Ŀ
                       SOFTWARE PROTECTION SYSTEM                   Page 1 
         Copyright (c) G-FORCE COMPUTER SYSTEMS   MARCH 1995               


    PROTECT is a series of programs which allow you to protect YOUR
    programs against the piracy rampant in our industry.

    The disk contains the following programs and files:

            README          This text file.
            FILE_ID.DIZ     Brief description file.
            VENDOR.DOC      Information for distributors.
            REGISTER.DOC    How to register.
            SECUINIT.EXE    Set up protection parameters.
            SECURE.COM      Set up secure floppy disk.
            SECUREAD.COM    Inspect protection on floppy.
            SECUMOVE.COM    Install protection to hard disk.
            SECUHARD.COM    Inspect protection on hard disk.
            SECUDEIN.COM    De-install protection from hard disk.
            SECUBTNY.OBJ    C/C++ tiny object - link to your program.
            SECUBSML.OBJ    C/C++ small   object - link to your program.
            SECUBCMP.OBJ    C/C++ compact object - link to your program.
            SECUBMED.OBJ    C/C++ medium  object - link to your program.
            SECUBLGE.OBJ    C/C++ large   object - link to your program.
            SECUBHGE.OBJ    C/C++ huge    object - link to your program.
            TESTTINY.C      C sample program to illustrate usage.
            TESTSMLL.C      C sample program to illustrate usage.
            TESTCMPC.C      C sample program to illustrate usage.
            TESTMEDM.C      C sample program to illustrate usage.
            TESTLRGE.C      C sample program to illustrate usage.
            TESTHUGE.C      C sample program to illustrate usage.
            SECURE.H        C header file for TESTTINY.C.
            PROTECT.INI     Protection INI (parameter) file sample.
                          Ŀ
                           DESCRIPTION 
                          
    SECUINIT.EXE    Generate INI file with protection parameters.

        Usage: SECUINIT <SYSFILE - 7 chars>

        This program allows you to create/modify an encrypted security 
        initializing file called <SYSFILE.INI>.

        Parameters accepted are:
                Copyright Message.
                Your Company Name.
                Your Company Address.
                Base Serial Number (9 digits).
                Type of Security  O - Open system.
                                  U - Execute n times. 
                                  T - Execute until date.
                De-install Allowed ? (Y/N).
                Number of Installs Allowed.
                Number of Executions Allowed.
                Expiry Date.
                Personalised 8 character Encryption Key.
                Floppy drive to secure.

Ŀ
                       SOFTWARE PROTECTION SYSTEM                   Page 2 
         Copyright (c) G-FORCE COMPUTER SYSTEMS   MARCH 1995               


    SECURE.COM      Set up secure floppy disk.

        Usage: SECURE <FILENAME.INI> <HARD-TARGET>

        This program makes your distribution diskette secure.
        The diskette is secured according to the parameters held in
        the specified INI file. These are set up using SECUINIT.EXE
        and include automatic serialisation of the diskette. The
        HARD-TARGET parameter is the hard disk on which the security
        is to be installed.

        The protection system is encrypted and transparent to the
        end-user. Diskette capacity is not affected. The program may
        be used to protect 1.2Mb (5.25in), 1.44Mb (3.5in), or
        720Kb (3.5in) formatted diskettes. The program automatically 
        detects the format on the drive specified in the INI file.

        Copies of the secured diskettes, including those made with
        bit and/or sector copying programs cannot be installed!

    SECUREAD.COM    Inspect protection on floppy.

        Usage: SECUREAD ( A: or B: >

        This program reads your secure distribution diskette.
        It displays:
                Copyright Message.
                Your Company Name and Address.
                Type of Security  O - Open system.
                                  U - Execute n times. 
                                  T - Execute until date.
                De-install Allowed ? (Y/N).
                Number of Installs Allowed.
                Number of Executions Allowed.
                Expiry and Set-up Dates.
                Serial Number.
                Security File Names

Ŀ
                       SOFTWARE PROTECTION SYSTEM                   Page 3 
         Copyright (c) G-FORCE COMPUTER SYSTEMS   MARCH 1995               


    SECUMOVE.COM    Install protection to hard disk.

