{"id":1323,"date":"2021-01-17T14:23:08","date_gmt":"2021-01-17T13:23:08","guid":{"rendered":"https:\/\/www.retrocomputing-whv.net\/?page_id=1323"},"modified":"2021-01-17T14:23:57","modified_gmt":"2021-01-17T13:23:57","slug":"das-anti-cracker-buch","status":"publish","type":"page","link":"https:\/\/www.retrocomputing-whv.net\/?page_id=1323","title":{"rendered":"Das Anti-Cracker Buch"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"734\" height=\"1024\" src=\"https:\/\/www.retrocomputing-whv.net\/wp-content\/uploads\/2020\/05\/DATA-BECKER-Das-Anti-Cracker-Buch-734x1024.jpg\" alt=\"DATA BECKER - Das Anti-Cracker-Buch\" class=\"wp-image-500\" srcset=\"https:\/\/www.retrocomputing-whv.net\/wp-content\/uploads\/2020\/05\/DATA-BECKER-Das-Anti-Cracker-Buch-734x1024.jpg 734w, https:\/\/www.retrocomputing-whv.net\/wp-content\/uploads\/2020\/05\/DATA-BECKER-Das-Anti-Cracker-Buch-215x300.jpg 215w, https:\/\/www.retrocomputing-whv.net\/wp-content\/uploads\/2020\/05\/DATA-BECKER-Das-Anti-Cracker-Buch-768x1071.jpg 768w, https:\/\/www.retrocomputing-whv.net\/wp-content\/uploads\/2020\/05\/DATA-BECKER-Das-Anti-Cracker-Buch-1101x1536.jpg 1101w, https:\/\/www.retrocomputing-whv.net\/wp-content\/uploads\/2020\/05\/DATA-BECKER-Das-Anti-Cracker-Buch.jpg 1200w\" sizes=\"auto, (max-width: 734px) 100vw, 734px\" \/><\/figure>\n\n\n\n<p>Ein DATA BECKER Buch &#8211; Autoren  Jacques Felt, Darko Krsnik, Ralf Gelfand, Michael Strauch<br>2. Auflage &#8211; Erscheinungsjahr 1988 &#8211; ISBN 3-89011-253-6<\/p>\n\n\n\n<p><strong>Das steht drin:<\/strong><br>Vom Einsteiger bis zum Softwarehaus &#8211; dieses Buch zeigt, wie man seine Programme optimal sch\u00fctzt. Dabei werden Programm- und Kopierschutzverfahren vom einfachen List-Schutz bis zur \u00dcberpr\u00fcfung eines kompletten Tracks gezeigt. Und: Die Autoren sind nicht bei bekannten Schutzmechanismen der neuesten Generation stehengeblieben, sondern habe neue entwickelt, f\u00fcr die es bisher keine Kopierm\u00f6glichkeiten gibt. Das Buch zeigt nicht nur die Verfahren, sondern liefert auch gleich fertige L\u00f6sungen f\u00fcr C64 und C128 zum Abtippen.<\/p>\n\n\n\n<p><strong>Aus dem Inhalt:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>BASIC-Programme sch\u00fctzen (List-Schutz, \u00c4nderungs-Schutz, Password, RESTORE\/RESET-Schutz, SYS-Bluff, Compiler-Schutz)<\/li><li>Alle Tricks des Autostart (Tastaturpuffer, Sprungvektoren, Stack, Interrupt, Adressverschiebung beim Laden)<\/li><li>Pr\u00fcfsummen und Selbstzerst\u00f6rung (XOR-Codierung, Timer-Codierung, Einzelschrittcodierung, ASCII-Codierung)<\/li><li>Illegale Opcodes<\/li><li>Cassettenkopierschutz (EOF, Cassettenpuffer, Autostart, Schnelladeverfahren, komplettes Kopierschutzsystem)<\/li><li>Directory-Schutz (versteckter Filename, &#8222;blinde&#8220; Bl\u00f6cke, der Nullen-Trick, geteiltes Directory, gel\u00f6schte Files)<\/li><li>Grundlagen des Kopierschutzes<\/li><li>Alle Tricks der Formatierung (Track 35-41, einzelne Tracks, doppelte Tracks, Header-Parameter \u00e4ndern, zerst\u00f6rte Sektoren, gleiche Sektoren auf einem Track)<\/li><li>Halftracks, der Track mit den Nullen, kompletten Track pr\u00fcfen<\/li><li>Alle Tricks der SYNC-Markierungen (Killertracks, \u00fcberlange SYNC-Markierungen, 3000-SYNC-Schutz, Daten ohne SYNC-Markierungen)<\/li><li>Der Disketten-Killer (nur ausschalten der Floppy hilft)<\/li><li>Alles Tricks der Knack-Module und wie man sich dagegen sch\u00fctzt<\/li><li>Was Software-H\u00e4user \u00fcber Cracker wissen sollten<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.retrocomputing-whv.net\/?page_id=840\"><img loading=\"lazy\" decoding=\"async\" width=\"256\" height=\"136\" src=\"https:\/\/www.retrocomputing-whv.net\/wp-content\/uploads\/2020\/08\/Backspace.jpg\" alt=\"Backspace\" class=\"wp-image-681\"\/><\/a><\/figure>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ein DATA BECKER Buch &#8211; Autoren Jacques Felt, Darko Krsnik, Ralf Gelfand, Michael Strauch2. Auflage &#8211; Erscheinungsjahr 1988 &#8211; ISBN 3-89011-253-6 Das steht drin:Vom Einsteiger bis zum Softwarehaus &#8211; dieses Buch zeigt, wie man seine Programme optimal sch\u00fctzt. Dabei werden Programm- und Kopierschutzverfahren vom einfachen List-Schutz bis zur \u00dcberpr\u00fcfung eines kompletten Tracks gezeigt. Und: Die Autoren sind nicht bei bekannten<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":840,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1323","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Das Anti-Cracker