The Wiert Corner – irregular stream of stuff

Jeroen W. Pluimers on .NET, C#, Delphi, databases, and personal interests

  • My work

  • My badges

  • Twitter Updates

  • My Flickr Stream

  • Pages

  • All categories

  • Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 1,308 other followers

Archive for the ‘6502’ Category

For everyone who still loves and uses old computers.

Posted by jpluimers on 2017/11/13

For everyone who still loves and uses old computers.

Quite a few nice products for your vintage Apple II, //e and //c machines.

Posted in //e, 6502, Apple, Apple I, Apple ][, History, Power User | Leave a Comment »

6502 CPU replacement board: more on how to repair 6502 systems.

Posted by jpluimers on 2017/07/17

I love the idea of a 6502 CPU replacement board: more on how to repair 6502 systems.

Read the rest of this entry »

Posted in 6502, History | Leave a Comment »

Warning: C64 geek pr0n! A Mind Is Born

Posted by jpluimers on 2017/04/20

Geek pr0n on the C64:

Making a demo in just 256 bytes would be a formidable challenge regardless of platform. A Mind Is Born is my attempt to do it on the Commodore 64. In the absence of an actual 256-byte compo, it was submitted to the Oldskool 4K Intro compo at [WayBackRevision 2017, where it ended up on 1st place.

Source: [WayBackA Mind Is Born



Read the rest of this entry »

Posted in 6502, C64, Commodore, Development, History, Software Development | Leave a Comment »

Please Help Us Track Down Apple II Collections « ASCII by Jason Scott

Posted by jpluimers on 2017/04/03

Conditions are very, very good right now for easy, top-quality, final ingestion of original commercial Apple II Software and if you know people sitting on a pile of it or even if you have a small handful of boxes, please get in touch with me to arrange the disks to be imaged.

For example, piles and piles of educational software has returned from potential oblivion, because it’s about the preservation, not the title. Wonderfully done works are being brought back to life and are playable on the Internet Archive.

In other words: if you have or know someone who has disks with original, uncracked software that cannot be copied easily, let the team at the WayBack machine know as they have the resources that can help preserve that software.


Source: [WayBackPlease Help Us Track Down Apple II Collections « ASCII by Jason Scott

Posted in //e, 6502, Apple, Apple ][, History, Power User | Leave a Comment »

Interesting historic read of notes on end 1970s Apple SSAFE project – how it started and ended

Posted by jpluimers on 2017/02/27

This appeared a few days back: [WayBack

It’s about “Software and Security from Apple Friends and Enemies” an early exchange of ideas and possibilities for DRM in the Apple ][ and Apple III era.

I got it via my RSS subscription, but it has been over the net in quite a few other places as well:

I think the most important quote is from the one on reddit, submitted 20170223 by vadermeer  for which I added some WayBack/ links:

[WayBackFound Internal Apple Memos about copy protection for Apple II, SARA, LISA(self.VintageApple)

Yesterday at the Seattle Goodwill Outlet, where everything is sold by the pound, I noticed the Apple logo on letterhead sticking out from a bin of books, so I started digging. What I found were the 1979-1980 files of Jack MacDonald, manager of system software for the Apple II and /// at the time

They tell the story of project “SSAFE” or “Software Security from Apples Friends and Enemies.” This was a proposal to bring disk copy protection in-house to sell as a service to outside developers. Inter-office memos, meeting notes and progress reports all give a good idea of what a project lifecycle was like. Different schemes and levels of protection are considered, as well as implementation primarily on the Apple II+ and the upcoming SARA (The Apple ///) and Lisa computers. [WayBackRandy Wigginton is featured prominently throughout, along with mentions of Woz and many other familiar names.

The documents were all a jumble so I’ve put them in chronological order and scanned the collection, please enjoy. []

The reddit thread is very nice reading as it explains how close we are now to this Level 1:

Level 1. Totally secure. Absolutely no method of stealing the software. 100% effective. Note that the ideal, level 1, is achievable only through disallowing any access of any kind to the software and the computer. Not very practical in our circumstances.

and this one from boingboing:

It’s so neatly packaged and well-documented it could be a Harvard Business Review case-study.


Posted in 6502, Apple, Apple ][, History, Power User | Leave a Comment »

%d bloggers like this: