A complete guide to creating POKEs on the Spectrum, featuring full examples. Devised and written by Richard P Swann.
The HTML conversion of this document was performed by Craig Daines.
Copyright of this document remains with Richard P Swann.
Richard, I hope you do not mind me preserving your work on my web page. I classed it as an important piece of Speccy herritage. If their are any problems and you want your work removed for whatever reason, then please get in touch and I shall be happy to oblige your request.
CONTENTS
THE BASIC IDEA
Getting started with hacking
CONVENTIONAL HACKING
TECHNIQUES
Forwards
trace and backwards
trace
EASY LOADING SYSTEMS
Headerless loaders, turboloads and compression
DECRYPTERS
Single decrypter loading systems
ADVANCED HACKING
METHODS
Stack trace and interrupt trace
COMMERCIAL PROTECTION
SYSTEMS
Bleepload, Ultimate loader,
Mikro Gen
Loader,
Powerload, Search Loader,
Paul Owens
Protection System, Speedlocks
EPILOGUE
Scrolling credits etc. etc.