logo II 'Fishies 1.0 'SpellWorks 'Gumball 
'Rescue at Rigel 'Crazey Mazey 'Conan 'Perry Mason: The 
Case of the Mandarin Murder 'Koronis MFeature: 'More ROM 
Running Core: 'Infocom Revealed 



July 1986 5o;?te>« 'Word Juggler 'TinklTonk! 

'Sundog v2.0 'G.l. Joe & Lucas Film's Eidolon 'Summer 
Games II 'Thief 'Instant Pascal 'World's Greatest Football 
Game 'Graphic Adventure #1 'Sensible Grammar & Extended 
Bookends 'Chipwits 'Hardball 'King's Quest II 'The World's 
Greatest Baseball Game Feature: 'How to be the Sound Master 
Core: 'The Mapping of Ultima IV 



June 1986 Softkeys 'Revisiting Music 

Construction Set 'Cubit 'Baudville Software 'Hartley Software 
'Bridge 'Early Games for Young Children 'Tawala's Last 
Redoubt 'Print Shop Companion 'Kracking Vol II 'Moebius 
'Mouse Budget, Mouse Word & Mouse Desk 'Adventure 
Construction Set Feature: 'Using Data Disks With Microzines 
Cwe; 'Super lOBvl .5 a Reprint 

31 May 1986 5o/?fe/s 'Trivia Fever 'The Original 
Boston Computer Diet 'Lifesaver 'Synergistic Software 'Blazing 
Paddles 'Zardax •Time Zone 'Tycoon 'Earthly Delights 'Jingle 
Disk 'Crystal Caverns 'Karate Champ Feature: 'A Little Help 
With The Bard's Tale Core: 'Black Box 'Unrestricted 
Ampersand 



April 1986 5o/?fe>s 'Millionaire 'SSI's RDOS 

'Fantavision 'Spy vs. Spy 'Dragonworld 'King's Quest 
'Mastering the SAT 'Easy as ABC 'Space Shuttle 'The Factory 
'Visidex LIE 'Sherlock Holmes 'The Bards Tale 'Feature 
'Increasing Your Disk Capacity 'Core: 'Ultimaker IV, an Ultima 
IV Character Editor 



March 1986 5o//teys 'Threshold 'Checkers 

v2.1 'Microtype 'Gen. & Organic Chemistry Series 'Uptown 
Trivia 'Murder by the Dozen 'Windham's Classics 'Batter Up 
•Evelyn Wood's Dynamic Reader 'Jenny of the Prairie 'Learn 
About Sounds in Reading 'Winter Games 'Feature 
•Customizing the Monitor by Adding 65C02 Disassembly 'Core: 
•The Animator 



February 1986 Softkeys •Ultima IV •Robot 

Odyssey •Rendezvous 'Word Attack 8i Classmate •Three from 
Mindscape •Alphabetic Keyboarding •Hacker •Disk Director 
•Lode Runner •MIDW •Algebra Series •Time is Money •Pitstop 
II 'Apventure to Atlantis 'Feature 'Capturing the Hidden Archon 
Editor 'Core: 'Fingerprint Plus: A Review 'Beneath Beyond 



40 



coMPUTisT mo 



January 1986 Softkeys 'Microzines 1-5 

'Microzines 7-9 1 Microzines (altemate method) 'Phi Beta Filer 
'Sword of Kadash 'Another Miner 2049er 'Learning With 
Fuzzywomp 'Bookends 'Apple Logo II 'Murder on the 
Zinderneuf 'Features 'Daleks: Exploring Artificial Intelligence 
•Making 32K or 16K Slave Disks 'Core: •The Games of 1985: 
part II 



Softkeys •Cannonball Blitz •Instant Recall 

•Gessler Spanish Software •More Stickybears 'Financial 
Cookbook 'Super Zaxxon 'Wizardry 'Preschool Fun 'Holy Grail 
'Inca '128K Zaxxon 'Feature 'ProEdit 'Core: 'Games of 1985 
parti 



Softkeys 'DB Master 4.2 'Business Writer 

•Barron's Computer SAT •Take 1 •Bank Street Speller •Where 
In The World Is Carmen Sandiego •Bank Street Writer 128K 
'Word Challenge 'Spy's Demise 'Mind Prober 'BC's Quest 
For Tires 'Early Games 'Homeword Speller 'Feature 'Adding 
IF THEN ELSE To Applesoft 'Core: 'DOS To ProDOS And Back 



__ _ Softkeys 'Electronic Arts software 'Grolier 
software 'Xyphus 'F-15 Strike Eagle 'Injured Engine 'Mr. Robot 
And His Robot Factory 'Applecillin II 'Alphabet Zoo 'Fathoms 
40 'Story Maker 'Eariy Games Matchmaker 'Robots Of Dawn 
'Feature 'Essential Data Duplicator copy parms 'Core: 'DOS- 
Direct Sector Access 



Softkeys 'Choplifter 'Mufplot 'Flashcalc 

'Karateka 'Newsroom 'E-Z Draw 'Gato 'Dino Eggs 'Pinball 
Construction Set 'TAC 'The Print Shop: Graphics Library 
'Death In The Caribbean 'Features 'Using A.R.D. To Softkey 
Mars Cars 'How To Be The Writemaster 'Core: 'Wheel Of 
Money 



^ ^ Softkeys 'Miner 2049er 'Lode Runner 'A2-PB1 
Pinball 'The Heist 'Old Ironsides 'Grandma's House 'In Search 
of the Most Amazing Thing 'Morioc's Tower 'Marauder 'Sargon 
III 'Features 'Customized Drive Speed Control 'Super lOB 
version 1.5 'Core: 'The Macro System 



Softkeys 'Sargon 111 'Wizardry: Proving Grounds 

of the Mad Overlord and Knight of Diamonds 'The Report Card 
VI. 1 'Kidwriter 'Feature 'Apple ][ Boot ROM Disassembly 
'Core: •The Graphic Grabber v3.0 •Copy 11+ 5.0: A Review 
•The Know-Drive: A Hardware Evaluation •An Improved 
BASIC/Blnary Combo 



S(7/?te>« •Rendezvous With Rama •Peachtree's 

Back To Basics Accounting System •HSD Statistics Series 
•Arithmetickle •Arithmekicks and Eariy Games for Children 
'Features 'Double Your ROM Space 'Towards a Better F8 
ROM 'The Nibbler: A Utility Program to Examine Raw Nibbles 
From Disk 'Core: 'The Games of 1984: In Review-part II 



5o/i'te>s 'Sensible Spellerfor ProDOS 'Sideways 

'Rescue Raiders 'Sheila 'Basic Building Blocks 'Artsci 
Programs 'Crossfire 'Feature 'Secret Weapon: RAMcard 
'Core: •The Controller Writer •A Fix For The Beyond Castle 
Wolfenstein Softkey 'The Lone Catalog Arranger Part 1 

1 Softkeys 'Data Reporter 'Multiplan 'Zork 'Features 
'PARMS for Copy 11 Plus 'No More Bugs 'APT's for Choplifter 
& Cannonball Blitz ''Copycard' Reviews 'Replay 'Crackshot 
•Snapshot •Wildcard 



October 



Out-of-print back issues 



To order, Use the back issue order form on page 42 



Due to popular demand, these sold-out issues are available now as 'zeroxed' copies, full-sized and center stapled. 



^S JL USoftkeys: "DB Master version 4+ 'Dazzle Draw •Archon 
•Twerps UReaders ' Softkeys: 'Advanced Blackjack 'Megaworks •Summer 
Games •College Entrance Exam Prep •Applewrlter revisited MFeatures: 
•Demystifying The Quarter Track ■ Core: •Proshadow: A ProDOS Disk 
Monitor 



1 cS MSoftkeys: •Scholastic Version of Bank Street Writer 
•Applewrlter lie •SSI's Non-RDOS Disks UReaders' Softkeys: •BPI 
Accounting Programs and DesignWare Programs MFeatures: •Installing 
a Free Sector Patch Into Applewrlter //e •Simple Copy Protection ■ Core: 
•The Games of 1 984: In Review •6'iCO'l Chips Now Available •Checksoft 
v2 



1 ~^ USoftkeys: •The Print Shop •Crossword Magic •The Standing 
Stones •Beer Run 'Skyfox •and Random House Disks MFeatures: 'A 
Tutorial For Disk Inspection and the Use Of Super lOB 'S-C Macro Assembler 
Directives (reprint) ■ Core: •The Graphic Grabber For The Print Shop •The 
Lone Catalog Arranger Part Two 



1 ^> MSoftkeys: •Mastertype •Stickybear BOP •Tic Tac Show 
MReader's Softkeys: •Th? Financial Cookbook •Escape from Rungistan 
•Alien Munchies •Millionaire •Plato MFeatures: •MREAD/MWRT Update 

■ Core: •A Boot from Drive 2 •DB Master's Data Compression Techniques 

■ Whiz Kid: •DOS and the Drive • Part One M Adventure Tips: •Time 
Zone •Mission Asteroid •Enchanter •Zork I •Ultima • Ultima II 'Death 
in the Caribbean •Gruds in Space •Zork III •Starcross 



MFeatures: •Super lOB v 1 .2 Update •Putting Locksmith 5.0 
Fast Copy Into a Normal Binary File 'Batman Decoder Ring •A fix for 
DiskEdit MSoftkeys: •Seadragon •Rocky's Boots •Knoware •PES Software 
•Computer Preparation SAT •MatheMagic MReview: •Boulder Dash 



1 ^S MSoftkeys: •Laf Pak •Beyond Castle Wolfenstein 
•Transylvania •The Quest 'Electronic Arts 'Snooper Troops (Case 2) 'DLM 
Software 'Learning With Leeper 'TellStar MCore: 'CSaver: The Advanced 
Way to Store Super lOB Controllers 'Adding New Commands to DOS 3.3 
'Fixing ProDOS 1 .0. 1 BSAVE Bug MReview: 'Enhancing Your Apple 
MFeature: 'Locksmith 5.0 and Locksmith Programming Language. 



1 \9 MSoftkeys: 'Arcade Machine 'Bank Street Writer 'Minit Man 
MReader's Softkeys 'Senible Speller IV 'FDD IV ''Krell LOGO 'Canyon 
Climber MFeatures: 'The Controller Saver 'Examining Protected Applesoft 
BASIC Programs 'Crunchlist II MCore: 'Applear - Voice Aynthesis 
'Introducing the 65SC802 and 65SC8 1 6 Chips 'Review • Dino Eggs 
MAdventure Tips: 'Cranston Manor 'Zork I 'Planetfall 'Mission Asteroid 
•Time Zone •Suspended •Critical Mass •Zork II •Castle Wolfenstein 



^9 MSoftkeys: •Sensible Speller •Sierra-On-Line Software •The Visible 
Computer: 6502 MReader's Softkeys: •Visidex "Music Construction Set 
•Gold Rush •Visiterm •Cosmic Combat ■ Features: •Super lOB 
MAdventure Tips: •Pirate Adventure •Mask of the Sun •Colossal Caves 
•Transylvania •Death in the Caribbean •Zork II BCore: •Word Search 
Generator •ProDOS to DOS •ProDOS on a Franklin Ace 



«S MSoftkeys: •Robotron •Legacy of Llylgamyn •The Artist "Data 
Factory v5.0 • FDD IV MReader's Softkeys: •Spy Strikes Back •Hayden 
Software •Apple LOGO MFeatures: •Review of the Bit Copiers MCore: 
•COREfiler •ProDOS Data Encryptor MAdventure Tips: •Ulysses and The 
Golden Fleece 'Serpentine 'Ultima II 'Castle Wolfenstein 'Death in the 
Caribbean 'Zork I 'Zork II 'Gruds in Space 'Enchanter 'Infidel •Serpent's 
Star ■ Miiz Kid: •How Data is Stored on Disk 



M MSoftkeys: 'Zaxxon 'Mask of the Sun •Crush 'Crumble S Chomp 
•Snake Byte •DB Master •Mouskattack MFeatures: •Making Liberated 
Backups That Retain Their Copy Protection •S-C Assembler: Review •Disk 
Directory Designer MCore: •COREfiler: Part I •Upper g Lower Case 
Output for Zork 



^9 MSoftkeys: 'Pandora's Box 'Donkey Kong 'Caverns of Freitag 
'Visifile MFeatures: 'Program Enhancements: Quick. Bug 'Personalizing 
A Program 'Modified ROMs MReview 'Essential Data Duplicator 'The 
CIA MCore: 'Data Bases 



^9 MSoftkeys: 'Homeword 'Aztec 'tBag of Tricks 'Egbert II 
'Starcross 'Hard Hat Mack 'The Home Accountant MReader's Softkeys: 
'Dark Crystal 'Screenwriter II 'Visifile 'Lancaster 'Bill Budge's Triolgy 
of Games 'Sammy Lightfoot 'Amper-Magic 'Buzzard Bait MFeature: 
'Getting on the Right Track 



