Sinclair Town #01
31 марта 1995
  Письма  

black box - Category, which will answer your questions, and also define your own. Analysis of letters from readers of the magazine.

<b>black box</b> - Category, which will answer your questions, and
 also define your own. Analysis of letters from readers of the magazine.
         BLACK BOX.


  Let me introduce to you our
Field, who will be responsible
your questions and ask your own.

  We believe that the main section, along with the rubric of 
"Author!". And we hope that you will support us letters. 

  So, as your letters yet we
more cunning and answer
questions on behalf of a magazine Spekra Background "published
group MAD SHI 'SHI MAD. Official distributor: "The Communist 
INFORmatsional. 



    For compatibility issues.


GOTLEREEV OIL NABULINOVICH:

  ... And then yesterday I bought at the market the first issue 
of your magazine. And what I saw? Nothing!

Black screen and nothing more! Your magazine is not compatible 
with my computer! 

"SF":

  Leaving the scene
at the specified address in a letter to the
pleased to announce that
problem solved.

  Oilu Nabulinovichu was presented
Floppy 3'25 inches. It will
cut on one side only,
to shove a tape recorder.
Hence theoretically we
three times to reduce losses of information during this 
operation. (After all, old floppy disk you cut with

three sides).



        Protection issues.


  A reader wrote Konev FP
us ample letter
expressed their views on ways and means of protection programs.
We present some excerpts from
this opus:

REPORTER:

  Working with your computer
more than a year, I invented a few
new methods of protection programs.
After analysis of all coding
procedures for me, it was concluded
that they are all very easy
opened. And even a program
"Tetris" firm "JAJAJA" has not
rasksorok came to light less than 2000
me with elegance and ease
all for one and a half years.

  In this connection, I put forward some new methods of 
protection programs.


  The first method is called me the Sicilian Defence. The idea 
of ​​me prompted the announcement in all

Games firms "DURELL" ("Durell").
So you write a program on
that gives 100 dollars to anyone who will write to you where, 
from whom He saw an unauthorized copy of your program. Further, 
all simple - send the boys

Sicily (ex. "SF": not necessarily go so far) on
these two locations. Next
course you pay $ 50 guys (ex. "SF": but nothing prevents you 
from hiring new ones) and give in the following program a 
subtle hint at the implications ... 

  Disadvantages: very calculated
to these independent factors
as a human, professional, intellectual. Simply put next to be 
the person who determines that the program is broken and will 
be able to read the written message on the screen. 

  Method may require large
costs. The weakest of all
methods.

 The second way - the Spanish defense. Protection is calculated 
for use by people with a crush. You just do not record the 
program (s) to disk. If accidentally comes to you the customer 
with claims, you say:


  "I'm sorry you have a complaint
the quality of recording? And there can not
can? Well, you see

  Disadvantages: very pronounced
physical factor. (Lack
quickly solved with a large number of bazaars and markets in 
the city) 

  Advantages: Ideally - a program from you is not going away. 
Really - The number of clients who have given

program is greatly reduced.

  The method of the third - the horse protection.
Belongs to the physical methods
protection. To this end we rewrite the contents of the zero 
track on a piece of paper and blot catalog ...

********************************

  ca. "SF":

  We want to reassure our readers
it's the best way to protect information. Not one of our
diskettes with toys that are self-protected like
way it was impossible to recover. And we are not haunted by the 
question: - And suddenly, in the standard ROM was

sutured procedure is responsible for
protection of information this way?
********************************

  ... Rewrite the contents of the zero track on paper and erase
directory. Now only one who is holding the sheet to be able to
say with certainty - and where
that is, a loss of
Half an hour on the gasket catalog, we
able to pay the remaining time on
exciting work. By the way so you can protect
and the data itself.

  Disadvantages: slightly reduced
the performance of the information.

  Advantages: increased flexibility of protection.

  This three-way, and me their
designed set. All who
interested in this issue can contact me at:


         S. Shihazany.

   Psychiatric Hospital.

      Branch: Rampant.

    Chamber: New Vasyuki.

    Konev Furzey Peshkovich.
 (Call simply fanatic Sschas)



      Plain speaking.


   We get many letters from
our readers with the question:

   CORR-N: - Why do not you sell along with its magazine
Corporate formatter?

   "SF: Please be advised that the company formatters as" 
TR-DOS ", and "IS-DOS" you can order by "Phantom" (see 
advertisement). It's still all we can do for you. Format for 
health ... If you have something. 



  BACK TO PRINTED.


   A reader from Moscow Bereneev
Beren Bereneevich asks:

   "Why did you write that in the game" NARCOPOL "more commonly 
known, as "NARCOPOLICE" on the next

level may leave only one
group? And where is the second, third
or fourth? However, I got carried away ...


   "SF: This is probably from
the fact that we played fair, and
enjoyed a very bad words: CONGRAM-mi, MUNICION-s,
NOENEMIG-s and COMENZAR-s.

      We will not!



              128K


   Finally, in our email messages began appearing on the 128th
machines. As they say the process
gone ... Here is what informs BA
Antoshkin of the Red Sun:

   REPORTER: "I want the 128th" Sinclair "


   "SF: As stated briefly
and concisely!


   REPORTER: "But I digress. Votdlya So download the 48th 
program in 128th machines I suggest a little remake "boot". It

must start line insert:


   CLEAR 64399: POKE 64400,201:

   RANDOMIZE USR 64400


   This program code is taken
from your journal N3 for 1991
From it removed all superfluous.
It remains only 1 byte and the procedure becomes relotsiruemoy:


   FA00 C9 RET


   Such modifications Loader
leads to the fact that after loading mode 128k it takes the 
computer to 48k without stop the program. Thus the user does not

notices that he is in another
mode. Unfortunately the computer
do not notice this, too, and now
I solve this problem ...




Other articles:

appeal to readers - Why have begun the creation of this magazine?

Muzykalka - Overview of musical demonstrations: Absent, Shock.

Author! - About the authors of this journal and adventyurnoy game "LENIN".

Sweetest ... - The analysis of the game "GREMLINS".

Worlds 128 - About the best programs for 128 of the first computer. Game "ROD * LAND 128".

Series - Series game programs.

Series - Novella on adventyurnoy 3D game "TOTAL ECLIPSE part 1."

Ha hacker - This section is intended for people with a sense of humor and abusing them. "100 anecdotes about the Chukchi."

black box - Category, which will answer your questions, and also define your own. Analysis of letters from readers of the magazine.

black box - parsing RPG game "DRAGON'S OF THE FLAMES".

black box - analysis of games "BARD'S TALE", "ELITE" and "STRANGER".

Beginners - the basic methods of image scaling.

Exam - Three "unpretentious" issue.

Advertising - Ads and Classified.

Archive - On programs for existing PC "ZX-SPECTRUM": AMAUROTE, ATIC ATAC, ALIEN HIGHWAY, ACE 2088, RESCATE ATLANTIDA part 1 & 2.


Темы: Игры, Программное обеспечение, Пресса, Аппаратное обеспечение, Сеть, Демосцена, Люди, Программирование

Similar articles:
The End - an epilogue.
Topic - The association's AMAZING SOFT MAKING.
Laboratory - to finalize the Speccy: Hardware pause, quasi-turbo, Quartz 14300.

В этот день...   28 April