تبلیغات :
آکوستیک ، فوم شانه تخم مرغی ، پنل صداگیر ، یونولیت
دانلود فیلم جدید
خرید فالوور ایرانی
خرید فالوور اینستاگرام
خرید ممبر تلگرام
خرید لپ تاپ استوک
ماهان سرور
دستگاه جوجه کشی حرفه ای
فروش آنلاین لباس کودک

[ + افزودن آگهی متنی جدید ]




صفحه 5 از 17 اولاول 12345678915 ... آخرآخر
نمايش نتايج 41 به 50 از 163

نام تاپيک: آموزش کرک و قفل شکنی ( انگلیسی ) از بهترین کرکرهای روس و ...

  1. #41
    پروفشنال Morteza_SOS's Avatar
    تاريخ عضويت
    Apr 2006
    پست ها
    577

    پيش فرض

    Title : TOMB RAIDER 5 (GAME)
    Version : 1.0
    Description : 3D ADVENTURE (TOMB RAIDER CLONE)
    Protection : CD CHECK
    Producer :
    کد:
    برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید
    Cracker : Zaks (scorpion121@gmx.net)
    Tools : Softice, W32Dasm, Hiew
    Difficulty : Very Easy


    ================================================== ===============


    1) Install Tomb Raider 5 Chronicles. Copy all data from the cd to your installation directory (mine is d:\games\tomb5). Restart your windows with Softice switched on. Ctrl+d (Softice pops up) and you put a breakpoint on getdrivetypea (bpx getdrivetypea). F5 (back in windows) and you run pctomb5.exe. Softice breaks, you press F12 and you are in the middle of the check routine:

    :004A3C33 83F805 cmp eax, 00000005 // was cd rom found?

    Make backup of pctomb5.exe (example pctomb5.bak) and disassemble it in W32dasm to take a look at the check routine:


    // Part of pctomb5.exe

    * Referenced by a (U)nconditional or (C)onditional Jump at Address:
    |:00402B21(U)
    |
    :004A3BC0 83EC18 sub esp, 00000018 // Here the check routine begins
    :004A3BC3 A1DC655100 mov eax, dword ptr [005165DC]
    :004A3BC8 8B0DE0655100 mov ecx, dword ptr [005165E0]
    :004A3BCE 8B15E4655100 mov edx, dword ptr [005165E4]
    :004A3BD4 53 push ebx
    :004A3BD5 8944240C mov dword ptr [esp+0C], eax
    :004A3BD9 66A1E8655100 mov ax, word ptr [005165E8]
    :004A3BDF 56 push esi
    :004A3BE0 57 push edi
    :004A3BE1 894C2418 mov dword ptr [esp+18], ecx
    :004A3BE5 8954241C mov dword ptr [esp+1C], edx
    :004A3BE9 6689442420 mov word ptr [esp+20], ax

    * Reference To: KERNEL32.GetLogicalDrives, Ord:0120h
    |
    :004A3BEE FF156C27EF00 Call dword ptr [00EF276C]
    :004A3BF4 8D4C240C lea ecx, dword ptr [esp+0C]

    * Possible StringData Ref from Data Obj ->"A:\"
    |
    :004A3BF8 68D8655100 push 005165D8
    :004A3BFD 51 push ecx
    :004A3BFE 8BD8 mov ebx, eax
    :004A3C00 C605584A870041 mov byte ptr [00874A58], 41 // this address contains the drive letter

    * Reference To: KERNEL32.lstrcpyA, Ord:0302h
    |
    :004A3C07 FF158C27EF00 Call dword ptr [00EF278C]
    :004A3C0D 85DB test ebx, ebx
    :004A3C0F 7461 je 004A3C72

    * Reference To: KERNEL32.GetDriveTypeA, Ord:0104h
    |
    :004A3C11 8B3D8427EF00 mov edi, dword ptr [00EF2784]

    * Reference To: KERNEL32.CreateFileA, Ord:0034h
    |
    :004A3C17 8B358827EF00 mov esi, dword ptr [00EF2788]

    * Referenced by a (U)nconditional or (C)onditional Jump at Address:
    |:004A3C70(C)
    |
    :004A3C1D F6C301 test bl, 01
    :004A3C20 743E je 004A3C60
    :004A3C22 8A15584A8700 mov dl, byte ptr [00874A58]
    :004A3C28 8D44240C lea eax, dword ptr [esp+0C]
    :004A3C2C 50 push eax
    :004A3C2D 88542410 mov byte ptr [esp+10], dl
    :004A3C31 FFD7 call edi // getdrivetypea is called
    :004A3C33 83F805 cmp eax, 00000005 // was cd rom found?
    :004A3C36 7528 jne 004A3C60 // if not jump to test another drive
    :004A3C38 8A0D584A8700 mov cl, byte ptr [00874A58]
    :004A3C3E 6A00 push 00000000
    :004A3C40 6880000000 push 00000080
    :004A3C45 6A03 push 00000003
    :004A3C47 6A00 push 00000000
    :004A3C49 6A00 push 00000000
    :004A3C4B 8D542428 lea edx, dword ptr [esp+28]
    :004A3C4F 6800000080 push 80000000
    :004A3C54 52 push edx
    :004A3C55 884C2430 mov byte ptr [esp+30], cl
    :004A3C59 FFD6 call esi // createfilea is called here
    :004A3C5B 83F8FF cmp eax, FFFFFFFF // compare eax with -1
    :004A3C5E 751B jne 004A3C7B // if not jump to goodguy

    * Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
    |:004A3C20(C), :004A3C36(C)
    |
    :004A3C60 8A0D584A8700 mov cl, byte ptr [00874A58]
    :004A3C66 FEC1 inc cl
    :004A3C68 D1EB shr ebx, 1
    :004A3C6A 880D584A8700 mov byte ptr [00874A58], cl
    :004A3C70 75AB jne 004A3C1D

    * Referenced by a (U)nconditional or (C)onditional Jump at Address:
    |:004A3C0F(C)
    |
    :004A3C72 5F pop edi // Badguy
    :004A3C73 5E pop esi
    :004A3C74 32C0 xor al, al
    :004A3C76 5B pop ebx
    :004A3C77 83C418 add esp, 00000018
    :004A3C7A C3 ret



    * Referenced by a (U)nconditional or (C)onditional Jump at Address:
    |:004A3C5E(C)
    |
    :004A3C7B 50 push eax // Goodguy

    * Reference To: KERNEL32.CloseHandle, Ord:001Bh
    |
    :004A3C7C FF15C027EF00 Call dword ptr [00EF27C0]
    :004A3C82 5F pop edi
    :004A3C83 5E pop esi
    :004A3C84 B001 mov al, 01 // al becomes 1 (seems very important)
    :004A3C86 5B pop ebx
    :004A3C87 83C418 add esp, 00000018
    :004A3C8A C3 ret


    2) As you see this is an usual check routine with just one new element createfilea and without getvolumeinformationa. Now put the cd in, start the game and trace with Softice to see the registers's values at the end of the routine (before ret is executed). When cd in you have al 1, bl 0, cl p. Now do this again with cd out of the drive. When cd is out you have al 0, bl 0, cl g.

    3) I tried to disable the protection itself by making cl, dl and byte ptr [00874A58] "." and al 01 (mov cl, 2e then mov dl,cl, mov byte ptr [00874A58], cl then mov al, 1). They have the value of your cd drive and al have to be 1 for a check after ret... It did not work. The game just "performed an illegal operation and had to be closed". So there is something that I had to do at first and not wasting my time. I suggest you try this every time with this kind of protections. Go at the beginning of the check routine :

    :004A3BC0 83EC18 sub esp, 00000018

    and note the offset. For me it was a3bc0. Open pctomb5.exe with hiew. F4 - decode, F5 - goto a3bc0 (your offset), F3 - edit, F2 - write in ASM and write mov al,1 ENTER ret ENTER, ESC F9 to save. Exit hiew and run the game without the cd.

