www.hackers.applearchives.com
Open in
urlscan Pro
69.48.180.79
Public Scan
URL:
https://www.hackers.applearchives.com/
Submission: On March 18 via automatic, source certstream-suspicious — Scanned from DE
Submission: On March 18 via automatic, source certstream-suspicious — Scanned from DE
Form analysis
1 forms found in the DOMPOST http://service.karelia.com/mailme.php
<form class="contactElement labelsOnTop" action="http://service.karelia.com/mailme.php" onsubmit="return verifyAndSubmitE7C9E80B02FC4A86A15B(this);" method="post">
<div class="hidden">
<label for="contactE7C9E80B02FC4A86A15B-subject">Please leave this field empty:</label>
<input id="contactE7C9E80B02FC4A86A15B-subject" type="text" name="subject">
<br>
<label for="contactE7C9E80B02FC4A86A15B-message">Please leave this field empty:</label>
<textarea id="contactE7C9E80B02FC4A86A15B-message" name="message" rows="3" cols="20"></textarea>
</div>
<p>
<label for="contactE7C9E80B02FC4A86A15B-n_">Name:</label><br>
<!-- text field -->
<input id="contactE7C9E80B02FC4A86A15B-n_" class="fullWidth" type="text" name="n">
<br>
<label for="contactE7C9E80B02FC4A86A15B-e_">Email:</label><br>
<!-- text field -->
<input id="contactE7C9E80B02FC4A86A15B-e_" class="fullWidth" type="email" style="color:#888" name="e" title="email@domain.com" value="email@domain.com" onfocus="dofocusE7C9E80B02FC4A86A15B(this)" onblur="doblurE7C9E80B02FC4A86A15B(this)">
<br>
<label for="contactE7C9E80B02FC4A86A15B-s_">Subject:</label><br>
<!-- text field -->
<input id="contactE7C9E80B02FC4A86A15B-s_" class="fullWidth" type="text" name="s">
<br>
<label for="contactE7C9E80B02FC4A86A15B-m_">Message:</label><br>
<!-- text area -->
<textarea class="fullWidth" id="contactE7C9E80B02FC4A86A15B-m_" name="m" rows="10" cols="80"></textarea>
<br>
<!-- Send Button -->
<input type="submit" class="submit" id="contactE7C9E80B02FC4A86A15B-submit" name="x" value="Send">
<br>
</p>
<div class="hidden">
<!-- CSS URL -->
<input type="hidden" name="a" id="contactE7C9E80B02FC4A86A15B-a" value="http://hackers.applearchives.com/sandvox_Wall/main.css http://hackers.applearchives.com/sandvox_Wall/master.css">
<!-- Site Title -->
<input type="hidden" name="t" id="contactE7C9E80B02FC4A86A15B-t" value="Decicated to the Original Apple ][ Hackers and their Legacy">
<!-- Verification Code -->
<input type="hidden" name="v" id="contactE7C9E80B02FC4A86A15B-v" value="eMp8+xblPuMtj9GbasD7uG5EeQ71sEVemHQ=">
</div>
</form>
Text Content
DECICATED TO THE ORIGINAL APPLE ][ HACKERS AND THEIR LEGACY SITE NAVIGATION[SKIP] * Main * Cracked By * Hacker Organizations * Thanx * The Poets * The Pirate BBS's * Rags SIDEBAR[SKIP] ADVERTISING APPLE ][ RELATED LINKS The Sites in this list contain Apple II and Apple /// related software, manuals and other materials. * Apple Pugetsound Program Library Exchange * A2Central * Willamette Apple Connection * DigiSoft Innovations * Beagle Bros Software Repository * Terry Allen's Apple ][ Site * Virtual Apple ][ * Juiced GS * Take1 Movie Site * The Apple /// Resource HACKER RELATED LINKS These sites are specifically related to the Hacking / Cracking world as it existed in the 1980's. * Crack Screen Gallery on Textfiles.com * Textfiles.com's List of Program Cracks * Computist Magazine * Computist Magazine Mirror #1 HARDWARE HACKING LINKS These links are for those who want their hardware hacks and those who want to know a bit more about hardware hacking. * Hardware Hacking FAQ * Applefritter CONTACT ME Please leave this field empty: Please leave this field empty: Name: Email: Subject: Message: ]MAIN About the Apple ][ Hackers The Apple ][ hackers were born out of a software industry which made it almost impossible to copy a software package, even for the purpose of having archival backups. Most companies also only sent one disk out with the package. There were a few exceptions to this rule but with the popularity of the Apple ][ computers among teens of the time, it meant that there was an entire force of young talent with time to burn. And burn they did, all so brightly, cracking every known scheme produced. Several companies arose from both the need to protect software as well as the need to copy the copy protected software. Companies such as Locksmith, Central Point Software, and magazines such as Hardcore Computist led the way in the charge against the copy protectors. However, even these tools did not go far enough in some cases. Copy Cards such as Essential Data Duplicator and others were created to do bit by bit copies of disks. These were great but that gave way to other schemes which did not follow the norm for the Apple ][. Thus the cracking techniques such as those espoused by the Midwest Pirates Guild and other groups that shared their cracking information became even more important. Many of the efforts to re-crack software today follow many of the same techniques that were used in the 1980's. Of course, now we have