?
Solved

COPY PROTECT

Posted on 1997-12-14
8
Medium Priority
?
389 Views
Last Modified: 2013-12-01
How can I make a diskette copy protect ? That is, protect
the files on a diskette from being copied and used on another diskette (or when copied to different diskette be
unusable. I am referring to a common 3.5 (1.44)inch diskette. thank you
Boby
0
Comment
Question by:Boby
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
8 Comments
 
LVL 3

Expert Comment

by:caeisenb
ID: 1017226
You should specify what kind of disk you are talking about...  Mac?  PC?  Something else?
0
 

Author Comment

by:Boby
ID: 1017227
Edited text of question
0
 
LVL 7

Accepted Solution

by:
busuka earned 150 total points
ID: 1017228
There are MANY methods to do this. But nothing can stop experienced
hacker from unprotectiong program. To make floppy disk prevented
from diskcopy you write custom formatter, that formats floppy so
it's last track has non-standard value and contains some protect
info. Then your program via direct access reads this track, checks
its size, info, maybe serial number (assigned after format) and
make decision.
Another method relies on physical damage of floppy. Many copiers
just can't stand physical damage :). First by custom program
copier you put you program file(s) on diskette so several central
tracks are not written, then you make small hole in central area
of written space (with nail, or smth thin). Your program need to
check how different files reside on floppy and decide about
protect violation.
0
Bringing Advanced Authentication to the SMB Market

WatchGuard announces the acquisition of advanced authentication provider, Datablink, with one mission – to bring secure authentication to SMB, mid-market, and distributed enterprises with a cloud-based solution, ideal for resale via their established channel & MSSP community.

 

Author Comment

by:Boby
ID: 1017229
Sorry busuka your answer is not clear
to me. Could you please be more precise on
every step and which program /format procedure
should I use to make it impossible to copy from this
diskette (although still readable)or even if copied files
can't be opened in a different diskette.
Thank you. I'll be glad to grade your answer once I get
a clearer one
BOBY


 
0
 
LVL 7

Expert Comment

by:busuka
ID: 1017230
Okay, let's put it another way: or you use standard means of
protection and risk to be opened by as well standard unprotector,
or you programmer and making custom way to protect your program
(as I described above). To name a several progs I can mention
Guard II, Nota, Shield.
0
 

Author Comment

by:Boby
ID: 1017231
I am interested in the programming option. Where can I get
Guard II or Nota or Shield. by the way, I don't care if an specialist can open the file. I am not surrounded by specialists
Boby
0
 
LVL 7

Expert Comment

by:busuka
ID: 1017232
By "programming" way I meant you write a both programs: program
protector and protected program.
"Nota" I have at home. I think it allows diskcopy, but copied one
doesn't work.(and I saw anti-Nota on 'net, but it's hard to find
because program is old).
0
 

Author Comment

by:Boby
ID: 1017233
THANK YOU.
BOBY
0

Featured Post

Migrating Your Company's PCs

To keep pace with competitors, businesses must keep employees productive, and that means providing them with the latest technology. This document provides the tips and tricks you need to help you migrate an outdated PC fleet to new desktops, laptops, and tablets.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Arrow Electronics was searching for a KVM  (Keyboard/Video/Mouse) switch that could display on one single monitor the current status of all units being tested on the rack.
To efficiently enable the rotation of USB drives for backups, storage pools need to be created. This way no matter which USB drive is installed, the backups will successfully write without any administrative intervention. Multiple USB devices need t…
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…
Suggested Courses

801 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question