Type 4: Softalk Hacker methods
Softalk magazine was not an explicit hacker magazine, such as Hardcore Computing. However, readers with the Hacker Ethic philosophy would write into the Open Discussion section to share code, talk about software modifications, and seek out computer user groups. Early software manufacturers would often inhibit duplication of software, even to serve as an archival backup. New companies emerged, such as Locksmith, which is often discussed in Softalk letters-to-the-editor, meeting the need to protect software and copy copy-protected software. Hackers would commit what some deemed "piracy" for multiple reasons, including fixing bugs, modifying software to better fit their individual needs, and perhaps, just for the challenge. Talented hackers would often distributed "cracked" versions of software, leaving their tags on the home screens.
Manufacturers claimed piracy contributed to "the shakeout" crash that began in 1983. [1] Indeed, manufacturers certainly spent enormous resources on trying to ensure that all software was protected, some even going so far as to create programs that destroy the software if there is an attempt to duplicate it. [2] In response to these attempts manufacturer Don Wilson, of Desktop Computers, declared this a disservice to users who should be able to "fix bugs or enhance the system" to fit their needs. [3] Other manufacturers agreed, including Penguin Software, which published a letter in Softalk's Open Discussion revealing they would allowed archival copies to be made, and Beagle Bros., who sold software without protection. [4]
Manufacturers claimed piracy contributed to "the shakeout" crash that began in 1983. [1] Indeed, manufacturers certainly spent enormous resources on trying to ensure that all software was protected, some even going so far as to create programs that destroy the software if there is an attempt to duplicate it. [2] In response to these attempts manufacturer Don Wilson, of Desktop Computers, declared this a disservice to users who should be able to "fix bugs or enhance the system" to fit their needs. [3] Other manufacturers agreed, including Penguin Software, which published a letter in Softalk's Open Discussion revealing they would allowed archival copies to be made, and Beagle Bros., who sold software without protection. [4]
"CRACK SCREENS" OF PIRATED SOFTWARE IDENTIFYING
WHO UNPROTECTED AND "CRACKED" THE PROGRAM.
REad SOFTALK Letters ABOUT how to hack
Softalk letters-to-the-editor are historic artifacts, and offer glimpses into early computing culture. The letters below about hacker methods appear in Softalk's "Open Discussion" section from 1980 to 1984. These letters are grouped into three sub-categories: software modification, codesharing, and building a hacker community.
Modding
References
[1] Yuen, Matthew. October 1980. "Pirate, Thief: Who Dares to Catch Him?" Softalk Magazine, Volume 1, Number 2.
[2] I.b.i.d.
[3] I.b.i.d.
[4] Hackers. 2009. "About the Apple ][ Hackers." Retrieved October 16, 2016 from http://hackers.applearchives.com.
[1] Yuen, Matthew. October 1980. "Pirate, Thief: Who Dares to Catch Him?" Softalk Magazine, Volume 1, Number 2.
[2] I.b.i.d.
[3] I.b.i.d.
[4] Hackers. 2009. "About the Apple ][ Hackers." Retrieved October 16, 2016 from http://hackers.applearchives.com.