1 ^S MSoftkeys: 'Zoom Graphix 'Flip Out 'Lion's Share 'Music 
Construction Set MReader's Softkeys: 'Hi-Res Computer Golf II •Suicide 
•Sabatage •Millionaire 'Time is Money 'Type Attack ■Feamre^ .Pseudo- 
ROMs on the Franklin Ace ■ Core: 'Psychedelic Symphony 'The CORE 
Disk Searcher 'The Armonitor MAdventure Tips: 'Cranston Manor ' 
Enchanter 'Kabul Spy 'Colossal Caves 'The Witness 'Pirate Adventure 
'Ultima Ill-Exodus 'Adventureland 



1 JL MSoftkeys: •Sensible Speller •Exodus: Ultima III MReaders' 
Softkeys: •SoftPorn Adventure 'The Einstein Compiler v5.3 •Mask of The 
Sun MFeatures: •Copy II Plus v4.4C: Update Of An Old Friend •Parameter 
List For Essential Data Duplicator MCore: •Ultimaker III 'The Mapping 
of Ultima III •Ultima II.. .The Rest Of The Picture 



^ft MFeatures: Ultima II Character Editor MSoftkeys: •Ultima II 
•Witness •Prisoner II •Pest Patrol MAdventure Tips: •Ultima II g III 
■ Copy II Plus Parms Update 

<•!• MSoftkeys: •Bag of Tricks •Multiplan MReaders' Softkeys: 
•Visiplot /Visitrend •Sneakers •Wizardry MFeatures •No More Bugs: The 
Sequel 'Hidden Locations Revealed 'Map Maker MA.P.T.s 'Choplifter 
MAdventure Tips 'Cranston Manor 'Strange Odyssey 



^S MSoftkeys: 'Magic Window II 'Multiplan MFeatures: 'Parameters 
for Locksmith 4.1 'Page Flipper 'String Plotter 'Three-D Wall Draw 
MCore: Checksums MInput: 'Reviews of unprotected commercial software 



October 



COMPUTIST #60 



41 



Saul tlitte 'mm edlm likaiuj duiu: 



Issue 

59. . . 

58. . . 

5-7 . . , 

56. . . 

55 . . . 

54 . . . 

53. . . 

52 . . , 

51 . . . 

50. . . 

49. . . 

48. . . 

4V. . , 

46 . . . 

45 . . . 

44. . , 

43. . . 

42 . . . 

41 . . . 

40. . 

39. . 

38 . . 

37. . 

36. . 

35. . 

34. . 

33 . . 

32 . . 

3-1 . . 

30. . 

29. . 

■A- 28 

2V. . 

26. . 

25. . 

24 . . 

Vkr23 



■ 21 . . . 
20 

^ 19 . . . 

^18 . . . 

^17 . . . 

-A^16 . . . 

■ 15 . . . 
^ 14 . . . 

■ 13 . . . 

■ 12 . . . 

■ 11 . . . 

■ lO . . . 

■ 9 . . . . 
■18 . . . . 

Core 3 . 

■ 6. . . . 

■ 5. . . . 

■ 4 . . . . 

Core 2 , 

■ 2 . . . . 

1 

Core 1 , 



Mag Disk Both 
$4.75 $9.95 $12.95 



EH 
□ 

□ 

im 

CD 

□ 

CD 
CD 

n 
□ 

CZI 

□ 

□ 
□ 

□ 
□ 

□ 

CZI 

□ 
□ 

CZI 

o 

□ 
cz 
o 
o 

o 
o 
o 
o 
o 
o 
o 
o 
o 
□ 
o 
o 
o 
o 
□ 
o 
□ 
□ 



[Zl □ 

□ □ 
CD im 

□ □ 
cz □ 

□ CJ 

CD □ 

cz □ 
cz cz 
cz cz 

cz CD 

cz CD 

CD cz 

CD CD 

CD CD 

CD CD 

CD CD 

□ □ 

CD CD 

CD CD 

CD CD 

CZ CD 

CD CD 

CD CD 

CD CD 

CD CD 

CD CD 

CD CD 

CD CD 

CD CD 

CD CD 

CD CD 

CD CD 

CD CZ 

[Zl CD 

CD CD 

CZ CD 

CD O 

CD CD 

CD CZ 
O 

o 

CD CD 

o 
o 
o 
o 
o 
o 
o 
o 
o 

□ □ 

□ o 



CD 

CD 



CD 
□ 
CD 
CD 
CD 
CD 
CD 

D 



O 
O 

U □ 

o 

□ 
u □ 

□ • 



But of Hardcore Computing. . 

Only the disk is available 

Core Special Combo $10 EH • • 

(All three CORE magazines; no disks) 

Some disks apply to more than one issue and are stiown as taller Inxes. 
Special "Botti disk & magazine combination orders apply to one issue 
and its corresponding disk. 

■A- Limited supply: first-come-first-serve basis. 

• Not available. 
O Out-of-print; only 'Zeroxed' copies for sale. 



COlVirUTIST 

back issues and library disks are 
frequently referenced in current issues. 



Back Issues and Library Disk Kates 



• US, Canada and Mexico back issue rate - $4.75 each. 

• All other Foreign back issue rate - $8.75 each. 

• US, Canada, Mexico library disk rate - $9.95 each. 

• All other Foreign library disk rate - $11.94 each. 

• "Both" disk and magazine rates for: 

US, Canada & Mexico - $12.95 each combination. 
All other Foreign - $18.95 each combination. 

What us a 2ibfiafus diisk? 

A library disk is a diskette that contains programs tiiat would normally have to be typed in by 
the user. Documentation for each library disk can be found in the corresponding issue. 

• Library disks are available for all issues of COMPUTIST # 1 thru 60. If you wish to purchase 
a library disk not listed on the left (under the DISK column), used the out-of-print back issues 
ad on page 42. 

CC^I^E 3 Games: constructing Your own joystick* compiling Games* G/1M£«£W£H'5.- 
Over 30 of the latest and best* Picl< Of The Pack: All-time TOP 20 games* Destructive Forces* EAMON • Graphics Magician 
and GraFORTH* Dragon Dungeon 

CrC^RE 2 Utilites: Dynamic Menu* High Res: Scroll Demo* goto label. Replace* Une 
Find* Quick Copy: Copy* 

Cr^#I^E 1 Graphics: Memory Map* Text Graphics: Marquee* Boxes* Jagged Scroller* Low 
Res: Color Character Chart* High Res: Screen Cruncher* The UFO Factory* Color* Vector Graphics:Shimmerlng Shapes* 
A Shape Table Mini-Editor* Block Graphics: Arcade Quality Graphics for BASIC Programmers* Animation 



Name. 



