Solved

copy protection

Posted on 2007-03-30
10
297 Views
Last Modified: 2010-03-05
Hi experts,

I have a diskette with some special system files. It has some kind of copy protection that prevents it to be copied. That is, if I make another copy (using the usual windows copy function), the copy version would not work.
I would like to make an (exact) copy of the diskette as backup and it has to work exactly the same way.
This is sort of like cracking the copy protection…but any one out there done this kind of thing? Or is there any software that can mirror copy exactly the same thing to another diskette?

I think that the copy function in windows does not copy some of the bits/bytes, perhaps some software can do that.
0
Comment
Question by:oldb
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
10 Comments
 
LVL 27

Expert Comment

by:Tolomir
ID: 18827921
We need more details about the program on the disk.

There is no: Will-always-work-anti-copyprotection tool.

0
 
LVL 4

Expert Comment

by:Yuray
ID: 18828061
hmm, try for examle alcohol virtual drive prog.

http://www.alcohol-soft.com/
0
 
LVL 30

Expert Comment

by:pgm554
ID: 18832436
Linux boot disk using dd.exe should work.
It does a raw sector by sector copy.
0
Are You Headed to Black Hat USA 2017?

Getting ready for Black Hat next week? Kick things off with the WatchGuard Badge Challenge and test your puzzle and cipher skills. Do you have what it takes to earn our limited edition Firebox Badge? Get started today - https://crimsonthorn.net

 
LVL 2

Expert Comment

by:khe-khe
ID: 18832682
Yeah... Linux boot disk should do the job.
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 18833176
So how precisely do you copy weak sectors or unknown disk formats with dd?

Take a testdrive with: http://www.contracopy.com/index.htm

As said, we need the copy protected program name.

Tolomir
0
 
LVL 30

Expert Comment

by:pgm554
ID: 18833242
dd is a raw sector copy program .
It is used in forensics situations,it doesn't care about format
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 18833271
And how does dd know where a disk really starts and ends?

I would not rely on that. Especially if a program is designed to access "impossible" sectors...

As said take a testdrive. Free demo available...

Tolomir
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 18833281
http://www.garloff.de/kurt/linux/ddrescue/ might be a solution though:

Copying this partition with normal Un*x tools like cat or dd will fail, as those tools abort on error. dd_rescue instead will try to read and if it fails, it will go on with the next sectors. The output file naturally will have holes in it, of course. You can write a log file, to see, where all these errors are located.
0
 

Author Comment

by:oldb
ID: 18918137
i am using windows, how do i use dd or dd_rescue?
0
 
LVL 27

Accepted Solution

by:
Tolomir earned 125 total points
ID: 19034453
In that case you cannot use dd.

You could give the good old vgacopy though a try:

http://www.moenk.de/plugin/dlfile_1

Extract the archive. In dos -> vgacopy you find a file called:

english.exe

Execute it, then all messages are converted to english.

Now start vgacopy.exe

Great tool for floppy disk copying, quite easy to use, even under windows.

Tolomir
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recovering from what the press called "the largest-ever cyber-attack", IT departments worldwide are discussing ways to defend against this in the future. In this process, many people are looking for immediate actions while, instead, they need to tho…
In this blog we highlight approaches to managed security as a service.  We also look into ConnectWise’s value in aiding MSPs’ security management and indicate why critical alerting is a necessary integration.
This Micro Tutorial will teach you how to reformat your flash drive. Sometimes your flash drive may have issues carrying files so this will completely restore it to manufacturing settings. Make sure to backup all files before reformatting. This w…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question