The Transactor, Volume 5, Issue 3, November 1984

x×100 x×200 x×400

[Cover Page of The Transactor Volume 5, Issue 3: Software Protection and Piracy] [Advertisement: Pro-Line Software] [Advertisement: Persimmon Peripherals "Helping Hand", a drawing table with two pointer-arms mounted on potentiometers] [Advertisement: Abacus Software] [Article Index] [General Information] [Editorial] [News BRK (1/11)] [News BRK (2/11)] [News BRK (3/11)] [News BRK (4/11)] [News BRK (5/11)] [News BRK (6/11)] [News BRK (7/11)] [News BRK (8/11)] [News BRK (9/11)] [News BRK (10/11)] [News BRK (11/11)] [Letters (1/2)] [Letters (2/2)] [Bits and Pieces (1/5)] [Bits and Pieces (2/5)] [Bits and Pieces (3/5)] [Bits and Pieces (4/5)] [Bits and Pieces (5/5) 
TransBloopers] [Two Reviews: PAL 64 and POWER 64 (1/2)] [Two Reviews: PAL 64 and POWER 64 (2/2)] [The MANAGER Column (1/3)] [The MANAGER Column (2/3)] [The MANAGER Column (3/3)] [Hardware Corner (1/5)] [Hardware Corner (2/5)] [Hardware Corner (3/5)] [Hardware Corner (4/5)] [Hardware Corner (5/5)] [Quadra 64: Edit 4 Programs on Your Commodore 64 Simultaneously with this Fabulous Memory Partitioning Utility (1/2)] [Quadra 64: Edit 4 Programs on Your Commodore 64 Simultaneously with this Fabulous Memory Partitioning Utility (2/2)] [Your BASIC Monitor, Part 2: The Disassembler (1/2)] [Your BASIC Monitor, Part 2: The Disassembler (2/2)] [Picprint: A High-Resolution Screen Dump Utility (1/2)] [Picprint: A High-Resolution Screen Dump Utility (2/2)] [Comparing Two Basic Programs (1/2)] [Comparing Two Basic Programs (2/2)] [Unveiling the Pirate, Part 1: Current Methods (1/4)] [Unveiling the Pirate, Part 1: Current Methods (2/4)] [Unveiling the Pirate, Part 1: Current Methods (3/4)] [Unveiling the Pirate, Part 1: Current Methods (4/4)] [Unveiling the Pirate, Part 2: Programming Sleight of Hand (1/7)] [Unveiling the Pirate, Part 2: Programming Sleight of Hand (2/7)] [Unveiling the Pirate, Part 2: Programming Sleight of Hand (3/7)] [Unveiling the Pirate, Part 2: Programming Sleight of Hand (4/7)] [Unveiling the Pirate, Part 2: Programming Sleight of Hand (5/7)] [Unveiling the Pirate, Part 2: Programming Sleight of Hand (6/7)] [Unveiling the Pirate, Part 2: Programming Sleight of Hand (7/7)] [Unveiling the Pirate, Part 3: The Legal Issue (1/2)] [Unveiling the Pirate, Part 3: The Legal Issue (2/2)] [Piracy vs. Protection: Who Loses?] [Spiffy Listings! (1/2)] [Spiffy Listings! (2/2)] [Collecting: Another View] [Scrambling A BASIC Program (1/3)] [Scrambling A BASIC Program (2/3)] [Scrambling A BASIC Program (3/3)] [Two Password Protection Tools (1/4)] [Two Password Protection Tools (2/4)] [Two Password Protection Tools (3/4)] [Two Password Protection Tools (4/4)] [Disk Defender (1/2)] [Disk Defender (2/2)] [LockDisk: Force RUN on LOAD (1/2)] [LockDisk: Force RUN on LOAD (2/2)] [Drive Protect (1/2)] [Drive Protect (2/2)] [DiskMod: Examine Diskettes Sector by Sector (1/7)] [DiskMod: Examine Diskettes Sector by Sector (2/7)] [DiskMod: Examine Diskettes Sector by Sector (3/7)] [DiskMod: Examine Diskettes Sector by Sector (4/7)] [DiskMod: Examine Diskettes Sector by Sector (5/7)] [DiskMod: Examine Diskettes Sector by Sector (6/7)] [DiskMod: Examine Diskettes Sector by Sector (7/7)] [Advertising Section (1/4)] [Advertising Section (2/4)] [Advertising Section (3/4)] [Comedian 264]