Article Summary (Model: gpt-5-mini-2025-08-07)
Subject: Parallel Port Dongle Bypass
The Gist: The author reverse‑engineered a 1990s RPG II MS‑DOS compiler locked by a parallel‑port dongle. Using Reko to disassemble the executables he found a compact (~0x90‑byte) port I/O routine that probes LPT1 via the BIOS data area and returns a magic value in BX. Because BH was constant (0x76) the author patched the routine to set BX=7606h (after brute‑forcing BL = 0x06), verified the patched compiler emits dongle‑free binaries, and plans to scrub PII and publish the artifact.
Key Claims/Facts:
- Small self‑contained check: The copy‑protection is a single ~0x90‑byte far‑call that performs IN/OUT on the parallel port (reads BIOS Data Area for LPT1) and returns its result in BX.
- Deterministic bypass: BH is fixed at 0x76 so only BL varies; the author brute‑forced BL (256 values) and patched the routine with MOV BX,7606h; RETF to bypass the check.
- Compiler‑level injection: The RPG compiler copies the same routine into compiled programs, so a patched compiler emits executables that no longer require the physical dongle.
Discussion Summary (Model: gpt-5-mini-2025-08-07)
Consensus: Cautiously Optimistic — readers applaud the technical sleuthing and software‑archaeology rescue, but many note the protection’s simplicity and highlight legitimate vendor/maintenance tradeoffs.
Top Critiques & Pushback:
Better Alternatives / Prior Art:
Expert Context: