

















				  K E Y   D I S K


			     Protect soft against copy

				    version 3.6







				    USER MANUAL









       Version for compatible PC XT, AT, PS

       Also available in French.








       Developed by BTI Software - Borland Partner.
       6 avenue Victor Hugo 13600 LA CIOTAT FRANCE


       (C) COPYRIGHT 1990-1997 by BTI

       ALL RIGHTS RESERVED
 



	Author rights

	Copyright 1990-1997 All rights reserved.

	This software is protected by both French Copyright
	law and International treaty provisions.

	You can't use this software without infringing the
	copyrights, if you or your employer have not signed the
	attached Licence Agreement.


	Trademark Acknowledgements

      . KEY-DISK is a trademark of B.T.I Software.
      . TURBO-PASCAL is a trademark of Borland International.
      . BORLAND-PASCAL is a trademark of Borland International.
      . DELPHI is a trademark of Borland International.
      . MS-WINDOWS is a trademark of Microsoft Corporation.
      . MS-DOS is a trademark of Microsoft Corporation.
      . IBM is a trademark of Inter. Business Machines Corp.
      . COPYWRITE is a trademark of Quaid Software.

   




    CONTENTS


    Chapter 1 - GENERALITIES
       INTRODUCTION
       CONVENTIONS
       PRODUCT SERIES
       SOFT EXAMPLES
       PACKAGE
       INSTALLATION
	 SINGLE COMPUTER
	 NETWORKS
       COMMAND LINE
       RECOMMENDATIONS
    Chapter 2 - STANDARD KEY PROTECTION
       KDINIT
       KDRUN
       KDDEMO
    Chapter 3 - DATE-COUNTER PROTECTION
       KPINIT
       KPINST
       KPINSTAL
       KPCODE
       KPMAJ
       KPRUN
       KPDEMO
    Chapter 4 - EXECUTABLE PROTECTION
       KEXEINIT
       KEXEINST
       KEXERUN
    Chapter 5 - GET A LICENCE
       USER LICENSE
       LICENSE ADVANTAGES
       FOR MORE INFORMATIONS

    APPENDIX
       FAQ
       GLOSSARY

      I


   Chapter 1:

   GENERALITIES


      INTRODUCTION

   Welcome in KEY-DISK version 3.6!

   KEY-DISK is an easy, multimedia, powerful and economic package against
   soft copy: floppies HD 5"25 or 3"5, CDROM, hard drives & networks, made
   for all IBM PC and compatibles users.

   With it you control yours soft spreading, create evolutive demo versions,
   modulate versions, hiring versions, & obtain substantial benefits.

   Characteristics of the present version are:

   * a  serious protection : KD  hold out all soft copy  (tested with
     success on all soft copy we know), Copywrite include. Without the key
     protection specifications, we also can't duplicate it. If you find a
     soft copy that works on KD, we shall do ours best to solve the problem,
     and if not, and if this soft copy is former to Key-Disk we shall refund
     your unused keys (except shipping and handling).

   * a  transparent protection : end-users must not be uneasy about it
     (only avoid format). In case of uninstallation the hard drive is put
     back in its original state. No additional hardware necessary, no soft
     compatibility problem.

   * an  optimised protection : ours units & libraries are very compacts,
     they use very little RAM memory (stack & heap).

   * a  personalised protection : softs, and procedures are unique for
     each user (except generic version).

     Parameters are numerous:  install counter ,  limit dates ,
      use counter ,  uninstall type ,  network counter ,
      update counter (with password)  ...

   * an  international protection : key procedures only returns optional
     warnings (in French language). You can create yours own.

   *  No Royalties  on yours soft.

   *  No special floppies . floppy keys can be modified many times.
     Supports floppies HD  3"5 1.44 Mo  &  5"25 1.2 Mo  (except WIN NT).

   * a width choice for the number of key.

   * a  fast execution  owing to the use of the structured Pascal
     language and Borland compilers (BORLAND PASCAL/DELPHI).

   * an  on line help  contextual and by topic is available at every
     moment (F1 & ^F1 respectively).

   * Works on MSDOS 4.0 to 7.0, WINDOWS 3.x & WINDOWS 95. The KP multimedia
     version works also on WIN NT 4.0 (for other versions or systems, contact
     us)

   * Ours  Key-Disk Demo pack is very small : It holds on a single floppy HD,
     and use only 2 or 3 Mo of yours hard drive (full package).

    PROTECTION STANDARD & DATE-COUNTER 
   * KEY-DISK procedures are available as TPU, TPP, TPW, DCU
     Borland Pascal/Delphi/Delphi95 units, as libraries DLL DPMI,
     DLL WIN3.x, DLL WIN95 (and NT if multimedia), and as runtimes. For
     DLL & Runtime, if available, the interface sample is supplied in yours
     language (by default, the sample will be in Borland Pascal).

    PROTECTION OF EXECUTABLES  (N.D. on WIN NT)
   *  Directly protects executable (DOS/DPMI only)  (.EXE).
     KEXEINIT creates directly protected floppies for yours soft.
     They can be install & uninstall on hard drive.

      FIN INTRODUCTION


      CONVENTIONS

    UPPERCASE  command name or file name.
    [n1,n2]    validity domain (n1 & n2 include).
    ]n1,n2[    validity domain (n1 & n2 exclude).
    (n1)       default value.
    {p1}       optional parameter.
     p1	       necessary parameter.
    MAJ1/MAJ2  application menu (MAJ1), followed by a sub-menu (MAJ2).
    *	       any number of characters.
    ?	       one character.
    #	       one numeral [0,9].
    .	       separate a real between its entire part and its decimal part

      FIN CONVENTIONS


      PRODUCT SERIES

      Ours different products can be divided differently:

      - PROTECTION TYPE:
       .  Standard key protection : string key (KDSK)
  You can use the string key as you want.

  Option KEYWRIT: procedure to modified floppy keys directly from yours softs.
  With it you can make different apparatus as, for example: use counter,
  install counter, date control, update control ...

  Option KDD: procedures for hard drive installation, to read and write hard
  drive keys, and to uninstall keys.


       .  Date-counter protection : programmed key (KP)
  with it you control setting, limit dates, access counter, update counter,
  network counter & update by phone ...

  Option KEYMEDIA: procedures to create directly hard drive key. With it you
  can distribute freely with no limitation, unchainable demo version of yours
  softs on all supports, especially by CDROM, BBS, Servers, Web sites,
  Internet, E-mail...

       .  Executable protection : programmed key (KEXE)
  protects directly yours applications without source modification.

       Note:
       * you can install all ours products in a same directory,
       but do not mingle single computer & network versions.


      - PROTECTION LEVEL:

      . Generic protection: economic version (KP multimedia only)

      The date-counter protection with keymedia Option is available as
      generic version. Follows differences with the Standard version:

	ADVANTAGES:

      + its very attractive price.

      + its hold over payment (you have not to buy keys immediately)
      You have all procedures to create freely with no limitation,
      unbridable demo version of yours softs that can be distribute on all
      supports, especially by CDROM, BBS, Servers, Web sites, Internet,
      E-mail, etc ... You pay only when you get yours first customers, and
      for theses ones only: we shall give you an install code allowing you
      to install (in a same way), yours softs at yours customers's place.

      Per contra, you can't test the libraries: you must have key install
      codes for that (to test the product use ours demo version).

       DISADVANTAGES:

      - protection slightly weakness: the customer number is the same for
      all the owners of this version. To differentiate yours keys, you must
      use random number keys (ex: 32745), use several keys, control every
      parameters, and limit the install/update trial number of yours softs.
      For example, if you authorize 3 trials, the unscrupulous customer
      (that have the same generic version as you), will have 3 chances on
      65535 if you install one key (9 chances on 4294836225 if you install
      two keys ...) to effectively install the complete version of yours
      soft, or afterwards to modify the counter or the limit date of yours
      program.

      So far the key is not installed, ours procedures return a particular
      error code (err n4), that you only have to test to manage yours soft
      as a demo. After install, the error code is null.

      - possible install problem: you can't install yours soft (err n7) if
      an another customer (or yourself) has already install the same
      directory a generic key with same number. For this, we recommend you
      to install yours softs in specific directories.


      .  Standard protection : basic version.


      .  Personalised Protection : special versions.

 /  strongest floppies key 
  Floppy keys are better protected. But, all computers can't create them,
  we shall if necessary provide you.

 /  strongest hard drive key 
  Hard drive keys are better protected. But, you must not reorganize them:
  Defrag is not supported (if necessary, you have to uninstall keys).

 /  moveable hard drive support 
  Allows to use hard drive keys on different computers (displacement
  from one central unit to another without key uninstall, and reinstall),
  as also the computer mother card substitution.

 /  others implementations : contact us

      - NETWORKS CONTROL:
      .  Version single computer :
 Softs protected by Key-Disk can only be used on local hard drive.

      .  Version networks :
 Softs protected by Key-Disk can be used from remote drive.

  Date-counter key  allows you a network protection more sophisticated:
 you can limit the simultaneous users number (network counter).

      - LICENSE TYPE:
      .  limited version :
 You can protect a limited number of floppies.

 K*INIT softs (menu and command line), test existence of a precedent key
 on floppies to protect. If detected, counter key is not decremented (you
 can test & rewrite floppy keys).

      .  illimited version :
 The number of key is not limited. The price of Updates (corrections,
 improvements, new fonctionnalities) is equal to the price of the
 personalized compiling & maintenance.

      .  distributor version :
 It's an illimited version, with possibility of supplementary modules
 (limited in number of key) for mass duplication by sub-contractors
 (ex: with duplicator robots).

 By command line options, K*INIT softs can protect automatically (without
 manual mediation) floppy keys in mass. The operation result is return in
 the exit code (see KDW.BAT, KPW.BAT, KEXEW.BAT).

 Duplicators can after the application copy, install the key protection, and
 verify its validity.

      FIN PRODUCT SERIES


      SOFT SAMPLES

     -  protection against copy 
      You control yours soft executions (installed or not on network) for
      internal or external use (executable, library, macro, add on...).

    -  protection by password 
      You can use the string key to stock password and to change it as
      you want. So, you can control the copy and the access.

     -  limited version 
      You can limit the period and/or the access number (totally or in part).
      Then, by phone if yours customers want it, you can upgrade the demo
      to a full version.

     -  version with different modules 
      You can limit the functions. Then, by phone, if yours customers want it,
      you can add some.

     -  statistic on yours softs 
      Number of use totally or by period, time between two access (minimum,
      average, maximum)...

     -  soft hiring 
      You can hire soft (with materials or not) with payment by period and/or
      payment by counter (ex: access counter, printed pages counter, treatment
      counter ...).

     -  data protection 
      To protect yours confidential data against copy, you can crypt, and use
      ours key to uncrypt them.

      FIN SOFT SAMPLES


      PACKAGE

     Confirm the package contains:

   * floppy 5"1/4 HD or 3"1/2 HD (softs, samples).
   * this on-line user manual (printed version optional).

   The key access procedures are available as runtimes, as libraries
   DLL DPMI/WIN3.x/WIN95 & NT, and as units TPU,TPP,TPW,DCU BORLAND
   PASCAL / DELPHI / DELPHI95 (all versions).

   If you order several libraries, the library BORLAND PASCAL/DELPHI you
   wish to use must be rename in first.

    Sample: COPY K*.T70 K*.TPU  -> rename the unit for TP 7.0

   Depends on your programming language, you can:

   1) soft WINDOWS 32-bits WIN 95 (and NT if Multimedia):
   - use ours units Delphi 2.0 (DCU32)
   - use ours dynamic libraries Windows (DLL WIN32).

   note: units & libraries 32-bits need K?RUN32.EXE

   2) soft WINDOWS 16-bits (ver 3.1 to 3.11 WorkGroups):
   - use ours units Borland Pascal Windows 7.0/Delphi 1.0 (TPW/DCU).
   - use ours dynamic libraries Windows (DLL WIN16).

   3) soft DOS/DPMI (ver 4.0 to 7.0):
   - use ours units (TPU/TPP) Borland Pascal DOS/DPMI.
   - use ours dynamic libraries Dpmi (DLL DPMI16).
   - use ours runtimes & interfaces (K?RUN & K?RTI).

   Note: what ever is yours choice, protected executables works on all
   systems from MSDOS to WINDOWS 95 32-bits, and they can share a same key.
   The KP multimedia version works also on WIN NT 4.0 (NT keys are specific
   & not compatible with the others).


      FIN PACKAGE


      INSTALLATION

       system configuration

    - computer compatible IBM PC XT/AT/PS2.
    - processor 8086 or more (80286 if DOS protected mode or Windows).
    - system MS-DOS 4.0 to 7.0 (WINDOWS 95) or WIN NT 4.0
      (for other version or system, contact us)
    - hard drive.
    - floppy drive 5.25" HD or 3.5" HD.
    - and optionally a mouse compatible Microsoft/Logitech.

       fin system configuration

       Installation on single computer

      To install KEY-DISK on hard drive in the directory you want, put the
   master floppy in a floppy drive, and strike A:INSTALL (or B:INSTALL).

      When you install a commercial version, it's safe to erase the demo
   version to avoid bad handling (demo version can damage yours floppy key).

       FIN Installation on single computer

       Installation on networks

      Do as for installation on single computer but on a local hard drive,
   then take into account the following network particularities:

   - For network version the key installation is only available on the
   server (not on remote hard drive). The reading, writing, and the
   uninstallation are possible from all station & terminal.

   - each station (server include), must define (in the AUTOEXEC.BAT)
   its station number by the command:

   SET KD_POSTE=xxxx   where xxxx=station number (0000 to 9999)

       FIN Installation on networks

      FIN INSTALLATION

      COMMAND LINE

   To know ours soft command line parameters, strike the soft name followed
   by /help (or /?).

   sample: KDINIT /help -> shows command line options.

      FIN COMMAND LINE


      RECOMMENDATIONS

   * Modifies yours application  documents :
   You must inform the end-user yours application is protected against
   copy by Key-Disk, and advertise about Key-Disk protection consequences.
   Modify yours application documents on the following topics:

   - the protected application needs an IBM PC (or compatible 100%), an
     operating system MSDOS 4.0 to 7.0 and/or WINDOWS 3.x to 95 or NT,
     a floppy driver HD (5" or 3"), and an install procedure.

   - to defrag a protected application hard drive unit, use preferentially
     tools furnished with Microsoft operating systems (DEFRAG.EXE &
     SCANDISK.EXE).

   - you can't move, nor reformat a protected application hard drive
     (without previously uninstall the key).

   - the user must not "play" with the date system.

   * Reenforce yours application  security :
   To fight against hacker and reverse engineer, we recommend to insert debug
   tests, and integrity tests with Key-Disk libraries.

   * Reenforce yours application  transparency :
   To reeforce the protection system, we recommend to create yours own coded
   warnings.

   WARNING:
   Key-Disk libraries use already these technics. To debug yours soft with a
   debugger (ex: Turbo Debugger), you must first disconnect temporarily the
   protection system (don't forget the 'uses' identifier if it's a Pascal
   Delphi unit).

   But, you can run yours protected programs statement by statement with
   your programming language (Key-Disk procedures accept it).

      FIN RECOMMENDATIONS

   FIN GENERALITIES



   Chapter 2:

   STANDARD KEY PROTECTION

    KDINIT

      This soft allows  standard  key protection on floppies (pack KDSK)
      and hard drives (pack KDD), version for single computer or networks
      (key is controlled by ours libraries).

      All attempts to pirate the system can destroy it. Thanks to warn yours
      customers.

      A direct use by command line is also possible. With it you can
      automatized protected floppies generation (use batch file).


      PATH

      Choice an  hard drive directory  or  floppy drive  to works with.
      The soft verify the validity and existence of the directory. Substituted
      units are accepted (DOS command SUBST).

      The protected soft can't be displaced. If necessary, you must uninstall
      then re-install the key.