    CHANGE :

    :004A3BC0 83EC18 sub esp, 00000018

    TO

    :004A3BC0 B001 mov al, 01
    :004A3BC2 C3 ret

  2. #42
    پروفشنال Morteza_SOS's Avatar
    تاريخ عضويت
    Apr 2006
    پست ها
    577

    پيش فرض

    Target: Warlords 3 - Darklords Rising
    Toolz: SICE, W32Dasm
    Level: 1
    Protection: 2 CD-checks plus a filesize check (I found only these!)

    Background info:

    I decided to do a revised version of this tute coz the first one was so lame.. I found out
    several nice things I missed back then.. Heh.. when I first wrote this revision I had finished
    the whole text but my comp goddam crashed. And since I hadnt done any savings I lost the initial
    text.. ----!

    Lets move on (do backups now & disasm the file if you want)

    * Reference To: KERNEL32.GetDriveTypeA, Ord:00CEh
    |
    :00445853 FF1540F85900 Call dword ptr [0059F840]
    :00445859 83F805 cmp eax, 00000005 <-- you are here, and a check...
    :0044585C 757A jne 004458D8 <-- ...for CD-ROM
    :0044585E 8D45E4 lea eax, dword ptr [ebp-1C]
    :00445861 8D4D94 lea ecx, dword ptr [ebp-6C]
    :00445864 50 push eax

    * Possible StringData Ref from Data Obj ->"%sW3.DAT" <-- Look for this file on CD
    |
    :00445865 68603E4F00 push 004F3E60 <-- push the file pointer
    :0044586A 51 push ecx
    :0044586B FFD7 call edi <-- call getdrivetypea
    :0044586D 83C40C add esp, 0000000C
    :00445870 8D4D94 lea ecx, dword ptr [ebp-6C]
    :00445873 6A00 push 00000000

    * Possible Reference to String Resource ID=00001: "Error!"
    |
    :00445875 6A01 push 00000001
    :00445877 51 push ecx
    :00445878 8D8D84FEFFFF lea ecx, dword ptr [ebp+FFFFFE84]
    :0044587E E8FD330900 call 004D8C80 <-- check for the file (eax == 1 -> chk passed)
    :00445883 85C0 test eax, eax <-- found it, or not
    :00445885 7451 je 004458D8 <-- jump if file not found
    :00445887 8D8D84FEFFFF lea ecx, dword ptr [ebp+FFFFFE84]
    :0044588D E8DE350900 call 004D8E70
    :00445892 8D45E4 lea eax, dword ptr [ebp-1C]
    :00445895 8D4D94 lea ecx, dword ptr [ebp-6C]
    :00445898 50 push eax

    * Possible StringData Ref from Data Obj ->"%sDRAKDUM\DRAKDUM0.SMK" <-- also look for this file
    |
    :00445899 68483E4F00 push 004F3E48 <-- push file pointer
    :0044589E 51 push ecx
    :0044589F FFD7 call edi <-- call getdrivetypea
    :004458A1 83C40C add esp, 0000000C
    :004458A4 8D4D94 lea ecx, dword ptr [ebp-6C]
    :004458A7 6A00 push 00000000

    * Possible Reference to String Resource ID=00001: "Error!"
    |
    :004458A9 6A01 push 00000001
    :004458AB 51 push ecx
    :004458AC 8D8D84FEFFFF lea ecx, dword ptr [ebp+FFFFFE84]
    :004458B2 E8C9330900 call 004D8C80 <-- check for it (eax == 1 -> chk passed)
    :004458B7 85C0 test eax, eax <-- blah
    :004458B9 741D je 004458D8 <-- blah
    :004458BB 8D8D84FEFFFF lea ecx, dword ptr [ebp+FFFFFE84]
    :004458C1 E89A360900 call 004D8F60 <-- Trace this!!