ID#. 



Address 



City 



State 



Zip 



Country . 



. Phone . 



Exp. 



Signature. 



_CP60 



• US funds drawn on US bank. • Most orders shipped within 5 working days, however please allow up 
to 4 weeks delivery for some orders. • Most orders shipped UPS, so please use street address. • Offer 
good while supply lasts. • in Washington state, add 7.8% sales tax. •Send check/money order to: 

COMPUTIST PO Box 110846-T Tacoma, WA 98411 (206) 474-5750 



42 



COMPUTIST jfeo 



October 



the COMPUTIST shopper 



Software Package lie 

816 Paint $45.«)Oa 

Alternate Reality: The Dungeon $28.00 D 

Alternate Reality: The City $20.00 D 

Appleworks $190.00 D 

Artie Fox $28.00 D 

Bank Street Writer 64K $46.00 D 

Bank Street Writer Plus (128K) $46.00 D 

Bard's Tale $30.00 D 

Bard's Tale II $35,00 

Bard's Tale IH $35.00 D 

California Games $26.00 D 

Certificate Maker $25.00 D 

Championship Karate $14.00 D 

Chessmaster 2000 $28.00 D 

Clip Art Library (for Paintworks Plus) . . 

Copy n Plus v8.0 $23.00 D 

Create with Garfield $2000 D 

Create w/ Garfield Deluxe $28.00 D 

Crossword Magic $32.00 D 

Dark Lord $16.00 D 

Dazzle Draw $40.00 D 

Deathlord $28.00 D 

Draw Plus $52.00 D 

F-15 Strike Eagle $24.00 D 

Fantavision $34.00 D 

Flight Simulator n $36.00 D 

Force 7 $15.00 D 

Halls of Montezuma $28.00 D 

Hardball $22.00 O 

Hitchhiker's Guide $2000 D 

Jet $29.00 D 

Karateka $24,00 D 

King's Quest $32.00 D 

King's Quest U $32,00 D 

King's Quest m $32,00 D 

King's Quest IV 

Knight of Diamonds $23.00 D 

Legacy of the Ancients $28.00 D 

Legacy of Uylgamyn $26.00 D 

Leisure Suit Larry $26.00 D 

Lode Runner $24.00 D 

Macroworks $20.00 D 

Math Blaster $28.00 D 

Math Blaster Plus 29.00 D 

Math Rabbit $27,00 

Math Talk 

Marble Madness $25,00 

Mean 18, Ultimate Golf $28.00 O 

Merlin 8/16 $80,00 

Millionaire II $40.00 O 

Mousewrite $99.00 O 



II] 



$45.00 D 



$35,00 
$26.00 O 



$20.00 O 
$23.00 D 



$40,00 



$28.00 O 
$28.00 O 



$32.00 O 
$32.00 D 
$32.00 O 
$32.00 O 



$26.00 O 



$29.00 O 

$35.00 D 
$25.00 O 



$99.00 O 



$66.00 D 



$12000 O 
$47,00 
$65.00 D 

$40.00 O 



Softwm Package lie II gs 

Multiscribe 3.0 $48.00 D 

Music Studio 2.0 $52.00 O 

Newsroom $38.00 O 

Paint Write Draw 

Paintworks Plus 

Paintworks Gold 

Pegasus $23,00 

The Print Shop $34.00 O 

Print Shop Companion $27.00 O 

Print Shop Graphics Library: 

Disk One $16,50 

Disk Two $16,50 

Disk Three $16,50 

Pro-Byter $32,00 

Reader Rabbit $27,00 $34,00 

Silent Service $23.00 O 

Space Quest $32.00 O $32.00 O 

Space Quest n $32.00 O 

Star Fleet $35,00 

Star Trek- The Kobayashi Alternative . . $27.00 O 

Star Trek 11- The Promethean Prophecy $27.00 O 
Stickybear Series: 

ABC's $24,00 

Math I $24,00 

Math n $24,00 

Numbers $24.00 O 

$24.00 D 

$24.00 O 

Typing $24,00 

Ciposites $24.00 O 

Thexder $23.00 O $23.00 D 

TimeOut Superfonts $42,00 

Tomahawk $23.00 O 

Topdraw $66.00 O 

Type $30.00 D 

Typing Tutor IV $32,00 $32,00 

Ultima V $40.00 O 

Visualizer $53.00 D $59.00 D 

Where in USA is Carmen San Diego . , , $30.00 O 

Where in World is Carmen San Diego. $30,00 

Where in Europe is Carmen San Diego $30.00 O 

Wings of Fury $26.00 D 

Winter Games $25,00 $27,00 

Wizardy $32.00 D 

Wwd Attack $28,00 

WordPerfect w/ Spelling Checker- $95,00 $95,00 

World Games $25,00 $27,00 

Writer's Choice Elite $6000 O 

Writer Rabbit $24,00 

Yeager's Advanced Flight Trainer $28.00 O 



COMPUTIST 
is proud to 
offer these 
LOW software 
prices* for 
Apple II and 
llgs software 



* Prices subject to 
change without notice. 

Because we do not 'stock' but 
order only the software needed, 
the COMPUTIST Shopper keeps 
operating costs to a minimum 
and can pass the savings on to 
you. 

In most cases, your order is 
shipped within two weeks. The 
COMPUTIST Shopper will NOT 
cash your check nor charge 
your credit card until your 
software is ready to be shipped. 
If the software you ordered Is 
not available, you will have the 
option to cancel your order, or 
make an alternative selection. 



How To Order 



• US orders: Check the box for 
your selection. For Apple Ilgs 
softw^are, check the box in the 
right-hand column. 

t Please add $3 per order for 
shipping & handling. Orders over 
$200 receive free shipping. 

• Most orders shipped UPS, so use 
your street address. 

• Washington state, please add 
7.8% sales tax. 

• Offer good while suppUes last. 

• Foreign Orders: Please inquire 
as to appropriate shipping fees 



Name_ 



.ID#_ 



Address 
City 



State 



Zip 



Country. 



.Phone. 



Exp. 



Signature. 