        Usage: SECUMOVE

        This program installs the hard disk security and updates the
        number of installs allowed. It writes two small files to the 
        root directory of the hard drive specified by SECURE.COM.

        These files are named from the security file name submitted
        by the INI file, say PROTECT, as PROTECT1.SYS & PROTECT2.SYS.

        PROTECT1.SYS (or name specified in INI) is the file which is
        interfaced with your program to check the security of your
        system. The files are encrypted and cannot be read by
        anyone who does not have access to your encryption key as
        well as knowing the encryption algorithm !

        Once the diskette has been installed to a hard disk, it
        may only be re-installed to that same drive.

        The exception to this is if you have allowed de-installation
        and provided your customer with SECUDEIN.COM they may
        de-install the program from the hard disk and then move it
        to another system.

    SECUHARD.COM    Inspect protection on hard disk.

        Usage: SECUHARD <DRIVE:\SYSFILE1.SYS>

        This program reads your hard disk security.
        It displays:
                Copyright Message.
                Your Company Name and Address.
                Type of Security  O - Open system.
                                  U - Execute n times. 
                                  T - Execute until date.
                De-install Allowed ? (Y/N).
                Number of Installs Allowed.
                Number of Executions Allowed.
                Expiry and Set-up Dates.
                Serial Number.
                Security File Names

Ŀ
                       SOFTWARE PROTECTION SYSTEM                   Page 4 
         Copyright (c) G-FORCE COMPUTER SYSTEMS   MARCH 1995               


    SECUDEIN.COM    De-install protection from hard disk.

        Usage: A:
               SECUDEIN

        This program allows your user to de-install security from 
        their hard disk. It removes the systems files from the hard 
        disk and re-instates the count on the diskette.

        The system may then be moved to another system but will no
        longer run on the original system.

        If you are controlling the system by number of uses or by
        expiry date, SECUDEIN ensures that the counters are kept
        up-to-date on such a transfer.

    SETUP.BAT   Sample diskette setup batch file.

        DIR A:
        SECURE PROTECT.INI C:
        SECUREAD A:
        LABEL A:

    INSTALL.BAT  Sample install batch file.

        IF NOT EXIST SECUMOVE.COM GOTO DEFAULT
        C:
        MD USERDIR >NUL
        CD USERDIR >NUL
        A:
        ECHO           ͻ
        ECHO            INSTALLING THE PROGRAMS TO C:\USERDIR            
        ECHO           ͼ
        SECUMOVE 
        COPY USERP*.* C: >NUL
        :OKAY
        ECHO           ͻ
        ECHO                      INSTALLATION SUCCESSFUL                
        ECHO           ͼ
        C:
        GOTO EXIT
        :DEFAULT
        ECHO           ͻ
        ECHO            YOU MUST LOG-ON TO THE DRIVE FROM WHICH YOU WISH 
        ECHO            TO RUN THIS INSTALL PROGRAM. IF, FOR EXAMPLE YOU 
        ECHO            HAVE INSERTED THE DISK IN DRIVE B, THEN YOU MUST 
        ECHO            ENTER THE COMMAND B:  BEFORE RUNNING THE INSTALL 
        ECHO            PROGRAM.  NOW TRY AGAIN.                         
        ECHO           ͼ
        :EXIT

Ŀ
                       SOFTWARE PROTECTION SYSTEM                   Page 5 
         Copyright (c) G-FORCE COMPUTER SYSTEMS   MARCH 1995               


     TESTTINY.C      C sample program to illustrate usage.
     TESTSMLL.C      C sample program to illustrate usage.
     TESTCMPC.C      C sample program to illustrate usage.
     TESTMEDM.C      C sample program to illustrate usage.
     TESTLRGE.C      C sample program to illustrate usage.
     TESTHUGE.C      C sample program to illustrate usage.

        Usage: TESTTINY <DRIVE:\SYSFILE1.SYS>

        As you will see from the source code for the above programs
        the security filename is passed to the program on the
        command line. Of course you may embed it within the program
        which you wish to secure.

        The prototype (secure.h) for the security call is:
        extern int Check_Secure(void);

        The SYSFILE1.SYS filename is passed to the external
        string Secure_File and the call made as follows:

                int i;
                i=Check_Secure();

        If the security is intact, i returns 0 and the copyright
        message, name and address, serial number, days left and uses 
        left are passed to the external strings specified in "secure.h".

