Shareware Time Lock

 BBS: Inland Empire Archive
Date: 03-18-92 (00:00)             Number: 149
From: SEAN EMBRY                   Refer#: NONE
  To: RICHARD VANNOY                Recvd: NO  
Subj: Shareware Time Lock            Conf: (2) Quik_Bas
Richard,
        I'm developing a time lock that would require a low level format
        to reset with out a key. I would like to make it usable for
        several programs, however, there are only 5 bytes to play with
        in this mannor. I was thinking of using those five bytes to
        point to a cluster, which would be marked bad, and keep the date
        data encrypted there. (see below). The problem is coordnating
        this so that programs don't start colliding with each other.
        Your thoughts?



        I've found the following to be effective in confounding
        hackers for encryption: (IE, it lasted 2 years)

        Junk=BTS*CRC*17
        where Junk is the number of bytes that are not significant
              BTS is the number of bytes needed to store your info
              CRC is a low bit CRC of the info bytes
              Note: if less than 128, use 128
                    direct the program to move the valid data around
                    each time info is updated, and change some of the
                    junk bytes. Always check the CRC, if invalid, erase
                    your program and completely randomize the encryption
                    data file, execpt for a pointer to tell your
                    programs that it has been randomized. (Never
                    touch data, it doesn't belong to you)

        In my programs, BTS numbers 4 to 8 bytes.

        And talking about time keys, a TSR just warned me that I'm using
        OLXTD past it's free time. Time to Register this puppy!
        (Just when I thought I'd have some money to go play with!)

Sean

___
 X OLX 2.1 TD X WARNING: Compiles ok, but doesn't do what you wanted!

--- Maximus 2.01wb
 * Origin: Papa Smurf's Place (1:160/102)
Outer Court
Echo Basic Postings

Books at Amazon:

Back to BASIC: The History, Corruption, and Future of the Language

Hackers: Heroes of the Computer Revolution (including Tiny BASIC)

Go to: The Story of the Math Majors, Bridge Players, Engineers, Chess Wizards, Scientists and Iconoclasts who were the Hero Programmers of the Software Revolution

The Advent of the Algorithm: The Idea that Rules the World

Moths in the Machine: The Power and Perils of Programming

Mastering Visual Basic .NET