Dec 232017
A collection of several files to enable you to create your own disk protection.
File PRTK11.ZIP from The Programmer’s Corner in
Category Miscellaneous Language Source Code
A collection of several files to enable you to create your own disk protection.
File Name File Size Zip Size Zip Type
PROTEK.DOC 8262 2602 deflated
PROTEK.EXE 4055 2252 deflated
README.EXE 44887 16029 deflated
TEST39.EXE 1103 538 deflated
TEST40.EXE 1103 537 deflated

Download File PRTK11.ZIP Here

Contents of the PROTEK.DOC file


Copyright (C)1991,1992 David R. Green, All rights reserved

Disk Protection


Protek and the Test utilities allow a PC programmer to add
software protection to his/her distribution diskettes. While
Protek is fully functional, it is meant to be used strictly for
demonstrative purposes. The Shareware version of Protek allows
for protection of 360k 5" Floppy disks only.


Operation of Protek is straight forward. Type PROTEK to run
the program, and use the on-screen menu to select your task.

The first thing you must do, is to enter the security code
required to operate Protek, this is to stop unwanted parties from
using the program. Disks can easily be destroyed if unknowing
parties use this program. The Security code for the Shareware
distributed version is PROTEK, and may be entered in either
upper or lower case. When the correct Security code has been
entered, you will be able to select from the menu items. If an
invalid Security code is entered, the program will halt, causing
you to have to reboot your computer.

The menu consists of the following selections:

[Q] Quit the program back to DOS.

[A] Cylinder 39 protection in a 360k drive. This method of
protection prevents Diskcopy programs from duplicating

[B] Cylinder 39 protection in a 1.2MB drive. This selection
creates a disk protected similar to the above selection,
but must be used for 1.2MB high-density drive system.

[C] Cylinder 40 protection in a 360k drive. This method of
protection allows Diskcopy programs to make backups of
the original, but will not allow them to test properly
with the Test program. This is the preferred method,
since users can easily make an archival copy, but still
retain protection on the original.

[D] Cylinder 40 protection in a 1.2MB drive. This selection
creates a disk protected similar to the above selection,
but must be used for 1.2MB high-density drive systems.

[E] Format a new 360k disk in a 360k drive. The Format disk
feature is included to allow you to protect new disks out
of the box without having to bounce back and forth between
DOS's Format command and Protek.

[F] This selection is similar to the above, but is used for
1.2MB high-density drives.

[S] Allows you to select Drive A or B as the target drive for
Protection/Format operations.

Introduction - Protek and Test 1

Status displays show the current Date, in addition to the
current Drive, Cylinder, and Head numbers.


To demonstrate the Protek program, perform the following:

1. Copy PROTEK.EXE and TEST??.EXE to a new formatted 360k disk.

2. Run TEST40 and note that the message returned shows that
the disk is NOT protected.

3. Run Protek and select Cylinder 40 Protection on this disk.

4. Run TEST40 and note that the protection has now passed the

The TEST39 program works similarly, except you must choose
Cylinder 39 Protection on the Protek program. Cylinder 40
protected disks can be copied using the standard DiskCopy
programs, but will always prevent the test from passing.
Cylinder 39 programs will show an error when using standard
DiskCopy progams.


Registration benefits include source code for Protek and the
Test utilities, in addition to a large manual on disk of copy
protection information. Please send in your Registration form,
along with the registration fee to qualify. Addition source
code and demonstation programs for other protection techniques
is also included.

The manual covers the following areas:

Chapter 1

Important Notice
Convention Used In This Book

Chapter 2

The Early Days

2 Example - Registration Bonus

Chapter 3

Current protection techniques
Head Timing
Modified DOS
Extended Tracks
Off-disk Protection
Non-Reproducable Ink
Hardware (Dongle)
Cycling/Counting or Play-Timing
Key Disk
Hidden File
Commercial Programs

Chapter 4

Hardware and DOS Internals
Hard Drive system
Floppy Drive system
Programming Considerations
Command Summary
Interrupt 1E - Diskette parameters
Protecting High-Capacity Floppy Drives
Diskette BIOS
BIOS and POST Equates
Drive Parameter Tables
BIOS and DOS Diskette and Related Interrupt Calls

Chapter 5

How to Archive a Protected program

Chapter 6

What to do if a Protection fails

Chapter 7

Creating your own Protection
Hidden-Hidden File


uPD765 Floppy Controller Commands


Archiving and Utility Software,
Recommended Reading



Registration Bonus 4


The manual included with Registration of Protek has required
many years of experience in the disk protection field, not to
mention the number of hours spent typing it all in. Please do
not change or remove any copyright notices, or use the manual
in whole or in part with any other products, either private or
public. The PROTEK BONUS Manual and diskettes are for Registered
PROTEK users only. Please do not give copies to unregistered
parties. Doing so is also a breech of License.

The Protek Software programs and documentation are Copyright
David R. Green, and may not be used for illegal activities.
By sending in the registration, to obtain the source code and
manual, you are agreeing to become bound to the terms set forth
in this License and Use Restriction agreement. Any persons
caught performing illegal activities or creating derivative works
for illegal use can be prosecuted by law. Protek is designed to
be used strictly for information, demonstration, or to provide
Shareware authors with a means to easily protect their OWN works.

5 License and Registration Information

 December 23, 2017  Add comments

 Leave a Reply

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>