        You can display your copyright message, name and address,
        serial number etc as you wish.

        You can display warnings as expiry or execution time runs out 
        on a demonstration/evaluation system.

Ŀ
                       SOFTWARE PROTECTION SYSTEM                   Page 6 
         Copyright (c) G-FORCE COMPUTER SYSTEMS   MARCH 1995               


    GENERAL

        These utilities are distributed under the shareware concept,
        sometimes called "user-supported software".

        The concept of shareware is "Try before you buy". This means
        that you may try the software for a reasonable period (30 days).
        If you like what you see then you should register the software;
        if not then don't use it - it is not "freeware".

        The shareware version is fully functional and identical to
        the registered version. 
        
        It is normal in shareware versions to display reminder-
        to-register screens in the program. These utilities will also 
        display a reminder screen as follows:
        
                   ͻ
                    Please register PROTECT now! 
                                                 
                    Registration gives you the   
                    enhanced version and all the 
                    advantages listed in README  
                                 AND             
                    this screen stops appearing  
                        all over the place !     
                                                 
                      Press ENTER to continue.   
                   ͼ

        We have tried to do this as tastefully as possible, and hope
        that it does not cause you any annoyance ! Registration gets
        rid of the reminder altogether !

Ŀ
                       SOFTWARE PROTECTION SYSTEM                   Page 7 
         Copyright (c) G-FORCE COMPUTER SYSTEMS   MARCH 1995               

        
        Those of you who will benefit from the use of these programs,
        appreciate more than anyone the long hours, the tired eyes,
        the frustrations and joy of producing software. Reward for effort 
        is to be expected (the reason for protecting your product!).

        So do not hesitate - send in your registration NOW !

        Look at how you benefit:

        1. You will receive the latest version of this package.

        2. You will receive the add-on modules SECUPSWD and
           SECURSET *** FREE OF CHARGE ***. (see Page 8)

        3. You will have the ability to send fully functional programs to 
           clients for evaluation and open them up with a simple password.
           
        4. You pay no royalties for the inclusion of the code in your 
           programs.
        
        5. You are not limited or metered on the number of programs or
           packages you protect.
           
        6. Several protected packages, with different protection
           parameters, can co-exist on the same system.
              
        7. You will be notified of periodic updates to the programs.

        8. You will be provided with free Technical Support.

        9. You will be supported in interfacing with languages other 
           than C/C++, which support calls to assembly language routines.

       10. You will no longer see the reminder message. 


        See REGISTER.DOC on how to register.

        Thank you for your attention - enjoy the programs !

Ŀ
                       SOFTWARE PROTECTION SYSTEM                   Page 8 
         Copyright (c) G-FORCE COMPUTER SYSTEMS   MARCH 1995               

                         Ŀ
                          ADD-ON PROGRAMS 
                         

    The add-on programs consist of the following:

            SECUPSWD.EXE    Remote reset password generator.
            SECURSET.COM    Remote reset of expired system.

                          Ŀ
                           DESCRIPTION 
                          

    SECUPSWD.EXE    Remote reset password generation.

        Usage: SECUPSWD

        This program generates passwords for a user to re-instate an 
        expired system which you are controlling by number of executions 
        or by expiry date.
        
        Let us say you issue your protected package to operate for
        30 operations. You may wish to extend the number of executions, 
        or to change the limit to a time extension, or to open the system 
        for permanent usage.
        
        This is all possible through the use of these two programs.
         
        The passwords are generated using the customers serial number,
        the encryption key and the current system date so that passwords
        used will differ from system to system and from day to day !

    SECURSET.COM    Remote reset of expired system.

        Usage: SECURSET <password password password>

        This program allows your user to re-instate an expired system,
        controlled by number of executions or by expiry date.

        The system is re-instated by use of passwords generated by
        you with the program SECUPSWD.EXE.

        The passwords are generated using the customers serial number,
        the encryption key and the current system date so that passwords 
        used will differ from system to system and from day to day !

        This means that a password supplied to reset a system today,
        will be of no use to the user next week!
        
        It is also worth noting that turning back the systems clock
        does not fool the time limit protection. In fact if the clock 
        is turned back, your programs will not run - even if the time 
        has not expired !


