Hardware Software key

About SheepShaver, a PPC Mac emulator for Windows, MacOS X, and Linux that can run System 7.5.3 to MacOS 9.0.4.

Moderators: Cat_7, Ronald P. Regensburg, ClockWise

Post Reply
Binder
Tinkerer
Posts: 44
Joined: Sat Jan 06, 2007 3:07 am

Hardware Software key

Post by Binder »

Hello everyone, my first post here.

I have just got everything working here with Sheepshaver (on Windows xp) and I think this program is great! I used my OS9 restore disk that came with my ibook with the help of this forum. Most of my software works fine. This brings me to my first question. I have a program that requires an ADB hardware dongle that needs to communicate with the program in order to run. This is for copy protection, otherwise those not effect the program. On my ibook I was able to connect the ADB key through a iMate adapter to use this program. This is not possible under Sheepshaver.

Is there anyway to emulate this hardware key? or modify the software through Resedit to not require the key? I am not looking to pirate this software, but to be able to use it without this limitation.
Any help would be appreciated.

Thanks,
Bill.
User avatar
Cat_7
Expert User
Posts: 6179
Joined: Fri Feb 13, 2004 8:59 am
Location: Sittard, The Netherlands

Post by Cat_7 »

Hi,

I believe that kind of hardware support can't be found in SheepShaver.
You might indeed need to coax the software into believing the ADB-dongle is present. Could you tell us what program we are talking about? If it is well known, chances are someone already did you a favour :lol:

Best wishes
Cat_7
Binder
Tinkerer
Posts: 44
Joined: Sat Jan 06, 2007 3:07 am

Post by Binder »

Unfortunately it is not well known. It is old engineering software. Support for it ended in the mid 90's. It uses a Sentinel Eve key. I opened up the program in resedit and found a resource called Eve which I think refers to the key. This is as far as I got.

Program size is small (approx 1.5mb) so I can email to anyone to take a look.

Thanks,
Bill.

Image

Image

Image
Binder
Tinkerer
Posts: 44
Joined: Sat Jan 06, 2007 3:07 am

Post by Binder »

I thought I would revive this thread. Is there anyway to extract the hardware key Data and apply it in some "software" way?

Thanks.
yksoft1
Master Emulator
Posts: 394
Joined: Tue Aug 14, 2007 4:32 pm
Location: People's Republic of China

Post by yksoft1 »

Binder wrote:I thought I would revive this thread. Is there anyway to extract the hardware key Data and apply it in some "software" way?

Thanks.
It's called Software CRACKING and shouldn't be discussed here.
Binder
Tinkerer
Posts: 44
Joined: Sat Jan 06, 2007 3:07 am

Post by Binder »

I will repeat myself,
I am not looking to pirate this software, but to be able to use it without this limitation.
This software is from the early 90's and is not supported anymore. I want to use my LEGAL license with this emulator. (either in software or hardware form)

Moderators, would you prefer me not to discuss this here???
I will modify my posts if so.
JeanJacquesCortes
Inquisitive Elf
Posts: 34
Joined: Sat Jan 05, 2008 10:14 pm
Location: 15 km de Bordeaux

Post by JeanJacquesCortes »

Basing on its name, your prgram is a CAD software, so why don't you try CADintosh ?
Binder
Tinkerer
Posts: 44
Joined: Sat Jan 06, 2007 3:07 am

Post by Binder »

Thank you for the reply,

I have many newer/better programs to replace this one on my Windows computer.
I am looking to make this work for nostalgic reasons.
User avatar
Cat_7
Expert User
Posts: 6179
Joined: Fri Feb 13, 2004 8:59 am
Location: Sittard, The Netherlands

Post by Cat_7 »

Hi All,

After some deliberation with my fellow moderator for this topic, we decided that it should be possible to discuss the circumvention of a protection mechanism in software. However, we would rather not see any (linking to) physical results of such actions.

Best wishes,

Cat_7
JeanJacquesCortes
Inquisitive Elf
Posts: 34
Joined: Sat Jan 05, 2008 10:14 pm
Location: 15 km de Bordeaux

Post by JeanJacquesCortes »

The only solution to overpass the protectionwould be to analyse the code and find the entry point of the routine which detects the present or not of the dongle, block the test and force the value of the test to "present".
If someone has the capacity to do that, it would be possible to crack the software, but it would be piracy, even if this software is a vintage one.
Post Reply