870 lines
47 KiB
Plaintext
870 lines
47 KiB
Plaintext
|
==Phrack Inc.==
|
||
|
|
||
|
Volume Four, Issue Forty, File 5 of 14
|
||
|
|
||
|
Pirates Cove
|
||
|
|
||
|
By Rambone
|
||
|
|
||
|
|
||
|
Welcome back to Pirates Cove. My apologies for not providing you with this
|
||
|
column in Phrack 39. However, in this issue we take a look at some recent
|
||
|
busts of pirate boards and the organization most to blame for it all... the
|
||
|
Software Publishers Association. Plus we have news and information about
|
||
|
Vision-X, game reviews, BAD Magazine, and more. Enjoy.
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
FBI Raids Computer Pirate; SPA Follows With Civil Lawsuit June 11, 1992
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
BOSTON -- The Federal Bureau of Investigation raided [on June 10] "Davy Jones
|
||
|
Locker," a computer bulletin board located in Millbury, Massachusetts, which
|
||
|
has allegedly been illegally distributing copyrighted software programs.
|
||
|
|
||
|
The Davy Jones bulletin board was a sophisticated computer bulletin board with
|
||
|
paying subscribers in 36 states and 11 foreign countries.
|
||
|
|
||
|
A computer bulletin board allows personal computer users to access a host
|
||
|
computer by a modem-equipped telephone to exchange information including
|
||
|
messages, files, and computer programs. The system operator (or sysop) is
|
||
|
generally responsible for materials posted to the bulletin board.
|
||
|
|
||
|
For a fee of $49 for three months or $99 for one year, subscribers to Davy
|
||
|
Jones Locker were given access to a special section of the bulletin board that
|
||
|
contained copies of more than 200 copyrighted programs including popular
|
||
|
business and entertainment packages. Subscribers could "download" or receive
|
||
|
these programs for use on their own computers without having to pay the
|
||
|
copyright owner anything for them.
|
||
|
|
||
|
The business programs offered were from a variety of well-known software
|
||
|
companies, including: AutoDesk, Borland International, Broderbund, Central
|
||
|
Point System, Clarion Software, Fifth Generation, Fox Software, IBM, Intuit,
|
||
|
Lotus Development, Micrografx, Microsoft, Software Publishing Corp., Symantec,
|
||
|
Ventura Software, WordPerfect and X-Tree Co. Entertainment programs included
|
||
|
Flight Simulator by Microsoft, and Leisure Suit Larry by Sierra.
|
||
|
|
||
|
Seized in the raid on Davy Jones Locker were computers, telecommunications
|
||
|
equipment, as well as financial and other records.
|
||
|
|
||
|
"The SPA applauds the FBI's action today," said Ilene Rosenthal, director of
|
||
|
litigation for the Software Publishers Association (SPA). "This is one of the
|
||
|
first instances that we are aware of where the FBI has shut down a pirate
|
||
|
bulletin board for distributing copyrighted software. It clearly demonstrates
|
||
|
a trend that the government is recognizing the seriousness of software
|
||
|
copyright violation. It is also significant that this week the Senate passed
|
||
|
S.893, a bill that would make the illegal distribution of copyrighted software
|
||
|
a felony."
|
||
|
|
||
|
For the past four months, the Software Publishers Association has been
|
||
|
investigating the Davy Jones Locker bulletin board and had downloaded business
|
||
|
and entertainment programs from the board. The programs obtained from Davy
|
||
|
Jones Locker were then cross-checked against the original copyrighted
|
||
|
materials. In all cases, they were found to be identical.
|
||
|
|
||
|
Subscribers to Davy Jones Locker not only downloaded copyrighted software, but
|
||
|
were also encouraged to contribute additional copyrighted programs to the
|
||
|
bulletin board.
|
||
|
|
||
|
The system operator limited subscribers to four hours on the bulletin board
|
||
|
each day. He also limited the amount of software a subscriber could download
|
||
|
to his or her own computer each day. Those who "uploaded" or transmitted new
|
||
|
copyrighted software to the bulletin board for further illegal distribution
|
||
|
were rewarded with credits good for additional on-line time or for additional
|
||
|
software.
|
||
|
|
||
|
"Imagine a video store that charges you a membership fee and then lets you
|
||
|
make illegal duplicates of copyrighted movies onto blank video tapes,"
|
||
|
explains Ilene Rosenthal, SPA director of litigation. "But it limits the
|
||
|
number of movies you can copy unless you bring in new inventory -- copies of
|
||
|
new movies not already on the shelves. That was the deal at Davy Jones
|
||
|
Locker."
|
||
|
|
||
|
Davy Jones Locker was an international concern with paid subscribers in the
|
||
|
United States and 11 foreign countries including Australia, Canada, Croatia,
|
||
|
France, Germany, Iraq, Israel, Netherlands, Spain, Sweden and the United
|
||
|
Kingdom.
|
||
|
|
||
|
Whether it's copied from a program purchased at a neighborhood computer store
|
||
|
or downloaded from a bulletin board thousands of miles away, pirated software
|
||
|
adds to the cost of computing. According to SPA, software pirates throughout
|
||
|
the world steal between $10 and $12 billion of copyrighted software each year.
|
||
|
|
||
|
"Many people may not realize that software prices are higher, in part, to make
|
||
|
up for losses to the pirates," says Ken Wasch, executive director of the SPA.
|
||
|
"Pirate bulletin boards not only distribute business software, but also hurt
|
||
|
the computer game publishers by distributing so many of their programs
|
||
|
illegally. In addition they ruin the reputation of the hundreds of legitimate
|
||
|
bulletin boards which serve an important function to computer users."
|
||
|
|
||
|
The Software Publishers Association is the principal trade association of the
|
||
|
personal computer software industry. Its 900 members represent the leading
|
||
|
publishers in the business, consumer and education software markets. The SPA
|
||
|
has offices in Washington, D.C., and Paris La Defense, France.
|
||
|
|
||
|
CONTACT: Software Publishers Association, Washington, D.C.
|
||
|
Terri Childs or Ilene Rosenthal, 202/452-1600
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
PC Bulletin Board Hit by FBI Raid June 14, 1992
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
By Josh Hyatt (Boston Globe)(Chicago Tribune, Section 7, Page 3)
|
||
|
|
||
|
BOSTON -- In one of the first reported crackdowns of its kind, six FBI agents
|
||
|
raided a computer bulletin board based in a Millbury, Massachusetts, home last
|
||
|
week. Authorities said the bulletin board's operator had been illegally
|
||
|
distributing copyrighted software.
|
||
|
|
||
|
Executing a criminal search warrant, the agents seized several computers, six
|
||
|
modems and a program called PC Board, which was used to run the bulletin board.
|
||
|
Authorities also seized documents that listed users of the service.
|
||
|
|
||
|
No arrests were made, according to the Software Publisher's Association, a
|
||
|
trade group that brought the case to the FBI's attention. The association
|
||
|
estimates that, as of March, the bulletin board had distributed $675,000 worth
|
||
|
of copyrighted software; software pirates, it says, annually steal as much as
|
||
|
$12 billion this way.
|
||
|
|
||
|
The FBI will not comment on the case except to confirm that a raid had taken
|
||
|
place and that the investigation is continuing. The alleged operator of the
|
||
|
bulletin board, Richard Kenadek, could not be reached for comment.
|
||
|
|
||
|
Around the same time as the raid, the software association filed a civil
|
||
|
lawsuit against Kenadek, charging him with violating copyright laws. Ilene
|
||
|
Rosenthal, the group's director of litigation, said that "the man had
|
||
|
incriminated himself" through various computerized messages.
|
||
|
|
||
|
"There's plenty of evidence to show that he was very aware of everything on his
|
||
|
bulletin board," she said.
|
||
|
|
||
|
Bulletin boards let personal computer users access a host computer via modems.
|
||
|
Typically, participants exchange information regarding everything from computer
|
||
|
programs to tropical fish. They may also, for example, obtain upgrades of
|
||
|
computer programs.
|
||
|
|
||
|
The association said its own four-month investigation revealed that this
|
||
|
bulletin board, called Davy Jones Locker, contained copies of more than 200
|
||
|
copyrighted programs.
|
||
|
|
||
|
Rosenthal said users also were encouraged to contribute copyrighted software
|
||
|
programs for others to download or copy.
|
||
|
|
||
|
According to Rosenthal, subscribers paid a fee, $49 for three months or $99 for
|
||
|
one year. She said Davy Jones Locker had nearly 400 paying subscribers in 36
|
||
|
states and 11 foreign countries.
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
Cracking Down On Computer Counterfeiters July 1992
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
By B.A. Nilsson (PC-Computing Magazine)(Page 188)
|
||
|
|
||
|
Popular bonding rituals usually aren't criminal. Admire a friend's new car,
|
||
|
and you're likely to swap a few stories and a can of STP. You may be invited
|
||
|
to take the car for a spin. You can pass recipes back and forth or lend your
|
||
|
copy of the latest best-seller to a fellow fan.
|
||
|
|
||
|
Sharing computer programs is another common practice among friends. It's
|
||
|
great to help someone who's daunted by the challenge of learning to use a new
|
||
|
machine, and sometimes that includes a gift of some of your favorite software.
|
||
|
"Here. Why don't you get started with WordPerfect?" And, later, inevitably,
|
||
|
"The Norton Utilities will get that file back for you."
|
||
|
|
||
|
Copying a set of disks is so simple and such a private action that you'd hardly
|
||
|
think it's also illegal. The legality part is easy to overlook. The copyright
|
||
|
notice is a complicated critter, often printed on the seal of the software
|
||
|
package that is torn away as you dig for those floppy disks. You may not even
|
||
|
be the one who ripped the original package open (in which case, you're yet
|
||
|
another who's ripped the program off).
|
||
|
|
||
|
But whether or not you're aware of it, unless you either broke the shrink-wrap
|
||
|
or received the package with all disks, documentation, and licensing
|
||
|
information intact, you're breaking the law. The good news is that if you're
|
||
|
an individual with pirated software on your home computer, you probably won't
|
||
|
get caught. But if you're a boss with an angry employee, the Software
|
||
|
Publishers Association (SPA) may get tipped off. When the SPA comes to call on
|
||
|
your business, it's with U.S. marshals and lots of official paperwork. And the
|
||
|
association has an annoyingly good history of winning its copyright-
|
||
|
infringement cases.
|
||
|
|
||
|
Perspectives on Piracy
|
||
|
|
||
|
"Computers give us a kind of technical sophistication that never used to
|
||
|
exist," says Ken Wasch, the voluble head of the SPA. "In the old days, if you
|
||
|
wanted to make your own copy of something like a pencil, you'd need a
|
||
|
complicated manufacturing center. But the very fact that you can run a
|
||
|
computer program means that you can make a flawless copy of it. This is the
|
||
|
only industry in the world that empowers every customer to be a manufacturing
|
||
|
subsidiary."
|
||
|
|
||
|
The regulations are spelled out again and again in the software manuals:
|
||
|
You're allowed to make one or two copies of the program for backup purposes.
|
||
|
Other rules vary slightly from company to company. Some license agreements
|
||
|
demand that the software package be used only with a single machine; others,
|
||
|
most notably Borland's, let you use the program on as many computers as you
|
||
|
wish, provided no two copies of the program are run concurrently, just as a
|
||
|
book can be read by only one person at a time.
|
||
|
|
||
|
"If all software developers took the same approach as Borland International,
|
||
|
people wouldn't steal so much," says avowed pirate Ed Teach.
|
||
|
|
||
|
(Note: The names and locations of all interviewed pirates have been changed.)
|
||
|
|
||
|
"Borland gives you that book license. Of course, they'll drive you insane with
|
||
|
upgrades. They wholesale the software, then make their money on all the
|
||
|
subsequent releases."
|
||
|
|
||
|
Teach is the systems administrator for a residential health-care company in
|
||
|
the Southeast. "I believe in piracy," he says. "I like to borrow something to
|
||
|
play with it. If I like it, I'll buy it."
|
||
|
|
||
|
He dismisses demos and limited versions of programs as inadequate for the
|
||
|
testing he prefers; similarly, he considers the typical 30-day return agreement
|
||
|
too restrictive. "It's not a realistic time period for an evaluation," Teach
|
||
|
says. "I just got a copy of FormTool Pro, and it's a powerful program with a
|
||
|
very steep learning curve. I can't devote myself to it and learn what I'd need
|
||
|
to know in 30 days."
