Go back one pageReturn to front of my home page

HOW TO HACK on the ZX Spectrum

A complete guide to creating POKEs on the Spectrum, featuring full examples. Devised and written by Richard P Swann.

The HTML conversion of this document was performed by Craig Daines.

Copyright of this document remains with Richard P Swann.

Richard, I hope you do not mind me preserving your work on my web page. I classed it as an important piece of Speccy herritage. If their are any problems and you want your work removed for whatever reason, then please get in touch and I shall be happy to oblige your request.

CONTENTS

WHAT YOU WILL NEED

THE BASIC IDEA
Getting started with hacking

CONVENTIONAL HACKING TECHNIQUES
Forwards trace and backwards trace

EASY LOADING SYSTEMS
Headerless loaders, turboloads and compression

DECRYPTERS
Single decrypter loading systems

ADVANCED HACKING METHODS
Stack trace and interrupt trace

COMMERCIAL PROTECTION SYSTEMS
Bleepload, Ultimate loader, Mikro Gen Loader,
Powerload, Search Loader, Paul Owens Protection System, Speedlocks

EPILOGUE
Scrolling credits etc. etc.

GLOSSARY AND INDEX



[ Valid HTML4.01 ]