SoftKey Publishing PO Box 110816-T Tacoma WA 98411 



.CP60 



• Software 
SUBTOTAL _ 

• Plus 
SHIPPING _ 
(see above) 

• WA residents 
Sales Tax _ 
7.8% 

■ TOTAL 
Enclosed 



October 



COMPU'nST #60 



43 



David Kaszuba 



X These softkeys were sent in by David 
Kaszuba. They are mostly from BBS's. If included, 
the softkeys are attributed to the proper 
"handles". RDEXed 

This softkey is from the Lone Victor. 

Softkey for. . . 




Here is how to remove the Softguard 
Superlok 2.03 copy protection from Clipper 
Winter 85, on the file CLIPPER. W85 105984 
bytes. It will only work with this file. So if 
it doesn't work, you probably have a different 
file. 

With this text file you should find a binary 
file CLIPPER.BIN. You will need this file, 
ALTER, DEBUG, and your Clipper System 
Disk. 

Install your copy of Clipper on a hard disk 
as normal. Using ALTER or a similar utility, 
un-hide and copy the CLIPPER. W85 file. 
Next, hide the file again and Un-Install 
Clipper. Put your system disk away for safe 
keeping. 

Now, using DEBUG execute the 
following commands: 

DEBUG CLIPPER.W85 
N CUPPER.BIN 
L 
RBX 



BX OOOO??? 

:1 
RCX 


debug response 




CX 1000??? 


debug response 


:9C92 





w 



Writing 19C92 bytes debug response 



RENAME CLIPPER.BIN CLIPPER.EXE 
DEL CLIPPER. W85 

You now have a complete working copy 
of CLIPPER. 

Softkey for... 



DoubleDOS vl.O 



These instructions show you how to 
bypass the SoftGuard copy protection scheme 
used on DoubleDOS version 1.00. This is 
the same scheme used for FrameWork v 1 . 10 



and for Wordstar 2000 vl.OO. Wordstar 
2000 V 1 . 1 does not use a copy protection 
scheme. 



I 1 I Using your valid, original 
DoubleDOS diskette, install it on a fixed disk. 
Softguard hides three files in your root 
directory: CML0200.HCL, VDF0200. 
VDW, and DOUBLEDO.EXE. It also copies 
DOUBLEDO.COM into your chosen 
DoubleDOS directory. DOUBLEDO.EXE is 
the real DoubleDOS program, encrypted. 
When you run DoubleDOS, the program 
DOUBLEDO.COM loads CML02OO.HCL 
high in memory and runs it. CML decrypts 
itself and reads VDF02O0.VDW. The VDF 
file contains some code and data from the 
fixed disk FAT at the time of installation. By 
comparing the information in the VDF file 
with the current FAT, CML can tell if the 
CML, VDF, and DOUBLEDO.EXE files are 
in the same place on the disk where they were 
installed. If they have moved, say from a 
backup & restore, then DoubleDOS will not 
run. 



I 2 I Second, un-hide the three files in the 
root directory. You can do this with the 
programs ALTER.COM or FM.COM found 
on any BBS. Make copies of the three files, 
and of DOUBLEDO.COM, into some other 
directory. Hide the three root files again using 
ALTER or FM. 



I 3 I Following the DoubleDOS 
instructions, uninstall DoubleDOS. You can 
now put away your original DoubleDOS 
diskette. We are done with it. 



I 4 I Next we will make some patches to 
CML02OO.HCL to allow us to trace through 
the code in DEBUG. These patches will keep 
it from killing our interrupt vectors. 



change the 2A to 4A 



DEBUG CMLOaee.HCL 

E3F9 

2A.4A 

E49D 

F6.16 (/ any of these numbers don V show up 

Esee 

E9.09 it's not working. 

EA79 

00.20 

EAE9 

00.20 

E 73C 97 FA FA F4 Fl 7E encrypted call to 

0:300 
W 
Q 



I 5 I Now copy your four saved files back 
into the root directory and hide the 
CML0200.HCL, VDF020O.VDW, and 
DoubleDOS.EXE files using ALTER or FM. 

m We can now run DOUBLEDO. 
COM using DEBUG, trace just up to the point 
where it has decrypted DOUBLEDO.EXE, 



then write that file out. 

DEBUG D0UBLED0.COM 

R write down the value ofDSfor use below 

A 0:300 we must assemble some code here 

pop ax 

cs: 

mov [320], ax 

pop ax 

cs: 

mov [322], ax 

push es 

mov ax, 20 

mov es,ax 

mov ax,0 

cs: 

imp farptr[320] 

G4D6 

T 

G177 

G1E9 

T 

G54E 

Gs 559 569 

G = 571 857 DOUBLEDO. EXE has been decrypted 

RBX length DOUBLEDO.EXE = 04800 bytes 

:D set BX to 

RCX 

:48D0 set CX to 4800. 

NDOUBLEDO name of file to write to 

W XXXX:1DD where XXXX is the value of DS that 

you wrote down at the begining. 
Q quit debug 



save return address 



set up Slack the way we need it 



jump to our return address 
now we can trace CML 

this stuff just traces past some 
encryption routines. 

wait while reading VDF & FAT 



I 7 I Last, unhide and delete the three 
root files CML0200.HCL, VDF02OO. 
VDW, and DOUBLEDO.EXE. Delete 
DOUBLEDO.COM and rename 
DOUBLEDO to DOUBLEDO.EXE. This is 
the real DoubleDOS program without any 
SoftGuard code or encryption. It requires only 
the DOUBLGD2.PGM and DDCONFIG. 
SYS files to run. 

Softkey for... 



LoadCalc v4.13 



by the Lone Victor 
■ Requirements 

D Copy II PC 

Even when copied with Copy II PC, the 
LoadCalc disk spins in the A drive without 
running. Here's the procedure to use: 

I 1 I Make a backup copy with 
CopyllPC. 

I 2 I Rename the Loadcalc.exe file 
Loadcalc.xxx on the copied disk. 

RENAME LOADCALCEXE LOAOCALC.XXX 



44 



COMPUTIST »6Q 



October 











copy protection. Be sure to do this to a copy, 
and not to the original disk. Use the DOS 
COPY command to make a copy onto another 
floppy, or to move a copy to your hard disk. 
Then perform the DEBUG steps to the copy. 

1 1 1 Rename the file. 

RENAME MP.EXE MP.l 


Help 
l^anted 

This is supposed to be a forum for 
readers to exchange info and ideas 
about IBM computers. 

So let's get with it and make this 
work. If you've done something neat 
with your IBM or solved some 
problems or just have something to 
say, write to the IBM RDEX editor and 
let him know. 

