Category : Unprotects for Games and Such
Archive   : PROUNP.ZIP
Filename : MEMSHIFT.UNP
In the spirit of a recent patch to unprotect LOTUS 1-2-3, I discovered
the same logic can be applied to unprotect MEMORY/SHIFT.
1. Rename MS.EXE MS.XYZ
2. DEBUG MS.XYZ
3. type U 1565
4. you should see INT 21 at that address
5. type E 1565 90 90
type E 1567 90 90
6. type W
7. type Q
8. Rename MS.XYZ MS.EXE
Finally, make sure command.com resides on the disk where MEMORY/
SHIFT is initiated.
65399 '** DONE - PRESS ENTER TO RETURN TO MENU **
ure command.com resides on t
Very nice! Thank you for this wonderful archive. I wonder why I found it only now. Long live the BBS file archives!
This is so awesome! 😀 I’d be cool if you could download an entire archive of this at once, though.
But one thing that puzzles me is the “mtswslnkmcjklsdlsbdmMICROSOFT” string. There is an article about it here. It is definitely worth a read: http://www.os2museum.com/wp/mtswslnk/