better utilities, hardware, and 30 years of knowledge to back up those efforts. As for the copy protectors battles with the hackers, it all bus dissipated when many companies gave up on trying to beat them and only one company sold their software completely without protection. That was Beagle Bros. Others kept pouring tons of money into the copy protection schemes and burning through profits that they had made just to keep up. But that was the fallacy of the thinking of the time. the Hackers won that fight for sure and the proof of that is in these lists. These days, emulators tend to rule the roost as far as running these old games and the actual hardware is not only becoming rarer but is also becoming unstable in some cases. Of course, 30 years on, no one expected the Apple II to be around, much less that a group such as Brutal-Deluxe would actually re-crack dozens of titles, all without crack-screens in order to make them available to everyone. But alas, the skills of cracking software is becoming a lost art but it is an art that is still necessary in order to preserve many of the titles from the 1980's. The Word "Hacker" Unfortunately for those hacks who love their hardware, the word Hacker was associated in the early days as someone who broke software encryption. That usually was a 15 year old kid somewhere in middle america, or misguided youth as many would say. But it was more out an abundance of time and kids that wanted to play a particular game. They would get it, hack it, put their splash screens on the package and give it to all their friends. It eventually became a prestige thing and trying to out do other hackers in getting a particular package to the warez world before anyone else. Cat Furs, AE's, and other pirate BBS's were born out of this cottage industry. Soon Hacking as is was called, was so rampant that the amount of money being spent to stop it was in the millions of dollars. The whole Business Software Alliance thing came about due to it but even that had its own pitfalls. The biggest problem is that it should have been called cracking as that was really what it was. It was cracking codes and protection schemes. But for some reason, no thanks to the media, people had images of Matthew Broderick in War Games. Now the word hacker is forever associated with cracking due to this misperception. Where This Site Came From Chris, Mark & Terry's Apple ][ Home Page was one of the main stopping points for many in the early days looking for Apple II information. Three young Apple programmers, Chris Duke, Mark Fischer and Terry McCurdy were the curators of the site. The three Apple enthusiasts as they called themselves created a page was short, quick and concise, had a cool startup screen back in the late 1990's and early 2000, and they also had a great list of the original Apple II Hackers. This hackers list was originally created in 1996 which marked the 19th Year since the release of the Apple ][ computer. Obviously there had been tons of hacks by that time but most of the great hacks that people remember had been done more than 10 years prior at that point. Chris in 1984 Mark & Terry Now with the 30th Anniversary of the Apple ][ come and gone we have recovered the list they originally made and have put it up in new format so that everyone can access the page. Before you get stomping mad and say it is copied, it has been off the Internet since 2004 and we make no claims over the information. Also we have updated several of the entries and added new ones where information is available. Keep in mind that it is only here as a historical reference. Many of the graphics used here are from the original site but we have added dozens more as we are finding the crack screens on software we use. About Hacking and Piracy Since all of the activities of piracy are illegal, we do not condone piracy nor do we encourage anyone to do it. We made this site out of respect to the history of the Apple ][ and nothing else. (There, that is our disclaimer. Now onto the good stuff). Without further adieu, herein lies the greatest club of hackers ever to grace the face of the earth. This list has been made as complete as possible using the original archives and new information. While many of the people in this list went on to bigger and better things in the computing world, they will be forever remembered for the antics in their youthful endeavors that gave many companies fits and many kids the games they played. If you have any additions or changes to this list, please contact us using the contact form on this page. We also accept screen shots of Hacker screens from known hacked games so please feel free to include them when possible. -------------------------------------------------------------------------------- This site is (R) 2009 from Chris, Mark & Terry's Apple ][ Home Page (no longer online) and Materials written by The Mad Hacker [Back To Top]