|
||
|
|
||
|
Teach has spent six years recommending and configuring programs for his
|
||
|
company. He does not fit the image of a lawbreaker, and he believes that what
|
||
|
he does is morally justified. "I buy the software eventually. My company
|
||
|
bought licenses to use WordPerfect 5.1 after starting with a pirated copy of
|
||
|
the program. Everything on the company machines is legit."
|
||
|
|
||
|
Copying wasn't always so easy. Old-timers remember the copy-protection schemes
|
||
|
that pervaded the computer industry, requiring key disks or special
|
||
|
initialization procedures. But users unanimously demanded an end to it, and
|
||
|
when Lotus, the last significant holdout, gave in, that era was over. Today
|
||
|
you find protection only on games and niche-market programs.
|
||
|
|
||
|
How much has the end of copy protection cost software companies? It's
|
||
|
impossible to figure accurately. In August 1991, the indefatigable Software
|
||
|
Publishers Association released figures on corporate-use losses that suggest
|
||
|
both a staggering financial loss and a possible decline in piracy. In 1987,
|
||
|
1.31 DOS-based software programs were sold for every office computer. The
|
||
|
expected proportion is three packages per computer, meaning that more than half
|
||
|
of the programs in use were probably pirated. In 1990, the number of
|
||
|
legitimate packages jumped to 1.78. But prices have gone up, too, so that the
|
||
|
dollar losses haven't changed much: The 1987 liability was $2.3 billion, and
|
||
|
the number rose to $2.4 billion in 1990.
|
||
|
|
||
|
The numbers for private-use piracy, on the other hand, can't be calculated. If
|
||
|
all the computer users who have never pirated software got together, they
|
||
|
wouldn't need a very large hall. Wasch concedes that it's difficult to
|
||
|
actually catch and prosecute the individual pirate. "Nobody is actually doing
|
||
|
time for piracy," he says, citing the exception of a retailer who was caught
|
||
|
running what amounted to a pirated-software storefront.
|
||
|
|
||
|
The Software Police
|
||
|
|
||
|
Although the SPA is targeting home abuse in a current study, Wasch believes
|
||
|
that the greatest financial losses are due to corporate piracy. And corporate
|
||
|
pirates are easier to apprehend because an angry employee is frequently willing
|
||
|
to turn in the boss. "We get about 20 calls a day," says Wasch, who set up a
|
||
|
special number (800-388-7478) for reporting piracy. "Ninety percent of the
|
||
|
calls we follow up on come from disgruntled employees."
|
||
|
|
||
|
It's the kind of visit most of us have only seen in the movies, and it's
|
||
|
usually an unexpected one. A receptionist with one targeted company was so
|
||
|
shocked by the arrival of the SPA posse that she asked if it was a "Candid
|
||
|
Camera" stunt.
|
||
|
|
||
|
Founded in 1984 as an educational and promotional group, the SPA evolved into
|
||
|
a software police force five years ago as more and more software vendors
|
||
|
joined. Now almost 800 are in the fold. The SPA began to woo whistle-blowers
|
||
|
in earnest about two years ago, after a tip led to the successful bust of a
|
||
|
large corporation in the Midwest.
|
||
|
|
||
|
"Business is too good," Wasch says. "We're doing far more lawsuits and far
|
||
|
more audits than ever before, and the numbers are continuing to grow."
|
||
|
|
||
|
If your corporation is busted by the SPA, hope that it's done by mail. "What
|
||
|
happens then is that we write the CEO a letter explaining that we want to do an
|
||
|
audit," Wasch says. "If we find illegal software, the company pays twice: Once
|
||
|
for the pirated copy, once for a new one.
|
||
|
|
||
|
"That's a lot better for the company. The fine is much lower, and they don't
|
||
|
face the adverse publicity that results from a lawsuit. Still, 60 percent of
|
||
|
them promise they won't destroy software before they report it, and then they
|
||
|
go and do it anyway."
|
||
|
|
||
|
That was the case with a recent SPA visit to a medium-size defense contractor
|
||
|
in Washington, DC. "They agreed to an audit, and then they tried to wipe
|
||
|
pirated programs off all the hard disks," Wasch says. "But we knew. Why do
|
||
|
they think we called them in the first place? Someone on the inside was
|
||
|
talking. I couldn't believe they'd sit there and lie to us about it, we had
|
||
|
them over a barrel!"
|
||
|
|
||
|
The increasingly ominous specter of the SPA breaking down the door is making
|
||
|
more companies go legit, but some continue to spout excuses. "I don't want to
|
||
|
break the law, but I also don't want to go out of business," says Howell Davis,
|
||
|
the CEO of an accounting firm in a New England capital. "We can't afford to
|
||
|
work without computers, but I can't pay the high price of registering every
|
||
|
copy of every program we use. I had to borrow a lot of money to get this
|
||
|
business off the ground, and I think of this as just another form of borrowing.
|
||
|
It's another loan I'll repay when I can afford to."
|
||
|
|
||
|
Some corporate pirates operate with a sense of entitlement.
|
||
|
|
||
|
"Nobody's going to catch us," says Charles Vane, the managing director of a
|
||
|
nonprofit theater company in the Northwest, "and nobody should even be trying
|
||
|
to. We're on the brink of bankruptcy. Companies should be giving us software
|
||
|
packages as a gesture of support for the arts." He admits that almost all of
|
||
|
the software his theater uses is pirated. "We have some nice programs,
|
||
|
including an accounting package developed for Ernst & Young that we swiped and
|
||
|
a copy of SuperCalc with a bunch of extra modules. And WordPerfect, of
|
||
|
course," Vane says.
|
||
|
|
||
|
Where do the packages originate? "Our board members get them for us," Vane
|
||
|
says. "Of course, that means we can't be choosy. We have to wait until a
|
||
|
particular program comes our way. And what they like to give us the most are
|
||
|
games. We have a kazillion games."
|
||
|
|
||
|
Games and piracy are natural partners. Games themselves encourage piracy.
|
||
|
Unlike business-oriented programs, they engender intense, short-lived
|
||
|
relationships. Or as pirate-BBS operator John Rackam puts it, "Games get
|
||
|
boring. That's why you see so many of them on the pirate boards."
