Category : Unprotects for Games and Such
Archive   : UP-PM191.ZIP
Filename : UP-PMSTR.191

Output of file : UP-PMSTR.191 contained in archive : UP-PM191.ZIP
January 1991

The following patch appeared on the BBS's in early 1986. It is updated
here to include a subsequent version of PrintMaster (date unknown).

This patch allows the user to unprotect PrintMaster, published recently
(1985) by Unison World, Inc. The following steps assume that DEBUG.COM
and the file PMMAIN.EXE are on the default disk drive. If not, add
a drive specifier (A:, B:, C:, etc.) to the file names shown below.
The procedure is as follows:

S 0000 FFFE CD 13 (This should return an address in the form
xxxx:6C73, where xxxx is the current code segment. If the
second part of the address is not 6C73, you have a different
version, and this patch probably will not work. If it is
6C73, proceed with the following steps.)
E 6C73 90 90
E 6C7A 90

If the address returned is xxxx:6CE5 instead of xxxx:6C73, the next
steps should read....
E 6CE5 90 90
E 6CEC 90

The version you have now created will run from an unprotected
floppy in drive A, but since some of the file names used by the
program are hard coded to be on drive A, there is another step to be
performed before it can be run from the hard disk or RAM disk.
The DOS command ASSIGN A=C must be executed (assuming the hard disk
or RAM disk is drive C). This will direct all calls for drive A to
drive C, where the program and its files are.

You can simplify running the program by including the following
short BAT file in the hard drive directory where you have placed the
PrintShop program files....
assign a=[d]
where [d] is the drive letter of the hard drive.

  3 Responses to “Category : Unprotects for Games and Such
Archive   : UP-PM191.ZIP
Filename : UP-PMSTR.191

  1. Very nice! Thank you for this wonderful archive. I wonder why I found it only now. Long live the BBS file archives!

  2. This is so awesome! 😀 I’d be cool if you could download an entire archive of this at once, though.

  3. But one thing that puzzles me is the “mtswslnkmcjklsdlsbdmMICROSOFT” string. There is an article about it here. It is definitely worth a read: