![]() |
![]() |
|
||||||||
![]() |
![]() |
![]() |
![]() |
||||||
![]() |
![]() |
![]() |
![]()
Post
#1
|
|
Postergeist ![]() Group: Private Members Posts: 70 Joined: 5-March 06 Member No.: 1298 Zodiac Sign: ![]() Gender: ![]() ![]() |
The world of Apple II “cracking” has always held an interesting fascination for me – the thinking involved, the magic of tracing programs, and of course the “crack screens” that pirates would add to declare their victory. (Here’s a massive gallery of them that I collected.) I interviewed long-retired Apple II crackers for the BBS documentary, discussing everything from methods to the historical context in which they did this.
If this is your first time hearing “cracking” in this context, I’ll very quickly explain. A program would come on a floppy disk, and the program, ostensibly, would fill that entire disk. It would also have “copy protection” threaded in the code – routines that would be resistant to copies being made, or even modify how the floppy drive would function to prevent copying. It was quite an art. It was also an art to go through this code, examine how this programming worked, and modify the whole shebang enough to allow easy copying. In an ideal world, the program would also be modified from an entire floppy disk (I mean, 140k, come on, who has time for that) into a single small file. Along the way, pride would ensue, with “crack screens” consisting of who cracked the program added to the front. The ballast of inconvenient parts would also be discarded, with title screens, program functionality, and even entire program assets thrown over the wall. That’s cracking, as it was. 4am is an individual cracking as it is now, and it’s most interesting indeed. ![]() What 4AM has been doing for the past year or so is re-cracking long-dormant Apple II programs with a new goal – to educate and to preserve. This has produced hundreds of new insights into Apple II history, some of which are seeing the light of day for the first time. ![]() ![]() And these are what are called “silent” cracks – they’re cracked so they are more simply copied, not modified with brags and added graphics. It’s as if you’re trying them out the day they hit your Apple II, 30 years ago. ![]() Not content to crack the disks, and modifying the programs in a way that they live as they once lived, 4am meticulously and carefully walks through the entire process of cracking each program. The code, the tracing of boot flow, the missteps, and even the internal thought processes that lead to the solved mystery. They’re magical. And every 4AM item has one. (Just click on the “Text” file of any item’s file list to read these breakdowns. Here’s one, and here’s another one.) Some of the common complaint that comes in with the software collections I’ve been helping herd onto the Internet Archive is that the “cracked” version is what’s up – but in some cases, that’s all we’ve got left of the programs. Now, thanks to people like 4AM, we have something more. Long may they crack. ![]() All of the screenshots in this entry link to playable versions of those programs. View the full article |
|
![]() ![]() |
![]() ![]() ![]() |
Lo-Fi Version | Time is now: 21st June 2025 - 09:09 PM |
Skin and Graphics by Dan Ellis and Anubis. Hosting by Forums & More © 2005-2011. |