|
||
|
|
||
|
Online Piracy
|
||
|
|
||
|
Rackam runs a BBS straight out of "The Man from U.N.C.L.E." It looks like any
|
||
|
other medium-size board in the country, with a standard collection of shareware
|
||
|
and message bases. Gain special access which only takes $50 and a friend's
|
||
|
recommendation and you pass through the secret door into a 600MB collection of
|
||
|
the latest applications, including 10 zipped files of the complete dBASE IV, 11
|
||
|
of AutoCAD, and 6 of MS-DOS 5.0.
|
||
|
|
||
|
"Most of the people who use my board are collectors," he says. "They have to
|
||
|
have the latest copy of everything." Rackam isn't deterred by the threat of
|
||
|
getting caught. "I don't think it's going to happen to me. I'm not doing
|
||
|
anything that's really terrible. I mean, I'm not hacking up bodies or
|
||
|
anything. I make no money off this. The fee is just for keeping up my
|
||
|
equipment. I consider myself a librarian."
|
||
|
|
||
|
Novell takes a dim view of that attitude, as evidenced by an August 1991 raid
|
||
|
of two California bulletin board systems accused of distributing Novell NetWare
|
||
|
files. Such systems are another target the SPA would like to hit, and Wasch is
|
||
|
looking for FBI cooperation.
|
||
|
|
||
|
That makes the Humble Guys Network ripe for the picking. Study the high-
|
||
|
resolution GIF file of these buccaneers, and you see a collection of ordinary-
|
||
|
looking folks who happen to traffic in pirated game software. The founder, a
|
||
|
hacker who called himself Candy Man, has since skipped the country; now The
|
||
|
Slave Lord, a student at a southern college, is at the helm.
|
||
|
|
||
|
"The whole point of the network is to get games before the stores have them,"
|
||
|
says Bill Kidd, a computer consultant in Manhattan. "This is like proof of
|
||
|
manhood, how fast you can get them." Kidd professes little personal
|
||
|
involvement with piracy, but he knows where the bodies are buried.
|
||
|
|
||
|
"First there are the suppliers who can get a program from a manufacturer well
|
||
|
before it's released," Kidd says. "Often the supplier works for the
|
||
|
manufacturer. The game goes to the head person, who delivers it to the
|
||
|
crackers. They're the ones who remove the copy protection. From there it goes
|
||
|
to the couriers, and each has a list of pirate BBS's. The program then makes
|
||
|
it all over the country in minutes."
|
||
|
|
||
|
Speed is an obsession. These pirates are armed with 9,600-bit-per-second
|
||
|
modems and a must-have-it-now mentality. "The week before MS-DOS 5.0 hit the
|
||
|
stores," says Kidd, "most of the pirate boards had already deleted it because
|
||
|
they had been offering beta versions six months before."
|
||
|
|
||
|
As far as revenues are concerned, pirate bulletin boards may be more of a
|
||
|
nuisance than a threat. "Those people are never really going to buy that
|
||
|
software," says John Richards, a product manager with Lotus. "Nominally, it's
|
||
|
bad, but it's not as if they're buying one copy of 1-2-3 to put on the office
|
||
|
workstation for ten users."
|
||
|
|
||
|
Pirates at Home
|
||
|
|
||
|
While an office environment allows for regular, rigorous audits, the home
|
||
|
user gets away with pirating software. Peer under the hoods of a few hard
|
||
|
disks, and you're liable to find something illicit.
|
||
|
|
||
|
"It can happen innocently enough," says Symantec's Rod Turner. As general
|
||
|
manager of the Peter Norton Group, Turner has the distinction of overseeing one
|
||
|
of the most frequently pirated pieces of software: The Norton Utilities.
|
||
|
"Someone puts a copy of the software on someone else's machine to test it out
|
||
|
and leaves it behind. The other user assumes it's there legitimately," Turner
|
||
|
says.
|
||
|
|
||
|
"Often, someone gets software from a friend who got it at work," says Tony
|
||
|
Geer, service manager at Computer Directions, a retail outlet in Albany, New
|
||
|
York. Geer looks at hundreds of user-configured hard disks every month.
|
||
|
"Someone buys a machine from us, then turns around and calls us to say that
|
||
|
he's got all this software now, could we tell him how to run it," Geer says.
|
||
|
"What am I supposed to do? The customer wants me to spend hours on the phone
|
||
|
teaching him or he gets mad. When I tell him he has to buy the program, too,
|
||
|
he gets annoyed."
|
||
|
|
||
|
Geer also receives a huge number of requests for pirated software. "A lot of
|
||
|
users think that we can load up their hard disks with programs, even though
|
||
|
they know they ought to be paying for them and just want to duck the fee."
|
||
|
|
||
|
A few requests come from the truly naive, Geer says. "I'll get a call for
|
||
|
software support and I'll ask, What did the manual say?' I didn't get a
|
||
|
manual,' the person tells me. A friend gave this to me.' And then I have to
|
||
|
explain that software isn't free."
|
||
|
|
||
|
High software prices are a common user complaint. Former WordPerfect executive
|
||
|
vice president W.E."Pete" Peterson thinks the $495 list price of WordPerfect's
|
||
|
best-selling word processing program is justified, however. "WordPerfect sells
|
||
|
about 150,000 copies a month at that price, so quite a few users think the
|
||
|
price is justified, too," says Peterson. "A computer costs anywhere from a few
|
||
|
hundred to a few thousand dollars. Without the software, the computer is
|
||
|
worthless. WordPerfect goes to a lot of work to write and support the
|
||
|
software."
|
||
|
|
||
|
The latter includes a costly policy of toll-free phone support, handled by
|
||
|
operators who would just as soon not ask for a registration number. It's an
|
||
|
expensive way of showing trust, but it has paid off in excellent public
|
||
|
relations.
|
||
|
|
||
|
"We try to sympathize with people," says Jeff Clark, public relations director
|
||
|
at XyQuest, the company that publishes XyWrite, a word processing program
|
||
|
popular among journalists. "We sell replacement manuals as a service to
|
||
|
registered users, but there's a call at least once a week from someone who's
|
||
|
obviously trying to get manuals to go with a pirated copy."
|
||
|
|
||
|
The challenge then is to educate the caller, who may not even know that a law
|
||
|
has been broken. "All we ask of a registered user is to run the program on one
|
||
|
machine at a time," Clark explains. "If you're using it at work, yes, you can
|
||
|
use it at home. But don't buy one copy to use in an office of eight people."