Tell your friends about the IBM RDEX. 
Put messages on all the bulletin boards 
you frequent. 

Get the word out! 

Send all contributions to: 

IBM-RDEX editor 

COMPUTIST 

PO Box 110846-T 

Tacoma, WA 98411 




1 3 1 Put the DOS disk in drive A, 
Loadcalc.xxx in drive B. 

DEBUG B:LOADCALC.XXX 

5 CStOlOO FFFF 7F UTwo numbers will show up: 

XXXX:YYYY 
E XXXXiYYYY You will see XXXX:YYYY 7F. 

EB type this after the period 

IN 


Q 

RENAME LOADCALCXXX LOADCALC.EXE 


1 2 1 Get Debug on line. 
DEBUG MP.l 




The backup copy will now run. JNote: this 
procedure will NOT allow LoadCalc to be 
moved to a hard disk, just allow a back-up 
copy to be made. 

Softkey for... 




1 3 1 SOFeeOCD13 

Note: Two locations should be found, at 
xxxx:70DC and xxxx:70EC. If they are not 
at these two addresses then stop, you must 
have a different version than I. The values 
xxxx are unimportant.) 

E 70DC 90 90 90 90 
E 70EC 90 90 S9 EB 
W 

Note: A 'Writing DC3A bytes' should be 
displayed. The above Edit commands tell the 
Mind Prober program to not bother looking 
for the bad sector located on the diskette.) 

Q 

RENAME MP.l MP.EXE 

You should have a non-protected copy. 




Mind Prober 






by J. R. (Hacker Jack) 

The operation to remove the copy 
protection is very simple. An added benefit 
removing the copy protection is the ability 
to put Mind Prober on your hard disk, without 
the need to have the original disk in Drive A: 
at startup time. 

Follow the steps below for removing the 






Create pro-ams with super hi^ re«olutioii graphics in up to 256 colors at 

once, prot shapes and text fonts in color, produce animated effects and more, 

with ICONK. 

Sample and record your own sounds, compose music in up to 30 voices, create 

sound effects and much more, with SONIX. 

Trace and locate files, recover deleted files, create a mouse-driven program 

launcher and much more, with DISC COMMANDER. 



With "nePoiver Trio"kom So What Software, 

now you can create your own BASIC software pro- 
grams using the full range of graphics and sound 
power of the Apple IIG's. 

Create colorful animated programs using the super 
high resolution power of ICONK. Orchestrate 
compositions through the full sound and music en- 
vironment of SONK. Or trace and locate files with 
the powerful disk editor, DISC COMMANDER, 
and much more. 

Easy-to-use and very affordable, "The Power Trio" 

will turn your BASIC programs into FANTASTIC 
programs! 

SONIX, ICONK, and DISC COMMANDER: the 

hands-on favorites! 

Call us today, at (714) 964-4298 




10221 SLATER AVENUE, SUITE 103, FOUNTAIN VALLEY, CA 92708 



October 



COMPUTIST ^0 



45 



unCLASSIFIED ADS 



\Bnd Prober— $9, Practicalc— $9 
Jingle Disk— $1, Cardware— $2 
PFSiWrite, File, Report— $45 
Postpaid. Byron Blystone, P.O. 
Box 1313, Snohomish, WA 9829©. 



Trade your unwanted software. 
Send your list of programs to 
trade. I have over 7(Z) originals to 
trade. Byron Blystone, P.O. Box 
1313, Snohomish, WA 9829®. 



APPLE IIGS 3.5" disk versions of 
"Ruins of Keledoor" emd "Trivia 
Pyramid" are now available! 
You've seen my ads here before. 
Now get these FASTER 
RUNNING 3.5" versions for your 
APPLE IIGS - both games for 
$9,951 The original released 
APPLE IIE 5.25" versions are still 
available - both games only $8. 
Game booklets included. Send 
check or M.O. to Mark 
Whitehurst, Box 485, Franklin 
Park, IL 60131. All orders rushed 
out! 



International Apple 11 Club. One 

ti|ne membership fee of $20. 

Please make all checks out to 

Wayne Zurow and send them to: 

Wayne Zurow 

Attn: Cyclotron 

K.F.S.H. Box 3354 

Riyadh, Saudi Arabia 

In return you will receive our 

latest literature. 

PUBLIC DOMAIN 

Plus more!!! 
laxZ/s of disks. lOXZXD's of PRINT 
SHOP grahics, APPLEWORKS fUes, 
PRODOS files, EDUCATIONAL, 
UTILITIES, plus much more. 
School purchase orders welcome. 
Send $1 for catalog to Continental 
Software Co., Box 1511, So. Glens 
FaUs, NY 12803 



How to place an Unclassified Ad 

For short ads, use this order form. For larger ads, submit typed copy with appropriate 
instructions. Use every character space, up to 30 characters per line, we will adjust 
word wrap. $5 for the first line, $1 per line after that 

Special Graphics Instnictioiis: The first three words of the first line are printed in bold 
for fi:ee. If you want other words bolded, use two spaces per letter and circle the entire 
word. (Bold letters count as two letters.) If you want a line centered, write CENTER 
next to that line. There is no charge for centering any Une. 

$5 

S6 

S7 

$8 

S9 

. $10 



City 
Country . 



Zip 



Exp. 



Signature- 



Total Number of lines: . 



Run my ad number of times. Each rim that I pay 

for now will cost me only Vz the total initial cost. $_ 

Total $_ 

♦Washington orders add 7.8% sales tax. $_ 

Final Total $_ 



_CP53 

00 



Send this form and a check or money order (funds drawn on US bank only) 
for the entire amount to: 

COMPUnST iinCLASSIFIEDS PO Box 110846 Tacoma, WA 98411 




ONE IMEG RAM BOARDS? 

WE'VE GOT EMI 

THE Super Expanders! 

S.E. llgs OK Now $49 

S.E. lie *0K Now $59 

S.E. lie *OK 1/88 $69 

S.E, 11+ * OK 3/88 $79 

Above with 256K = 
Above with 51 2K = CALL 
Above with IMEG = 

* FREE Appleworks RAM 
Expansion Software! 

QUIET COOLING FANSI 

llgs No Audio Noise $25 

ll+/e w/Surge Protect $27 



OTHER PERIPHERALS! 