Buch - Retrocomputing WHV<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.retrocomputing-whv.net\/?page_id=1323\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Das Anti-Cracker Buch - Retrocomputing WHV\" \/>\n<meta property=\"og:description\" content=\"Ein DATA BECKER Buch &#8211; Autoren Jacques Felt, Darko Krsnik, Ralf Gelfand, Michael Strauch2. Auflage &#8211; Erscheinungsjahr 1988 &#8211; ISBN 3-89011-253-6 Das steht drin:Vom Einsteiger bis zum Softwarehaus &#8211; dieses Buch zeigt, wie man seine Programme optimal sch\u00fctzt. Dabei werden Programm- und Kopierschutzverfahren vom einfachen List-Schutz bis zur \u00dcberpr\u00fcfung eines kompletten Tracks gezeigt. Und: Die Autoren sind nicht bei bekannten\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.retrocomputing-whv.net\/?page_id=1323\" \/>\n<meta property=\"og:site_name\" content=\"Retrocomputing WHV\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-17T13:23:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.retrocomputing-whv.net\/wp-content\/uploads\/2020\/05\/DATA-BECKER-Das-Anti-Cracker-Buch-734x1024.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"2\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.retrocomputing-whv.net\\\/?page_id=1323\",\"url\":\"https:\\\/\\\/www.retrocomputing-whv.net\\\/?page_id=1323\",\"name\":\"Das Anti-Cracker Buch - Retrocomputing WHV\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.retrocomputing-whv.net\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.retrocomputing-whv.net\\\/?page_id=1323#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.retrocomputing-whv.net\\\/?page_id=1323#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.retrocomputing-whv.net\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/DATA-BECKER-Das-Anti-Cracker-Buch-734x1024.jpg\",\"datePublished\":\"2021-01-17T13:23:08+00:00\",\"dateModified\":\"2021-01-17T13:23:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.retrocomputing-whv.net\\\/?page_id=1323#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.retrocomputing-whv.net\\\/?page_id=1323\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.retrocomputing-whv.net\\\/?page_id=1323#primaryimage\",\"url\":\"https:\\\/\\\/www.retrocomputing-whv.net\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/DATA-BECKER-Das-Anti-Cracker-Buch.jpg\",\"contentUrl\":\"https:\\\/\\\/www.retrocomputing-whv.net\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/DATA-BECKER-Das-Anti-Cracker-Buch.jpg\",\"width\":1200,\"height\":1674,\"caption\":\"DATA BECKER - Das Anti-Cracker-Buch\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.retrocomputing-whv.net\\\/?page_id=1323#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.retrocomputing-whv.net\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Literatur\",\"item\":\"https:\\\/\\\/www.retrocomputing-whv.net\\\/?page_id=105\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"DATA BECKER\",\"item\":\"https:\\\/\\\/www.retrocomputing-whv.net\\\/?page_id=807\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Commodore 64\",\"item\":\"https:\\\/\\\/www.retrocomputing-whv.net\\\/?page_id=840\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Das Anti-Cracker Buch\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.retrocomputing-whv.net\\\/#website\",\"url\":\"https:\\\/\\\/www.retrocomputing-whv.net\\\/\",\"name\":\"Retrocomputing WHV\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.retrocomputing-whv.net\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.retrocomputing-whv.net\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.retrocomputing-whv.net\\\/#organization\",\"name\":\"Retrocomputing-WHV\",\"url\":\"https:\\\/\\\/www.retrocomputing-whv.net\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.retrocomputing-whv.net\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.retrocomputing-whv.net\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Logo.png\",\"contentUrl\":\"https:\\\/\\\/www.retrocomputing-whv.net\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Logo.png\",\"width\":1340,\"height\":250,\"caption\":\"Retrocomputing-WHV\"},\"image\":{\"@id\":\"https:\\\/\\\/www.retrocomputing-whv.net\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Das Anti-Cracker Buch - Retrocomputing WHV","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.retrocomputing-whv.net\/?page_id=1323","og_locale":"de_DE","og_type":"article","og_title":"Das Anti-Cracker Buch - Retrocomputing WHV","og_description":"Ein