Sinclair Town #01
31 марта 1995 |
|
black box - Category, which will answer your questions, and also define your own. Analysis of letters from readers of the magazine.
BLACK BOX. Let me introduce to you our Field, who will be responsible your questions and ask your own. We believe that the main section, along with the rubric of "Author!". And we hope that you will support us letters. So, as your letters yet we more cunning and answer questions on behalf of a magazine Spekra Background "published group MAD SHI 'SHI MAD. Official distributor: "The Communist INFORmatsional. For compatibility issues. GOTLEREEV OIL NABULINOVICH: ... And then yesterday I bought at the market the first issue of your magazine. And what I saw? Nothing! Black screen and nothing more! Your magazine is not compatible with my computer! "SF": Leaving the scene at the specified address in a letter to the pleased to announce that problem solved. Oilu Nabulinovichu was presented Floppy 3'25 inches. It will cut on one side only, to shove a tape recorder. Hence theoretically we three times to reduce losses of information during this operation. (After all, old floppy disk you cut with three sides). Protection issues. A reader wrote Konev FP us ample letter expressed their views on ways and means of protection programs. We present some excerpts from this opus: REPORTER: Working with your computer more than a year, I invented a few new methods of protection programs. After analysis of all coding procedures for me, it was concluded that they are all very easy opened. And even a program "Tetris" firm "JAJAJA" has not rasksorok came to light less than 2000 me with elegance and ease all for one and a half years. In this connection, I put forward some new methods of protection programs. The first method is called me the Sicilian Defence. The idea of me prompted the announcement in all Games firms "DURELL" ("Durell"). So you write a program on that gives 100 dollars to anyone who will write to you where, from whom He saw an unauthorized copy of your program. Further, all simple - send the boys Sicily (ex. "SF": not necessarily go so far) on these two locations. Next course you pay $ 50 guys (ex. "SF": but nothing prevents you from hiring new ones) and give in the following program a subtle hint at the implications ... Disadvantages: very calculated to these independent factors as a human, professional, intellectual. Simply put next to be the person who determines that the program is broken and will be able to read the written message on the screen. Method may require large costs. The weakest of all methods. The second way - the Spanish defense. Protection is calculated for use by people with a crush. You just do not record the program (s) to disk. If accidentally comes to you the customer with claims, you say: "I'm sorry you have a complaint the quality of recording? And there can not can? Well, you see Disadvantages: very pronounced physical factor. (Lack quickly solved with a large number of bazaars and markets in the city) Advantages: Ideally - a program from you is not going away. Really - The number of clients who have given program is greatly reduced. The method of the third - the horse protection. Belongs to the physical methods protection. To this end we rewrite the contents of the zero track on a piece of paper and blot catalog ... ******************************** ca. "SF": We want to reassure our readers it's the best way to protect information. Not one of our diskettes with toys that are self-protected like way it was impossible to recover. And we are not haunted by the question: - And suddenly, in the standard ROM was sutured procedure is responsible for protection of information this way? ******************************** ... Rewrite the contents of the zero track on paper and erase directory. Now only one who is holding the sheet to be able to say with certainty - and where that is, a loss of Half an hour on the gasket catalog, we able to pay the remaining time on exciting work. By the way so you can protect and the data itself. Disadvantages: slightly reduced the performance of the information. Advantages: increased flexibility of protection. This three-way, and me their designed set. All who interested in this issue can contact me at: S. Shihazany. Psychiatric Hospital. Branch: Rampant. Chamber: New Vasyuki. Konev Furzey Peshkovich. (Call simply fanatic Sschas) Plain speaking. We get many letters from our readers with the question: CORR-N: - Why do not you sell along with its magazine Corporate formatter? "SF: Please be advised that the company formatters as" TR-DOS ", and "IS-DOS" you can order by "Phantom" (see advertisement). It's still all we can do for you. Format for health ... If you have something. BACK TO PRINTED. A reader from Moscow Bereneev Beren Bereneevich asks: "Why did you write that in the game" NARCOPOL "more commonly known, as "NARCOPOLICE" on the next level may leave only one group? And where is the second, third or fourth? However, I got carried away ... "SF: This is probably from the fact that we played fair, and enjoyed a very bad words: CONGRAM-mi, MUNICION-s, NOENEMIG-s and COMENZAR-s. We will not! 128K Finally, in our email messages began appearing on the 128th machines. As they say the process gone ... Here is what informs BA Antoshkin of the Red Sun: REPORTER: "I want the 128th" Sinclair " "SF: As stated briefly and concisely! REPORTER: "But I digress. Votdlya So download the 48th program in 128th machines I suggest a little remake "boot". It must start line insert: CLEAR 64399: POKE 64400,201: RANDOMIZE USR 64400 This program code is taken from your journal N3 for 1991 From it removed all superfluous. It remains only 1 byte and the procedure becomes relotsiruemoy: FA00 C9 RET Such modifications Loader leads to the fact that after loading mode 128k it takes the computer to 48k without stop the program. Thus the user does not notices that he is in another mode. Unfortunately the computer do not notice this, too, and now I solve this problem ...
Other articles:
Similar articles:
В этот день... 23 November