    Ok.. thats for those two checks.. now lets see the last one, trace the call

    :004D8F60 56 push esi
    :004D8F61 57 push edi
    :004D8F62 8BF9 mov edi, ecx
    :004D8F64 33F6 xor esi, esi
    :004D8F66 39B708010000 cmp dword ptr [edi+00000108], esi
    :004D8F6C 7415 je 004D8F83
    :004D8F6E 56 push esi
    :004D8F6F 8B870C010000 mov eax, dword ptr [edi+0000010C]
    :004D8F75 50 push eax

    * Reference To: KERNEL32.GetFileSize, Ord:00DAh <-- get the filesize of DRAKDUM0.SMK

    Thats it... GetFileSize is the last check which determines the size of DRAKDUM0.SMK and if no
    file found eax will have the value of 0, but if the file found, EAX is 2B465C (the file size
    in HEX! see for yourself if ya want -> 2836060 = 2B465C).

    Huh.. we came thru the longer and harder way I had thought.. but we now know enuff to do some
    patching

    :0044587E E8FD330900 - call 004D8C80 change to -> B801000000 - mov eax, 00000001
    :004458B2 E8C9330900 - call 004D8C80 change to -> B801000000 - mov eax, 00000001
    :004458C1 E89A360900 - call 004D8F60 change to -> B85C462B00 - mov eax, 002B465C

    -C_DKnight

  3. #43
    پروفشنال Morteza_SOS's Avatar
    تاريخ عضويت
    Apr 2006
    پست ها
    577

    پيش فرض

    Title : WARCRAFT 2 BATTLE NET EDITION(GAME)


    Version : 2.0
    Description : RTS (C&C CLONE)
    Protection : CD CHECK (in storm.dll again)
    Producer :
    کد:
    برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید
    Cracker : Zaks (scorpion121@gmx.net)
    Tools : Softice
    Difficulty : Very Easy (The same protection as in Starcraft or Diablo)

    ================================================== ===============

    1) Install Warcraft 2 BNE. Copy install.exe from the cd to your war2 directory. Remove the CD from the drive. Set a breakpoint on getdrivetypea (bpx getdrivetypea) in Softice and run Warcraft 2 BNE. Softice breaks in kernell32 and you press F12 to return back and you are in file storm!. The only file named storm is storm.dll. Well, I have already explained how to crack this stupied protection in Starcraft and Diablo tutorials. So once again very briefly :


    //Part of storm.dll

    * Reference To: KERNEL32.GetDriveTypeA, Ord:0104h
    |
    :1501151E FF157CB10215 Call dword ptr [1502B17C]
    :15011524 8D942430010000 lea edx, dword ptr [esp+00000130]
    :1501152B 6804010000 push 00000104
    :15011530 52 push edx
    :15011531 8BF0 mov esi, eax
    :15011533 896C241C mov dword ptr [esp+1C], ebp
    * Reference To: Storm.ExpFn0223()
    |
    :15011537 E8C4670000 call 15017D00
    :1501153C 8D842430010000 lea eax, dword ptr [esp+00000130]
    :15011543 6804010000 push 00000104
    :15011548 8D4C2418 lea ecx, dword ptr [esp+18]
    :1501154C 50 push eax
    :1501154D 51 push ecx
    :1501154E 55 push ebp
    :1501154F 55 push ebp
    :15011550 55 push ebp
    :15011551 8D542428 lea edx, dword ptr [esp+28]
    :15011555 55 push ebp
    :15011556 52 push edx

    * Reference To: KERNEL32.GetVolumeInformationA, Ord:0177h
    |
    :15011557 FF1580B10215 Call dword ptr [1502B180]
    :1501155D 85C0 test eax, eax
    :1501155F 7506 jne 15011567
    :15011561 896C2414 mov dword ptr [esp+14], ebp
    :15011565 EB78 jmp 150115DF

    * Referenced by a (U)nconditional or (C)onditional Jump at Address:
    |:1501155F(C)
    |
    :15011567 8D44241C lea eax, dword ptr [esp+1C]
    :1501156B 8D4C2424 lea ecx, dword ptr [esp+24]
    :1501156F 50 push eax
    :15011570 8D54241C lea edx, dword ptr [esp+1C]
    :15011574 51 push ecx
    :15011575 8D442428 lea eax, dword ptr [esp+28]
    :15011579 52 push edx
    :1501157A 8D4C241C lea ecx, dword ptr [esp+1C]
    :1501157E 50 push eax
    :1501157F 51 push ecx
    :15011580 896C2434 mov dword ptr [esp+34], ebp
    :15011584 896C242C mov dword ptr [esp+2C], ebp
    :15011588 896C2438 mov dword ptr [esp+38], ebp
    :1501158C 896C2430 mov dword ptr [esp+30], ebp

    * Reference To: KERNEL32.GetDiskFreeSpaceA, Ord:0100h
    |
    :15011590 FF1584B10215 Call dword ptr [1502B184]
    :15011596 85C0 test eax, eax
    :15011598 7506 jne 150115A0
    :1501159A 896C2414 mov dword ptr [esp+14], ebp
    :1501159E EB3F jmp 150115DF

    * Referenced by a (U)nconditional or (C)onditional Jump at Address:
    |:15011598(C)
    |
    :150115A0 8B442414 mov eax, dword ptr [esp+14]
    :150115A4 8B942430010000 mov edx, dword ptr [esp+00000130]
    :150115AB 8B4C2424 mov ecx, dword ptr [esp+24]
    :150115AF 8B5C2418 mov ebx, dword ptr [esp+18]
    :150115B3 83E004 and eax, 00000004
    :150115B6 33C2 xor eax, edx
    :150115B8 33C1 xor eax, ecx
    :150115BA 33C3 xor eax, ebx
    :150115BC 33C6 xor eax, esi
    :150115BE 8BC8 mov ecx, eax
    :150115C0 C1E910 shr ecx, 10
    :150115C3 33C8 xor ecx, eax
    :150115C5 6681F9001F cmp cx, 1F00
    :150115CA 740B je 150115D7 // never saw this jump to be taken
    :150115CC 6681F90508 cmp cx, 0805
    :150115D1 896C2414 mov dword ptr [esp+14], ebp
    :150115D5 7508 jne 150115DF

    * Referenced by a (U)nconditional or (C)onditional Jump at Address:
    |:150115CA(C)
    |
    :150115D7 C744241401000000 mov [esp+14], 00000001 // here is the good guy

    * Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
    |:15011565(U), :1501159E(U), :150115D5(C)
    |
    :150115DF 8BBC2440020000 mov edi, dword ptr [esp+00000240]
    :150115E6 8BC7 mov eax, edi
    :150115E8 83E001 and eax, 00000001
    :150115EB 8944241C mov dword ptr [esp+1C], eax
    :150115EF 740A je 150115FB
    :150115F1 396C2414 cmp dword ptr [esp+14], ebp
    :150115F5 0F84CF040000 je 15011ACA


    2) You need to make the program to go to line :

    150115D7 C744241401000000 mov [esp+14], 00000001

    There are many ways to do this. One of them is to nop the previous line :

    150115D5 7508 jne 150115DF

    Write down the offset of the line above. For me it was 115D5. Open storm.dll with your favourite hex editor. Go to this offset and change 7508 to 9090 (NOPNOP). Run the game. It does not work.

    3)Quickly do Start->Run->regedit-OK and search the registry for word "warcraft". Search until you reach the following class :

    HKEY_LOCAL_MACHINE\Software\Blizzard Entertainment\Warcraft II BNE

    There you find War2CD. Double click on it and change the drive letter with installed path on your HDD. Quit regedit and run the game again. It works.

  4. #44
    پروفشنال Morteza_SOS's Avatar
    تاريخ عضويت
    Apr 2006
    پست ها
    577

    پيش فرض

    WarGods from GT Interactive Software CD crack by Static Vengeance

    Requirements
    Hex Editor and Full install
    W32Dasm if you want to follow along

    Once again we set out to remove a CD check from a Win95 game. The whole idea behind
    a "Full install" is you will not need the CD, right? So why do "they" make us get out the
    original CD just for check... oh.. there is the music tracks... it is a CD right... Well I
    can do without the music (I have a radio card in my PC, anyways) so I don't want to have to
    hunt through my CD's for the WarGod CD. So I set out to fix that BUG in this otherwise decent
    fighter game. First you will need to disassemble the wargods.exe to see what's going on within
    the program. As usual, the perferred weapon is W32Dasm with it's usefull menu choices. Once
    you have disassembled the executable (wargods.exe) go up to the title bar and select "Refs"
    from the menu and drop down to "String data references" from there grab the slider bar and
    scroll down to the string "To play War Gods you must close" which is part of the string that
    tells you 'To play War Gods you must close all other CD applications and insert the game CD.'
    Double clicking this string will put you in the middle of the CD check routine. That routine
    looks like this:

    * Referenced by a CALL at Address:
    |:00416F30
    |
    :00416C20 56 push esi
    :00416C21 33C0 xor eax, eax
    :00416C23 57 push edi
    :00416C24 A31C9F4A00 mov dword ptr [004A9F1C], eax

    * Reference To: USER32.MessageBoxA, Ord:0195h
    |
    :00416C29 8B3D4C2A9F00 mov edi, dword ptr [009F2A4C]
    :00416C2F A3189F4A00 mov dword ptr [004A9F18], eax
    :00416C34 A3149F4A00 mov dword ptr [004A9F14], eax
    :00416C39 A3109F4A00 mov dword ptr [004A9F10], eax
    :00416C3E A3209F4A00 mov dword ptr [004A9F20], eax

    * Referenced by a (U)nconditional or (C)onditional Jump at Address:
    |:00416C74(C)
    |
    :00416C43 E888FCFFFF call 004168D0 <-- Goes through WINMM.mci to see if
    :00416C48 8BF0 mov esi, eax <-- there is "cdaudio media present"
    :00416C4A E881670100 call 0042D3D0 <-- does "set cdaudio time format tmsf"
    :00416C4F A158D64A00 mov eax, dword ptr [004AD658]
    :00416C54 8A0D88D64A00 mov cl, byte ptr [004AD688]
    :00416C5A 85F6 test esi, esi
    :00416C5C 7404 je 00416C62
    :00416C5E 84C9 test cl, cl
    :00416C60 7514 jne 00416C76

    * Referenced by a (U)nconditional or (C)onditional Jump at Address:
    |:00416C5C(C)
    |
    :00416C62 6A35 push 00000035

    * Possible StringData Ref from Data Obj ->"War Gods Notice"
    |
    :00416C64 6834A04A00 push 004AA034

    * Possible StringData Ref from Data Obj ->"To play War Gods you must close " <-- Don't want to
    ->"all other CD applications and " <-- see this stuff
    ->"insert the game CD." <-- pop up, right?
    |
    :00416C69 68E09F4A00 push 004A9FE0
    :00416C6E 50 push eax
    :00416C6F FFD7 call edi
    :00416C71 83F802 cmp eax, 00000002
    :00416C74 75CD jne 00416C43

    * Referenced by a (U)nconditional or (C)onditional Jump at Address:
    |:00416C60(C)
    |
    :00416C76 5F pop edi
    :00416C77 5E pop esi
    :00416C78 C3 ret

    Well that was the routine that prints the "insert the game CD" and waits for
    your response. If you hit cancel the game goes into a demo mode and locks out user
    response except to quit the game. That's not what we want... so let's check out the
    routine that calls the above section of code:

    * Referenced by a CALL at Address:
    |:0047471A
    |
    :00416F30 E8EBFCFFFF call 00416C20
    :00416F35 E976FFFFFF jmp 00416EB0

    Now we might as well see what 416EB0 does... so here is that code:

    * Referenced by a (U)nconditional or (C)onditional Jump at Address:
    |:00416F35(U)
    |
    :00416EB0 33C0 xor eax, eax
    :00416EB2 A32C9F4A00 mov dword ptr [004A9F2C], eax
    :00416EB7 A3289F4A00 mov dword ptr [004A9F28], eax
    :00416EBC A3249F4A00 mov dword ptr [004A9F24], eax
    :00416EC1 A3309F4A00 mov dword ptr [004A9F30], eax
    :00416EC6 C3 ret

    If you NOP out the call to 416C20 at 416F30 and let the program fall through to
    416F35 which jumps to 416EB0 (still with me?) the program acts like you hit cancel from
    the "insert the game CD" routine. This just wont do, we want to play the game so it
    should be clear we need to prevent both calls from being made. There is a single call
    to that section from 47471A so it's back to more code snooping.. let's go check it out:

    * Referenced by a CALL at Address:
    |:00473A99
    |
    :00474710 E8BB9AFFFF call 0046E1D0
    :00474715 E89606FAFF call 00414DB0
    :0047471A E81128FAFF call 00416F30 <-- Call the CD check routine
    :0047471F E8EC18FAFF call 00416010
    :00474724 E8C710FAFF call 004157F0
    :00474729 E9B2C9F8FF jmp 004010E0

    There you see at 47471A is the single call to the CD check and there's no type
    of check for any returned value. So search the wargods.exe file for the call and NOP
    it out and give it a try. And it does remove the copy protection. The only thing left
    is to make the edit to file. BTW: This edit works for both EXE files on the CD, one is
    called hi.exe and the other is lo.exe. During installation whichever file is copied,
    based on user input, is then renamed to wargods.exe

    Edit wargods.exe at offset 473,882
    ==================================
    Search for: E8 11 28 FA FF E8 EC
    Change to : 90 90 90 90 90 -- --

    That takes care of Wargod's CD check! Now go watch Pagan shake her ... well you
    know... Once again we ventured into the world of copy protect and came out with a new
    example of how to defeat it. One thing I learned from the old'en days of piracy... if
    it can be loaded into the machine it can be cracked by someone. Copy protection only stops
    the average person and just slows down a cracker. And that's how you get WarGods FiX'ed

  5. #45
    پروفشنال Morteza_SOS's Avatar
    تاريخ عضويت
    Apr 2006
    پست ها
    577

    پيش فرض

    به نام خدا

    دارم مقالات کرک بازی های جدیدی مثل مرد عنکبوتی 3 و ...
    را آماده می کنم تا در اولین فرصت قرار بدم .

  6. #46
    پروفشنال Morteza_SOS's Avatar
    تاريخ عضويت
    Apr 2006
    پست ها
    577

    پيش فرض

    به نام خدا
    هر کدام از دوستان اگر مقالات انگلیسی در زمینه کرک و قفل شکنی دارند در این تاپیک قرار بدهند .

  7. #47
    آخر فروم باز lord_ashkan_z's Avatar
    تاريخ عضويت
    Oct 2007
    محل سكونت
    The Board Black Pearl
    پست ها
    1,129

    پيش فرض

    یه سوالی :

    چرا انگلیسی می زاری؟

    خوب بابا فهمیدیم تو هم آررررررررره ........ البته ببخشید ها ...

    هر چند من هم آرررررررره ولی تا بخوام اینارو بخونم چشام درمی یاد .... مخصوصا پای کامپیوتر ...

    آخه می دونی من سرعت خوندم به گرد تایپ کردنم هم نمی رسه( یه روز بیا ببین چی تایپ می کنم ، تو یه ساعت می تونم یــــــــــــــــــــــــ ــه صفحه تایپ کنم)

    هرچند مشخصه چراانگلیسی نوشتی (چون افراد بی جنبه پراکنده بشن)

    ولی ما سیریش تر از این حرف ایم.من یک کتاب داستان انگلیسی رو درسته خوردمش این که جای خود دارد(نه از این داستان زه پرتی ها ،ها ...
    داستان تقلبی هری قاطر 7 . ولی اون موقـــــــــــــــــع تابستون بود )

    راستی دوتا لینکی که پست اول دادی خرابن من حوصلم نگرفت ببینم دوباره لینک دادی یا نه ...
    Last edited by lord_ashkan_z; 11-01-2008 at 14:48.

  8. #48
    پروفشنال Morteza_SOS's Avatar
    تاريخ عضويت
    Apr 2006
    پست ها
    577

    13 لطفا به عنوان تاپیک دقت کنید .... (:

    یه سوالی :

    چرا انگلیسی می زاری؟

    خوب بابا فهمیدیم تو هم آررررررررره ........ البته ببخشید ها ...

    هر چند من هم آرررررررره ولی تا بخوام اینارو بخونم چشام درمی یاد .... مخصوصا پای کامپیوتر ...

    آخه می دونی من سرعت خوندم به گرد تایپ کردنم هم نمی رسه( یه روز بیا ببین چی تایپ می کنم ، تو یه ساعت می تونم یــــــــــــــــــــــــ ــه صفحه تایپ کنم)

    هرچند مشخصه چراانگلیسی نوشتی (چون افراد بی جنبه پراکنده بشن)

    ولی ما سیریش تر از این حرف ایم.من یک کتاب داستان انگلیسی رو درسته خوردمش این که جای خود دارد(نه از این داستان زه پرتی ها ،ها ...
    داستان تقلبی هری قاطر 7 . ولی اون موقـــــــــــــــــع تابستون بود )

    راستی دوتا لینکی که پست اول دادی خرابن من حوصلم نگرفت ببینم دوباره لینک دادی یا نه ...

    به نام خدا
    اولا سلام ....
    دوما عنوان تاپیک نوشته مقالات انگلیسی یعنی فارسی هرگز اونم در این تاپیک ....
    سوما اینا که دیگه نیاز به ترجمه نداره کافیه برنامه های مورد نیاز کرک را داشته باشی یه کمی هم حوصله فقط کافیه آدرس ها را متوجه بشی بعد آموزش را دنبال کنی هر کجا مشکل داشتی PM بزن برات ردیف کنم ترجمه نمی کنم بلکه راهنماییت می کنم البته اگر بتونم .

  9. #49
    حـــــرفـه ای hakhamanesh's Avatar
    تاريخ عضويت
    Apr 2006
    محل سكونت
    اورجینال کی
    پست ها
    1,424

    پيش فرض

    ممنون ولي اگر بتوني pdf اش كني خيلي خوب ميشه كه بشه دانلودش هم كرد

  10. #50
    پروفشنال Morteza_SOS's Avatar
    تاريخ عضويت
    Apr 2006
    پست ها
    577

    پيش فرض

    ممنون ولي اگر بتوني pdf اش كني خيلي خوب ميشه كه بشه دانلودش هم كرد
    به نام خدا
    سلام ...
    من اینترنتم تا آخر سال نفتی و بنزینیه ولی اگر تونستم به روی چشم براتون پی دی اف می کنم .

Thread Information

Users Browsing this Thread

هم اکنون 1 کاربر در حال مشاهده این تاپیک میباشد. (0 کاربر عضو شده و 1 مهمان)

User Tag List

قوانين ايجاد تاپيک در انجمن

  • شما نمی توانید تاپیک ایحاد کنید
  • شما نمی توانید پاسخی ارسال کنید
  • شما نمی توانید فایل پیوست کنید
  • شما نمی توانید پاسخ خود را ویرایش کنید
  •