DATA BECKER Buch &#8211; Autoren Jacques Felt, Darko Krsnik, Ralf Gelfand, Michael Strauch2. Auflage &#8211; Erscheinungsjahr 1988 &#8211; ISBN 3-89011-253-6 Das steht drin:Vom Einsteiger bis zum Softwarehaus &#8211; dieses Buch zeigt, wie man seine Programme optimal sch\u00fctzt. Dabei werden Programm- und Kopierschutzverfahren vom einfachen List-Schutz bis zur \u00dcberpr\u00fcfung eines kompletten Tracks gezeigt. Und: Die Autoren sind nicht bei bekannten","og_url":"https:\/\/www.retrocomputing-whv.net\/?page_id=1323","og_site_name":"Retrocomputing WHV","article_modified_time":"2021-01-17T13:23:57+00:00","og_image":[{"url":"https:\/\/www.retrocomputing-whv.net\/wp-content\/uploads\/2020\/05\/DATA-BECKER-Das-Anti-Cracker-Buch-734x1024.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"2\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.retrocomputing-whv.net\/?page_id=1323","url":"https:\/\/www.retrocomputing-whv.net\/?page_id=1323","name":"Das Anti-Cracker Buch - Retrocomputing WHV","isPartOf":{"@id":"https:\/\/www.retrocomputing-whv.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.retrocomputing-whv.net\/?page_id=1323#primaryimage"},"image":{"@id":"https:\/\/www.retrocomputing-whv.net\/?page_id=1323#primaryimage"},"thumbnailUrl":"https:\/\/www.retrocomputing-whv.net\/wp-content\/uploads\/2020\/05\/DATA-BECKER-Das-Anti-Cracker-Buch-734x1024.jpg","datePublished":"2021-01-17T13:23:08+00:00","dateModified":"2021-01-17T13:23:57+00:00","breadcrumb":{"@id":"https:\/\/www.retrocomputing-whv.net\/?page_id=1323#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.retrocomputing-whv.net\/?page_id=1323"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.retrocomputing-whv.net\/?page_id=1323#primaryimage","url":"https:\/\/www.retrocomputing-whv.net\/wp-content\/uploads\/2020\/05\/DATA-BECKER-Das-Anti-Cracker-Buch.jpg","contentUrl":"https:\/\/www.retrocomputing-whv.net\/wp-content\/uploads\/2020\/05\/DATA-BECKER-Das-Anti-Cracker-Buch.jpg","width":1200,"height":1674,"caption":"DATA BECKER - Das Anti-Cracker-Buch"},{"@type":"BreadcrumbList","@id":"https:\/\/www.retrocomputing-whv.net\/?page_id=1323#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.retrocomputing-whv.net\/"},{"@type":"ListItem","position":2,"name":"Literatur","item":"https:\/\/www.retrocomputing-whv.net\/?page_id=105"},{"@type":"ListItem","position":3,"name":"DATA BECKER","item":"https:\/\/www.retrocomputing-whv.net\/?page_id=807"},{"@type":"ListItem","position":4,"name":"Commodore 64","item":"https:\/\/www.retrocomputing-whv.net\/?page_id=840"},{"@type":"ListItem","position":5,"name":"Das Anti-Cracker Buch"}]},{"@type":"WebSite","@id":"https:\/\/www.retrocomputing-whv.net\/#website","url":"https:\/\/www.retrocomputing-whv.net\/","name":"Retrocomputing WHV","description":"","publisher":{"@id":"https:\/\/www.retrocomputing-whv.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.retrocomputing-whv.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.retrocomputing-whv.net\/#organization","name":"Retrocomputing-WHV","url":"https:\/\/www.retrocomputing-whv.net\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.retrocomputing-whv.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.retrocomputing-whv.net\/wp-content\/uploads\/2020\/04\/Logo.png","contentUrl":"https:\/\/www.retrocomputing-whv.net\/wp-content\/uploads\/2020\/04\/Logo.png","width":1340,"height":250,"caption":"Retrocomputing-WHV"},"image":{"@id":"https:\/\/www.retrocomputing-whv.net\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.retrocomputing-whv.net\/index.php?rest_route=\/wp\/v2\/pages\/1323","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.retrocomputing-whv.net\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.retrocomputing-whv.net\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.retrocomputing-whv.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.retrocomputing-whv.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1323"}],"version-history":[{"count":1,"href":"https:\/\/www.retrocomputing-whv.net\/index.php?rest_route=\/wp\/v2\/pages\/1323\/revisions"}],"predecessor-version":[{"id":1324,"href":"https:\/\/www.retrocomputing-whv.net\/index.php?rest_route=\/wp\/v2\/pages\/1323\/revisions\/1324"}],"up":[{"embeddable":true,"href":"https:\/\/www.retrocomputing-whv.net\/index.php?rest_route=\/wp\/v2\/pages\/840"}],"wp:attachment":[{"href":"https:\/\/www.retrocomputing-whv.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1323"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}