|
||
|
|
||
|
"A lot of people seem to think copying disks is OK because it's easy to do,"
|
||
|
says Turner, who is also chairman of the SPA's companion organization, the
|
||
|
Business Software Alliance, which fights international piracy. "Then they call
|
||
|
our tech line, and we're in the delicate position of telling them they're using
|
||
|
a product illegally."
|
||
|
|
||
|
Microsoft is even more benevolent. "We like to know where the pirated copy
|
||
|
originated," says Bill Pope, associate general counsel for the company. "It's
|
||
|
not always possible to learn over the phone who's pirating something, because
|
||
|
we don't require that registration cards be returned. But if we do identify a
|
||
|
pirated copy, we'll help the user get it legally, and we may even supply a free
|
||
|
copy of the program if we can learn where it came from."
|
||
|
|
||
|
A highly publicized amnesty program was launched by the XTree Company in July
|
||
|
of 1982. For $20, anyone with a pirated copy of an XTree program was allowed
|
||
|
to buy a license for the entry-level version of the program, thus getting
|
||
|
access to the upgrade path. Response was enthusiastic during the 90-day
|
||
|
period, but the offer won't be repeated. "You can't offer amnesty over and
|
||
|
over," says Michael Cahlin, who markets the XTree products. "You lose the
|
||
|
respect of dealers and users who paid full price for it."
|
||
|
|
||
|
Turner is more blunt about it. "Amnesty encourages piracy. I don't think it's
|
||
|
been successful."
|
||
|
|
||
|
While the SPA will continue to make headlines with Untouchables-style raids
|
||
|
of corporate offices, Wasch also acknowledges that education is the key to
|
||
|
fighting piracy. A 12-minute, SPA-produced videotape entitled It's Just Not
|
||
|
Worth the Risk spells out the message as a congenial corporate manager is made
|
||
|
wise to the ways of the company pirate.
|
||
|
|
||
|
"That tape has been a huge success," says Wasch. "American Express bought 300
|
||
|
copies, and Kimberly-Clark just ordered 100. We've distributed about 10,000 of
|
||
|
them so far."
|
||
|
|
||
|
A self-audit kit, also available from the SPA, includes a program that
|
||
|
determines what software is in use on your PC as well as sample corporate memos
|
||
|
and employee agreement forms to promote piracy awareness.
|
||
|
|
||
|
Seeing the Light
|
||
|
|
||
|
Fear of being caught keeps many people honest, but some pirates will wait until
|
||
|
they're forced to walk the plank before giving up.
|
||
|
|
||
|
John Rackam says his BBS users are innocent. "They can't afford the software,
|
||
|
and they shouldn't have to pay," he says. "They're downloaders. They un-ARC it and say, This is nice!' Then they never use it again."
|
||
|
|
||
|
Charles Vane believes that software companies should give nonprofit
|
||
|
organizations like his theater a break. "If they give us packages, we'll give
|
||
|
them publicity. We'll print it in the program, we'll post it in the lobby.
|
||
|
It's an upscale crowd that comes through here. We just don't have the luxury
|
||
|
of money. I bought one program, ReportWriter, because it was cheap and good."
|
||
|
|
||
|
For casual users, piracy may simply be a phase. "I own 90 percent of the
|
||
|
programs I use," says systems administrator Ed Teach. "That's a big reverse
|
||
|
from about four years ago, when 90 percent of them were bootlegs."
|
||
|
|
||
|
And there's always the problem of well-meaning friends. Henry Every, a
|
||
|
journalist at a Florida newspaper, received pirated programs from friends when
|
||
|
he bought his first computer five years ago.
|
||
|
|
||
|
"I had all these programs and no idea how to use them," Every says.
|
||
|
"Fortunately, the bookstore had guides that were even better than the manuals,
|
||
|
and I became something of a power user. Then I became the guy that a friend of
|
||
|
a friend would call for help with his machine. Next thing I know, I'm the one
|
||
|
giving away pirate copies.
|
||
|
|
||
|
"But I won't do it anymore. I'm sick and tired of getting those calls all hours
|
||
|
of the day and night asking me how to use the damn things."
|
||
|
|
||
|
|
||
|
No Excuses Accepted
|
||
|
|
||
|
"When I'm sitting across the table from them and they're looking really
|
||
|
dog-faced, when I can see the whites of their eyes, it's hard to pull the
|
||
|
trigger," says Ken Wasch, the head of the Software Publishers Association.
|
||
|
"Nevertheless," he says, "I pull the trigger."
|
||
|
|
||
|
Wasch is not a tender man when it comes to dealing with software pirates. He
|
||
|
has no patience for the typical excuses given by those who copy and use
|
||
|
unlicensed software, and he offers the following responses to the common
|
||
|
complaints he hears from the outlaws:
|
||
|
|
||
|
* The price is too high.
|
||
|
|
||
|
"Hey I don't own a Mercedes Benz. Why? The price is too high. If you can't
|
||
|
afford it, don't use it."
|
||
|
|
||
|
* It's better to test the real thing than a crippled or demo version.
|
||
|
|
||
|
"The demos are normally very good. They limit the number of records, or they
|
||
|
don't save to the disk, or something. It's enough."
|
||
|
|
||
|
* I'll pay for it later.
|
||
|
|
||
|
"I doubt it."
|
||
|
|
||
|
* I won't get caught.
|
||
|
|
||
|
Wasch laughs. When he does so, you can't help but hope that he's laughing with
|
||
|
you, not at you. "Sooner or later . . ."
|
||
|
|
||
|
|
||
|
How Microsoft Foiled the Pirates
|
||
|
|
||
|
Imitation is flattering only when you don't lose money over it. Many software
|
||
|
packages are copied by clever pirates who duplicate disks, manuals, even
|
||
|
packaging. Microsoft has been hit often enough by counterfeiters that recent
|
||
|
software releases, including the Windows 3.1 and MS-DOS 5.0 upgrade packages,
|
||
|
were specially designed to be bootleg-proof.
|
||
|
|
||
|
"Every component part was carefully designed or hand-picked for that reason,"
|
||
|
says Kristi Bankhead, who works with Microsoft's general counsel on piracy
|
||
|
issues. "To the user, it should just look like an attractive box, but it
|
||
|
allows us to tell at once if it's legitimate or not."
|
||
|
|
||
|
That strategy paid off in March when FBI agents raided a quartet of Silicon
|
||
|
Valley companies that were pulling in up to $600,000 a month distributing bogus
|
||
|
copies of MS-DOS and Windows.
|
||
|
|
||
|
Key components of the official, bootleg-proof box designs are colorful artwork
|
||
|
and the use of holograms. On the MS-DOS 5.0 upgrade box, a silver circle on
|
||
|
the side offers an iridescent image of the logo. A second hologram, a small
|
||
|
rectangle on the side of the program manual shows through an expensive die-cut
|
||
|
hole on the other side of the box. The interlocked letters D-O-S are printed
|
||
|
in a four-color process that results in complicated mixtures that defy
|
||
|
reproduction. Even the way the box is folded and the flaps are glued and
|
||
|
tucked is unique, it's not a common style, and counterfeiters must either spend
|
||
|
time and money to copy it or risk quick discovery.
|
||
|
|
||
|
Even as the DOS upgrade package was being readied for market last year, police
|
||
|
detectives uncovered a Los Angeles based pirate ring that was already working
|
||
|
on full-scale knockoffs of it. "We got them while they were in the process of
|
||
|
completing the DOS 5.0 artwork," said Bankhead, "but we could tell how bad it
|
||
|
would look. For instance, they were using a piece of foil for the hologram,
|
||
|
and it had no three-dimensional image."
|
||
|
|
||
|
Top 10 Pirate BBS Downloads
|
||
|
|
||
|
1. Windows 3.1 (Microsoft)
|
||
|
2. Excel 4.0 (Microsoft)
|
||
|
3. Norton Utilities 6.0 (Symantec)
|
||
|
4. WordPerfect for Windows 5.1 (WordPerfect)
|
||
|
5. Stacker 2.0 (Stac Electronics)
|
||
|
6. AutoMap (AutoMap)
|
||
|
7. Procomm Plus 2.0 (Datastorm Technologies)
|
||
|
8. PC Tools Deluxe 7.1 (Central Point Software)
|
||
|
9. QEMM-386 6.0 (Quarterdeck Office Systems)
|
||
|
10. WordPerfect 5.1 (WordPerfect)
|
||
|
|
||
|
It looks familiar. It's very close to a recent Top 10 list of legitimate
|
||
|
programs. That's not surprising, since popular programs are also the most-
|
||
|
often swiped.
|
||
|
|
||
|
The list above was compiled from a survey of pirate BBS's, with help from John
|
||
|
Rackam. He explains that activity is so brisk the profile changes from week
|
||
|
to week, with games being the most transitory items (which is why they're
|
||
|
impossible to track). Because non-disclosure doesn't exist in the pirate world
|
||
|
and exchanging beta copies of software is a pirate tradition, Windows 3.1 won a
|
||
|
strong position even before its official release. By the way, there's only a
|
||
|
cursory interest in OS/2 2.0, which is ominous news for IBM if pirate interest
|
||
|
is any barometer of sales.
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
Software Publishers Association: Nazis or Software Police?
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
An Investigative Report by Rambone
|
||
|
|
||
|
The Software Publishers Association (SPA) is the principal trade association of
|
||
|
the microcomputer software industry. Founded in 1984 by 25 firms, the SPA now
|
||
|
has more than 750 members, which include major businesses, consumer and
|
||
|
education software companies, and smaller firms with annual revenues of less
|
||
|
than $1 million. The SPA is committed to promoting the industry and protecting
|
||
|
the interests of its membership.
|
||
|
|
||
|
The SPA has two membership categories: Full and Associate. Software firms
|
||
|
that produce, release, develop or license microcomputer software and are
|
||
|
principally responsible for the marketing and sales of that software are
|
||
|
eligible to apply for full membership status. Firms that develop software, but
|
||
|
do not publish are also eligible. Associate membership is open to firms that
|
||
|
do not publish software, but provide services to software companies. These
|
||
|
members include vendors, consultants, market research firms, distributors and
|
||
|
hardware manufacturers.
|
||
|
|
||
|
Lobbying
|
||
|
|
||
|
The SPA provides industry representation before the U.S. Congress and the
|
||
|
executive branch of government and keeps members up-to-date on events in
|
||
|
Washington, D.C., that effect them. The fight against software piracy is among
|
||
|
its top priorities. The SPA is the industry's primary defense against software
|
||
|
copyright violators both in the United States and abroad. Litigation and an
|
||
|
ongoing advertising campaign are ways in which the SPA strives to protect the
|
||
|
copyrights of its members.
|
||
|
|
||
|
This is the impression that the SPA wants to give the general public, and for
|
||
|
the most part, I have no problem with it. During a lengthy conversation with
|
||
|
Terri Childs of SPA, I was informed of several things. The association's main
|
||
|
source of information is from their hot-line and the calls are usually from
|
||
|
disgruntled employees just waiting to get back at their former bosses. An
|
||
|
example of this is a company that had bought one copy of Microsoft Works, and
|
||
|
with over 100 employees, they all seemed to be using the same copy. One
|
||
|
particular secretary had gotten fired, for what reason I do not know, so she
|
||
|
called the SPA police and spilled her beans. Once that happened the SPA got
|
||
|
the balls rolling by instructing the Federal Marshals to get a warrant and
|
||
|
storm the building like they own the place. With a nifty little program they
|
||
|
have that searches the machines for illegal copies of the software, they came
|
||
|
up with the programs not registered to that machine. *Bam!*, caught like a
|
||
|
dead rat in a cage. The SPA declined to comment on what has happened to that
|
||
|
company since the raid, but they did say the company would be fined "X" amount
|
||
|
of dollars for each illegal copy.
|
||
|
|
||
|
Ms. Childs was very helpful though, she explained the idea behind the
|
||
|
association, and what they stand for. I was very impressed with what she had
|
||
|
to say. However, when I brought up the case concerning the Davy Jones Locker
|
||
|
bust. She told me she was not qualified to answer questions involving that
|
||
|
case and directed me to Elaine Rosenthat. So a few hours later I called her,
|
||
|
and for a few brief moments she seemed to be quite helpful, but then decided to
|
||
|
put me on a speaker phone with the founder of the "Association," Ken Wasch.
