Комментарии:
Old Guy here. Help me understand. Imagine a play ground inside a fence and locked gate. In order to play on the play ground you have to have a key for the locked gate. If you don't have the key for the locked gate, why not just jump over the fence and locked gate? Which came first? The full version of the game, or the fence/locked gate to play the game? When the creators of Hyperspace.Invader.v2.01 created the game, did they play/create the game then put it inside the fence and locked gate, or did the fence and locked gate come first? How to jump over the fence and just go to playing the full version of the downloaded trial version without fussing with all this keygen business. I know the full version is there to play, just help an old man jump over the fence to play on the play ground. Or.........just tear the fence down and walk on in like the creators of the game did. What am I saying, the creators of the game didn't even have a fence/locked gate around the play ground until the playground was finished. A? 2005 is when the game came out. You won't be able to find a trial version to download anymore, unless you know someone who still has the trial version to share. The company that made and sold the game quit selling it years ago. Other wise I'd just buy the game. $19.95 easy peazy
ОтветитьI miss the keygen jams.
Ответить@LowLevelLearning, love your channel first and foremost. Newer to C, been doing Python for a while. Downloaded this one and followed your instructions and noticed that len(prog_name)&0x1f and len(prog_name) returns the same value... Not sure if it has an effect in C; but it looks like replacing your line before returning the key to:
key = key << ( len(program))
It will still return the right value.
As an old-school and retired (must mention that) cracker from the 8 and 16-bit era, it's cool to see new guys into the "reverse engineering" stuff. Nice. Brings me memories back from my trusty SoftIce debugger and back-tracking virii code (vlab anyone?). Greetings from Brazil!
Ответитьis the donwloaded zip only password protected for me?
ОтветитьStill using them now on old Windows pc for friends and family, lol. Old programs still do the basic work, why upgrade to new version when years later still basically only using five percent of program, jus sayin
ОтветитьGreat job motherfucker! Those CD keys shouldn't even exist in the first place. It was created by greedy capitalists who want to prevent everybody from using our computers.
Ответитьdude , I went first in 1998 and a few years later I was doing this shijt with key gens. those scene release groups were very rare. But some of them are still out there in 2023.
the time that internet was still for nerds. and pay by the minute for your internet with your monthly phone bill (land line ) . greets from The Netherlands.
Installing from a CD... you call yourself old? 🤪
I remember loading games from a tape recorder.
yeah ok mini ladd
ОтветитьPretty awesome video, I always wondered how these were done!
ОтветитьGood video, though it's missing the most important part about those old key gens. The awesome tracker music that would (loudly) play when you opened them.
Ответитьvery interesting!
ОтветитьDescription is wrong.... Software keys go back to the 80s, maybe even earlier. Hell, every game I owned from the 90s had a cd key, the floppy disk version of windows 95 still used a license key.
ОтветитьI'm guessing you might find em somewhere, but there use to be some websites/torrents/etc(don't specifically remember where; apparently I'm getting old and this was to long ago:P) tutorial kits that would include old versions of software and abandonware with tutorials on how to crack the software/etc..... I guess sorta a precursor to this sorta thing:P
ОтветитьIts not illegal to create a key generator..
Ответитьfyi Windows XP just got a keygen that actually lets you activate online
ОтветитьThis is straight up nostalgia, as a kid my dad once got me one of these types of games for my first laptop that once had Windows Vista
ОтветитьThat's complete horseshit that most keygens were malware. You only found malware because you downloaded them from some shitty website or torrent. Groups would get nuked for releasing shit that didn't work or was malware.
And that's how you can spot a good reverse engineer from a bad one. Good ones aren't generally decompiling code, they're reading and debugging the assembly. Let's see how well decompilation works out for you if you're working on vm, obfuscated, packed or executables that have been specifically modified to be difficult to disassemble.