64K/80 Column Bd 
Super 64K/80 Col 
16K RAI^ Board 
128K BfKM Board 
80 Column Board 
Super Serial Bd 
Z80 GP/M Board 
Numeric Keypad 
Graphic Par Bd w/Cble 
Joystick $15 



lie 


$35 


lie 


$49 


11+ 


$35 


!l+ 


$65 


11+ 


$49 


ll+/e 


$49 


ll+/e 


$35 


lie 


$35 


ble 


$45 


5 & 


$25 



A/B SWITCHBOX! 

Centronics or Serial 



$29 



ADD ON DISK DRIVE: 5V4 

Specify Your Model $119 



TWO YEAR WARRANTY ON ALL PRODUCTS 
CALL OR WRITE FOR ILLUSTRATED LISTINGS! 
ADD S3 Shipping COD ADD S2 VISA MC OKAY 



NEXO DISTRIBUTION 

914 E. 8TH ST., Suite 109, National City, CA 92050 

(619) 474-3328 10AM-6PM Mon-Fri 



46 



COMPUnST #60 



October 



The Hacker's UHimte Copy i Deprolection Utiliiy 

Super lOB Collection ! 



ALL of our Super lOB controllers (through March 1988) in 'ONE' package! 



COMPUTIST developed the ultimate copy program 
to remove copy protection from software: 

The Super lOB program. 

Since the introduction of Super lOB, COMPUTIST 
has used this flexible program to deprotect (or partially 
deproteet) dozens of commercial programs with far 
ranging protection schemes. 

Super lOB deprotects disks by using a modified RWTS 
(the subroutine in DOS which is responsible for the 
reading and writing of disk sectors) for reading from the 
protected disk and then using a normal RWTS for writing 
to the deprotected disk. 

This package contains: 

► Three disks (supplied in DOS 3.3). Each disk contains 
at least 60 Super lOB Controllers including the standard, 
swap, newswap and fast controllers. Also included is 
version 1 .5 of Super lOB, the Csaver program from 
COMPUTIST No. 13, and a Menu Hello Program that 
lists the available controllers and, when you select one, 
automatically installs it in Super lOB and RUNs the 
resulting program.* 

^ A reprint of Disl( Inspection and the Use of 
Super JOB, from COMPUTIST No. 17. This article 
explains how to write your own Super lOB controllers. 

► COMPUTIST No. 32, which contains an extensive 
article detailing the hows and whys of Super lOB vl .5 
and at least 5 articles using the new Super lOB program. 

• Several of the controllers deprotect the software 
completely with no further steps. This means that some 
programs are only minutes away from deprotection (with 
virtually no typing). 

• The issue of COMPUTIST in which each controller 
appeared is indicated in case further steps are required 
to deprotect a particular program.** 

♦Requires at least 64K of memory. 
**Although some controllers will completely deprotect 
the program they were designed for, some will not, and 
therefore require their corresponding issue of 
COMPUTIST to complete the deprotection procedure. 



The SUPER lOB Collection 

Volume 1 of the Super lOB collection covers all the controllers from COMPUTIST No 9 through No 26 
Also included are the newswap and fast controllers from COMPUTIST No. 32. The followinq 60 controllers 
are on volume 1 : 

Advanced Blackjack, Alphabet Zoo, Arcade Machine, Archon II, Archon, Artsci Software, Bank Street Writer 
Barrens SAT, Beyond Castle Wolfenstein, BSW //c Loader, Castle Wolfenstein, Computer Preparation- SAt' 
Dazzle Draw, DB Master 4 Plus, Death in the Carribean, Dino Eggs, DLM Software, Electronic Arts, F-1 s'strike 
Eagle, Fast Controller, Fathoms 40, Financial Cookbook, Gessler Software, Grandma's House, The Heist In 
Search of the Most Amazing Thing, Instant Recall, KIdwriter, Lions Share, Lode Runner, Mastertype Match 
Maker, Miner 2049er, Minit Man, Mufplot, Newsroom, Newswap controller, Penguin Software Print Shop Graphic 
Library, Print Shop, Rendezvous with Rama, Rockys' Boots, Sargon III, Sea Dragon, Shiela, Skyfox Snooper 
Troops, Standard controller. Stoneware Software, Summer Games, Super Controller, Super Zaxxon Swap 
Controller, TAC, Ultima I & II, Word Challenge, Xyphus, Zaxxon ' 

Volume 2 of the super lOB collection covers all the controllers from COMPUTIST No 27 through No 
38. The following 65 controllers are on volume 2: 

Alice in Wonderland, Alphabetic Keyboarding, Alternate Reality, Autoduel, Checkers, Chipwits Color Me 
Conan.data, Conan.prog, CopyDOS, Crisis Mountain, Disk Director, Dragonworld, Early Games Easy as ABc' 
F-1 5 Strike Eagle, Fantavision, Fast controller, Fishies, Flight Simulator, Halley Project, Hartley Software (a)' 
Hartley Software (b), Jenny of the Prarie, Jingle Disk, KIdwriter, Kracking Vol II, Lode Runner LOGO II a) 
LOGO II (b) Masquerade, Mastering the SAT, Microfype: The Wonderful World of Paws, Microzines 1 , Microzines 
2-5, Miner 2049er, Mist & View to a Kill, Murder on the Zinderneuf, Music Construction Set, Newswap controller 
Olympic Decathlon, Other Side, Phi Beta Filer, Pitstop II, Print Shop Companion, RDOS, Robot War Spy vs 
Spy, Standard controller, Sundog V2, Swap controller. Sword of Kadash, Synergistic Software, Tawala's Last 
Redoubt, Terripm Logo, Threshold, Time is Money, Time Zone, Tink! Tonkl, Troll's Tale, Ultima IV Wilderness 
Word Attack & Classmate, World's Greatest Baseball, World's Greatest Football 

Volume 3 of the super lOB collection covers all the controllers from COMPUTIST No. 39 through No 
53. The following 89 controllers are on volume 3: 

2400 A.D., Alternate Reality: The Dungeon, Address Book, American Challenge, Apple Gradebook V2 6 Arcade 
A butti #1 Arcade Boot Camp, Aztec, Bard's Tale II, Beachhead, Beyond Castle Wolfenstein, Black Magic 
Blue Powder/Grey Smoke, Borrowed Time, Castle Wolfenstein, Cat-N-Mouse, Catalyst 2.0 & 3 ffl Centipede 
Championship Golf, Championship Wrestling, Charlie Brown 123'S, Colonial Conquest, Comprehension Skills' 
Computer Preparation for the SAT V3, Coveted Mirror, Coveted Mirror RWTS Capture, CPU68000NV 4Q2' 
Cranston Manor, Crime Stopper, Dam Busters, Decimals, Destroyer, Dino Dig, Earth Orbit Station, Encyclopedia 
Bntannica, Escape, Fish Scales, Foundation Course in Spanish, Frog, GFL Football, Goonies, Great American 
Cross-CouiTtry Road Race, Handlers, H.E.R.O, Inferno, Information Master, J-Bird, Jenny's Journeys Joe 
Theisman Football, Kindercomp, Kung Fu, Light Simulator, Manuscript Manager, Master Diagnostics lie 
Mastering Math, MECC, MECC Software, MECC Swap, MECC Without RWTS, Missing Links, No Error Check 
& No DOS, Ogre, One On One, Oregon Trail, Penguin Software, PFS ProDOS, Pitfall II, Puzzles&Posters 
Racter, Randamn, Reading Style Inventory, Ring Quest, Science Toolkit, Science Toolkit Revi , Skyfox Snooper 
Troops, Speed Reader II, Spy's Adventure, Starcross, Super Bunny, Temple Apshai Trilogy, The American 
Challenge, Translyvania, Troll Courseware, Ultima I, Ultima IV, Wizard's Crown, Word Attack Word Maze 
World Karate Championship, Rings of Zilfin, Zorro 



■ Yes, please send me The Super lOB Collection 

Includes all three disks wifli Super lOB version 1.5, COMPUTIST #32, PLUS 
a reprint of "Disk Inspection and the Use of Super lOB". 

n us/Canada/Mexico — All three voluines . . . $24.00 

D Other Foreign — All three volumes $30.00 

D US/Canada/Mexico — Volume #3 only $9.00 

D Other Foreign — Volume #3 only $12.00 

Send to: Super lOB Collection 

PC Box 110846-T 
Tacoma, WA 98411 



Name. 



.ID#_ 



Address_ 
City 



_State_ 



-Zip_ 



Country _ 
Signature. 



Phone 



Exp. 



.CP60 



or call: (206) 474-5750 for 



orders. 



Most orders are shipped within 5 working days, however, please allow 
4 to 6 weeks for delivery. Washington residents, please add 7.8% sales tax. 
US funds drawn on US banks 



October 



COMPUTIST mo 



47 



.4' 



i^^Sl* 






Legends tell of the days when the ancient back issues of Hardcore COMPUTIST were readily availaDle to anyone wno wisneu lo j,urL.w»,: t...:.,.. 
Those days may be long past, but the treasures within those ancient documents has been diligently transcribed to the pages of a modern reference work: 

The Book(s) of Softkeys 



^€iimi-Me I Compiled from issues 1-5 

contains softkeys for: "Akalabeth •Ampermagic 'Apple Galaxian 'Aztec 'Bag of Tricks -Budge's Trilogy 
•Buzzard Bait •Cannonball Blitz •Casino •Data Reporter •Deadline •Disk Organizer II •Egbert II 
Communic. Disk •Hard Hat Mack •Home Accountant •Homeword •Lancaster •Magic Window II •Multi- 
disk Catalog •Multiplan •Pest Patrol Trisoner II •Sammy Lightfoot •Screen Writer II •Sneakers •Spy's 
Demise •Starcross •Suspended •Ultima II •Visifile •Visiplot •Visitrend 'Witness •Wizardry •Zork I •Zork 
II •Zork III D PLUS 'how-to' articles and listings of need-to-have programs used to make unprotected 
backups. 



Compiled from issues 6-10 



contains softkeys for: •Apple Cider Spider •Apple Logo •Artist Arcade Machine •Bank Street Writer 
•Cannonball Blitz •Canyon Climber •Caverns of Freitag •Crush, Crumble & Chomp •Data Factory V •DB 
Master "The Dic*tion*ary •Essential Data Duplicator I & III •Gold Rush •Krell Logo •Legacy of Llylgamyn 
•Mask Of The Sun 'Minit Man •Mouskattack •Music Construction Set •Oil's Well •Pandora's Box 
•Robotron •Sammy Lightfoot •Screenwriter U v2.2 •Sensible Speller 4,4c,4.1c •Spy Strikes Back •Time 
Zone vl.l •Visible Computer: 6502 •Visidex •Visiterm •Zaxxon •software for: "Hayden •Sierra Online 
n PLUS the ultimate cracking program: Super lOB 1.5 •••and more! 



l/c»Iii.»-ie' 



Compiled from issues 11-15 



contains softkeys for: •Alien Addition •Alien Munchies •Alligator Mix •Comp. Prep. SAT •Cut & Paste 
•Demolition Division. •DLM software •EA (Electronic Arts) software •Einstein Compiler 5.3 •Escape From 
Rungistan •Financial Cookbook -Flip Out •Hi-res Computer Golf II •Knoware •Laf Pak •Last Gladiator 
•Learning With Leeper •Lion's Share •Master Type 1.7 •MatheMagic •Minus Mission •Millionaire •Music 
Construction Set •One-on-one 'Penguin software •PFS software •The Quest •Rocky's Boots •Sabotage 

• Seadragon •Sensible Speller 4 •Snooper Troops II •SoftPorn Adventure •Stickybear series •Suicide 
•TellStar •Tic Tac Show •Time Is Money •Transylvania •Type Attack •Ultima III Exodus •Zoom Graphics 
•Breaking Locksmith 5.0 Fast Copy □ PLUS feature articles on • Csaver • The Core Disk Searcher 

• Modified ROMs. 



. mM ^Mi vm. ^"m. mst ^iSK m/^ ism 'mm ^mi^ ^m m^ 'e^ '''^ ^ 



Name, 



.ID#. 



Address. 



I City 



State 



Zip 



i Country 

I 

! 
I 
f Signature_ 



_ Phone. 



Exp. 



_CP60 



□ Volume I - $7.95 
-1-52 shipping/handling 

□ Volume II - $12.95 
-1-52 shipping/handling 

□ Volume III - $17.95 
-1-52 shipping/handling 

□ All 3 volumes! - $30.00 
+$2 shipping/handling 



I 



Foreign orders (except Canada and Mexico) please add $5 per book for shipping and handling. Washington residents add 7^8% sales tax. 
Most orders are shipped within 5 working days, however, please allow 4-6 weeks delivery. US Funds drawn on US banks only. 
Send to; Book of Softkeys PO Box 110846-T Tacoma, WA 98411 (206) 474-5750 



I m* £M r^i&' 'T^ ^^^- ^<^ i>^- <@^ >^^ * 



, ^sm <om «w ^ 



COMPVTiS-