|
||
|
|
||
|
>From the start I knew I would not get a straight answer out of him. The first
|
||
|
thing I asked him is if someone not in SPA obtained an account to get onto DJL,
|
||
|
and then gave it to them with log captures from the BBS. He would not give me
|
||
|
a straight answer, just that SPA was able to obtain the information. I then
|
||
|
asked him what actions are being taken toward DJL and received another run
|
||
|
around.
|
||
|
|
||
|
Finally, I asked what type of fine would be likely to be handed down in this
|
||
|
case. He refused to give me an answer.
|
||
|
|
||
|
But I did learn one very interesting little fact from all of this. The money
|
||
|
obtained by this incident and others like it do not go to the software
|
||
|
companies who the SPA claims to be protecting. Instead it goes right into the
|
||
|
coffers of the SPA itself! I guess they like to try those Mercedes.
|
||
|
|
||
|
And here is a few more interesting little tidbits about the SPA. Not only do
|
||
|
they fine the companies for having illegal software and then pocket the money,
|
||
|
but the annual charge for membership on the software companies can range
|
||
|
anywhere from $700 to $100,000! It seems to me that it is much more profitable
|
||
|
to eradicate piracy than to participate in doing it.
|
||
|
|
||
|
For those of you currently operating or considering operating a pirate bulletin
|
||
|
board, I would suggest that you not charge your users for access. Even if you
|
||
|
claim that the money is only for hardware upgrades, in the long run, if you get
|
||
|
busted, the money you collected will be evidence that suggests you were selling
|
||
|
copyrighted software for financial gain.
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
Vision-X Backdoor Nightmare
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
By Rambone
|
||
|
|
||
|
There seems to be a fallacy in the pirate world that all BBS software is
|
||
|
untouchable. However, about a month ago a few people associated with the
|
||
|
Oblivion team took apart .93 (a version number of Vision-X) and found
|
||
|
backdoors. The unfortunate problem with this is that the V-X team put those
|
||
|
backdoors in so they could trace down which Beta site was giving out Beta copies. Well, they found the backdoors and called up several boards and used
|
||
|
them.
|
||
|
|
||
|
1. The story from the people who hacked the boards is this, one of the two
|
||
|
involved was irate becuase he wrote a registration for .93 so anyone could
|
||
|
run it, whether they paid for the software or not. When the V-X team found
|
||
|
out about it, they blacklisted him from being able to logon into any V-X
|
||
|
system. This was done hard-coded, so no sysop could let him in with that
|
||
|
handle. Anyway, the story is they got into several of the BBSes, and even
|
||
|
dropped to DOS to look around, but did not have any intentions on
|
||
|
destroying data. Basically, they wanted to expose the weaknesses of the
|
||
|
software. The problem started when they posted the backdoors on a national
|
||
|
net, which means that now any lamer could use this backdoor for their own
|
||
|
purpose. According to the Oblivion guys, they did not destroy the data,
|
||
|
but some of the lamers that saw the backdoors on the net did. They regret
|
||
|
posting the backdoors. They didn't realize that there are some people who
|
||
|
are malicious enough to destroy data.
|
||
|
|
||
|
2. The Vision-X team are positive that the people who did take down the BBSes
|
||
|
were the Oblivion team, some say they even admitted to doing it. There is
|
||
|
a major paradox in these stories, and at this point it doesn't look like
|
||
|
anyone will ever be able to get the entire truth about what had happened.
|
||
|
|
||
|
Backdoors have never been a good idea, even if the authors are positive they
|
||
|
will never be found. The recent barrage of system crashing prove that the backdoors will indeed be found eventually. On the flip side of the coin, even
|
||
|
if backdoors in BBS software are found, they should be left alone to be used for their original intent. Most authors who put the backdoors into the systems
|
||
|
do it to protect their investment and hardwork. Most BBS programers these days
|
||
|
work on the software for the benefit of the modem community, and expect a
|
||
|
little money in return for their hard work. It is wrong for sysops to use it
|
||
|
without permission. You guys need to stop being cheap asses, and support a
|
||
|
software you want support from. What is the point of running a cracked piece
|
||
|
of software since you cannot get support from the authors and not get the net
|
||
|
they are involved in. The nominal amount of money involved is a good
|
||
|
investment in the future of your bbs.
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
"BAD" Magazine Lives Up To Its Name
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
By Rambone
|
||
|
|
||
|
I had never read Bad Magazine until recently. Everywhere discussion about it
|
||
|
had erupted, all I saw were comments that it was a waste of harddrive space.
|
||
|
However, when Bad's eighth issue surfaced, I heard that there were a few
|
||
|
disparaging remarks made about me and a spew of other loose information.
|
||
|
|
||
|
So I went ahead and took a look at it, and what I found was one lie after
|
||
|
another. I have never seen a magazine so full of shit as BAD #8. Apparently
|
||
|
they seemed to think I mentioned them in Phrack magazine, "Bad Magazine got
|
||
|
their first mention in the magazine Phrack." The funny thing is, the only
|
||
|
mention of BAD Magazine ever to appear in Phrack before now was a remark
|
||
|
attributed to The Grim Reaper that I reprinted.
|
||
|
|
||
|
I could care less about a pathetically lame magazine such as BAD and I never
|
||
|
mentioned them and never intended on mentioning them until they raised the
|
||
|
issue by taking a pot shot at me.
|
||
|
|
||
|
"The Boys of Phrack however did not do their homework when mentioning this
|
||
|
though." This is a quote from BAD regarding comments made about Vision-X,
|
||
|
which the article was not even about. What they don't know is that I
|
||
|
personally called The Grim Reaper and talked to him before putting anything in
|
||
|
Phrack about his bust. That's what the point of the article was about, not
|
||
|
about some lame magazine named BAD and what they did. They deemed me
|
||
|
responsible for not backing up my facts, when in fact, I backed them all up.
|
||
|
Grim Reaper's comments about Vision-X was not my concern, it was his bust for
|
||
|
credit card abuse that I was interested in learning about. The remarks
|
||
|
concerning BAD were made by TGR, so it would appear that "the boys at BAD" did
|
||
|
not do THEIR homework!
|
||
|
|
||
|
"Rambone obviously does not get much exposure to the pirate world." Yet
|
||
|
another ridiculous and unsubstantiated remark.. You boys definitly did not do
|
||
|
your homework, you better start asking around a little more before making
|
||
|
irresponsable accusations. The last words I will say about this is when
|
||
|
people put a magazine together, they should try and find writers who will
|
||
|
investigate facts instead of fabricating them. If they actually read my
|
||
|
article, they would have known that I did not say a word about their magazine,
|
||
|
but rather quoted The Grim Reaper. With writers such as those at BAD, I would
|
||
|
not suggest anyone waste their time reading it, unless you are into tabloids
|
||
|
like National Inquirer, but then at least some of their articles have a basis
|
||
|
in fact.
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
Games
|
||
|
~~~~~
|
||
|
Game Of The Month : Links 386 Pro
|
||
|
|
||
|
: -*- Release Information -*- : -*- Game Information -*- :
|
||
|
|
||
|
: Cracker None : Publisher MICROPLAY :
|
||
|
: Protection Type None : Graphics SVGA Minimum :
|
||
|
: Supplier The Witch King : Sound All :
|
||
|
: Date of Release 07/13/92 : Rating [1-10] 10 :
|
||
|
|
||
|
Sorry guys for reprinting the information file, but I got lazy <g>.
|
||
|
|
||
|
With the advent of the Super VGA Monitors, and the prices becoming more
|
||
|
resonable, companies are starting to come out with special games to take
|
||
|
advantage of SVGA mode. Most of these games still will play in VGA mode so
|
||
|
don't fret.
|
||
|
|
||
|
One of the latest to date, and probably the best is Links 386 Pro, which the
|
||
|
title indicates, at least a 386 is required. The installation of the game is
|
||
|
one of the most impressive I have ever seen, they cover every aspect of your
|
||
|
hardware to take full advantage of it. One of the harder things to swallow is
|
||
|
that you must have at least 512k of memory on your VGA card, and it must comply
|
||
|
by the VESA standard. If it does, the instalation is smart enough to try and
|
||
|
find one for you.
|
||
|
|
||
|
The game it's self is a major improvement over it's predecessor, Links. The
|
||
|
graphics are much improved, which was a feat in itself, and many more options
|
||
|
and bugs had been taken care of. The company also listened to its customers
|
||
|
and added many new features that were suggested.
|
||
|
|
||
|
When first loading up 386 pro, you are greated by a backview of a course
|
||
|
instead of the boring blank screen in the original. From there, you can just
|
||
|
about set up anything under the moon, from your club selection, to fairway
|
||
|
conditions, and techture of the greens. You can even select the wind
|
||
|
conditions. One of the most impressive features besides the outstanding
|
||
|
grahpics is the option to have multiple windows open while playing the game.
|
||
|
|
||
|
Let's say you are at the first hole, about to drive one down the fairway, if
|
||
|
you can make it there, you can also have another window up overlooking the
|
||
|
fairway waiting to see where the ball is going to drop. This is just one of
|
||
|
many windows you can open, four at the most. After playing it for quite
|
||
|
sometime, I would only suggest one or two though.
|
||
|
|
||
|
If you are contiplating buying a game to take advantage of your SVGA monitor,
|
||
|
look no further than Links 386 Pro. It's the wave of the future, and it's here
|
||
|
now.
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
No Longer Buy Console, Copy Them
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
Special Thanks Snow Dog
|
||
|
|
||
|
The following is an information excerpt on the GameDoctor. Basically, you can
|
||
|
buy a machine called the GameDoctor hook it up to your PC and copy the rom data
|
||
|
over to your HD in a compresed format. From there, you can send it over the
|
||
|
nets, through the modem, or bring it to a friend's house. You hook the
|
||
|
GameDoctor up to your PC, hook your console game to the GameDoctor and transfer
|
||
|
the compressed data file onto a blank cartridge. Wow, instant Super Mario
|
||
|
brothers. There will be a more in-depth review of this machine in the next
|
||
|
issue, for now, here's a little taste.
|
||
|
|
||
|
Snow Dog writes:
|
||
|
|
||
|
The machines are external SCSI interface machines, about the size of a super
|
||
|
NES but wider, and fitted for japanese (super famicom) cartridges. They are
|
||
|
made by electronics nippon, known as NEC in the States, and friend has one
|
||
|
that works on both his Amiga 2000 and his 486-33 (SCSI is universal).
|
||
|
|
||
|
They include five disks of Famicom OS, which you can use on a logical harddisk
|
||
|
partition of around six megs since SNES games are measured in MegaBITS and will
|
||
|
NEVER get bigger than four meg or so, but the OS needs room. Controllers et.
|
||
|
al. plug into the copier units.
|
||
|
|
||
|
If you take an SNES or Genesis cart out of their shell and put it in a SF
|
||
|
shell, you can copy them too. It works like teledisk, and Altered Reality in
|
||
|
(303)443-1524 has console game file support. All you do is download it and use
|
||
|
your own console copier to put it on a cart, or at your option if it is a SNES
|
||
|
or Famico game, play it off your OS. Genesis games don't work in the SF OS so
|
||
|
you need to copy them to cartridge.
|
||
|
|
||
|
There are Japanese copiers specifically for Mega Drive (Genesis) that will do
|
||
|
the same except that the OS is Sega-specific and you'll eed to copy SNES games.
|
||
|
There is also a NEC PC Engine (turbo graphics and super graphics) copier
|
||
|
because they made the bloody system, but it is proprietary and it will only
|
||
|
work with the turbo format.
|
||
|
|
||
|
I have never seen or worked with an internal model, but there is an internal
|
||
|
5.25" full height model in the NEC catalog...I ordered the catalog after I saw
|
||
|
an advertisement for it in the back of Electronic Gaming Monthly, and a rather
|
||
|
rich friend of mine went and bought the system. He also bought the $130
|
||
|
Japanese Street fighter II and copied it for all of us. How nice of him! Of
|
||
|
course we had to buy the cartridges and pay him $20, but he made a $100 profit.
|
||
|
Good deal for him!
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
Okay, that is it for now. Greets go out to Cool Hand, Ford Perfect, Lestat,
|
||
|
RifleMan, The CrackSmith, AfterMath, both Night Rangers, Kim Clancy, Bar
|
||
|
Manager, Butcher, Venom, and all the couriers who help make things happen.
|
||
|
|
||
|
Special thanks to Tempus for one kick ass ansi!
|
||
|
|
||
|
Until next time, keep playing.
|