      For each customer, 65535 key can be install by hard drive directory,
      and each key can be tested by different softs (what ever they are:
      DOS, WINDOWS 16/32 bits). Each protection is autonomous: you can or no
      install yours protected softs in specific directory. Ours other
      customers can install theirs protected soft in same directories as you
      (but not recommended, softs & data can be destroy).

     notes:
      * protection don't use boot sectors. It's safe, and efficient against
      some anti-virus used as complement to copy soft.
      * supports removable hard drive, but (in standard) key will works only
      on the install computer.
      * supports partitioned hard drive: other partitions are not limited in
      operations (FORMAT command include).
      * supports hard drive defrag: tests certified on MSDOS 6.x and
      WINDOWS 95 tools (DEFRAG.EXE, SCANDISK.EXE). For others, the best is
      to warn yours customers, and to make the necessary tests. If problem,
      contact us.
      * during yours tests, don't forget to note the key numbers & install
      directory, without them you will not be able to erase keys!


      limits:
      * key can't be install in root directory.
      * one only key by floppy (directory don't matter).
      * protected directory can't be displaced or renamed.
      * incompatible with the FORMAT command (if necessary uninstall then
	re-install the key, this takes only few seconds).
      * version WIN NT: key can't be install on floppy.


      FIN PATH

      KEY NUMBER

      Choice the  key number  to use. In one directory, you can install
      65535 keys. To avoid conflict, we recommend to use only one key number
      by application. So, yours customers will have no problem, and you will
      be able to develop & protect 65535 softs!

      notes:
      * record yours application key number to avoid double use. If not,
      the protection will be lessen, and/or the install will be impossible.
      * ours other customer softs can exist in the same directory & with the
      same key number that yours without problem (but not recommended, softs
      & data can be destroy).

      limits:
      * 65535 key by hard drive directory & by customer (1 to 65535).
      * one key only by floppy.
      * if you use KDD & KP libraries together, you must not employ
      the same key number for the two libraries.
      (ex: use [1,30000] for KDD, [30001,65535] for KP)

      FIN KEY NUMBER

      READ KEY

      Read floppy or hard drive key. If problem, the soft warns you.

       possible errors 
      DD/DSK:
      0=ok, 1=err_I/O, 3=bad DSK or DD RAM
      DD only:
      2=path_not_exist, 4=no_key, 9=act_of_piracy

       programming :
      To read floppy or hard drive key, inserts in yours applications the
      keyread command with as parameters the unit & the key number. If
      I/O problem on a floppy, use the keyreset command before all other
      command to reset the drive.

      FIN READ KEY

      WRITE KEY

      Write the key (1 to 20 characters) in the specified directory or unit.

      When you make a new floppy key (except illimited version), you lessen
      the key counter. This counter is shown in the screen upper right corner.

      When you modify a floppy or hard drive key, you don't lessen the key
      counter. To modify an hard drive key, you must first install the key
      from a floppy key (or create it with the module "KEYMEDIA").

      If problem, the soft warns you.

      ATTENTION:
      For string keys, Key-Disk don't control the floppy key number
      (all number is good), it's to you to differentiate yours different
      application protected floppy keys. The best is to insert the key
      number (must be specific to each application) in the key itself.

      notes:
      * verify the floppy is not protected against writing.
      * some floppy marks works better than others.
      * only ASCII characters upper or equal to 32 (space) are allowed.
      * end-spaces are suppressed.

       possible errors 
      DD/DSK: 0=ok, 1=err_I/O, 3=bad DSK or DD RAM
      DD only: 2=path_not_exist, 4=no_key (incompatible), 9=act_of_piracy

       programming :
      To modify floppy or hard drive key, inserts in yours applications the
      keywrit command with as parameters the unit, key number & new key.

      Option "KEYMEDIA": to create directly an hard drive key, inserts in
      yours softs the keycreate command.

      FIN WRITE KEY

      INSTALL KEY

      Install a floppy key in an hard drive directory. For that, the soft asks
      you the floppy key drive unit. Floppy key is left unchange (it's not a
      true installation, but an identical copy).

      If problem, the soft warns you.

       possible errors 
      DSK: 3=available only with KDD unit
      DD:
      0=ok, 1=err_I/O, 2=path_not_exist, 3=bad DSK or DD RAM or remote,
      4=no_key (material incompatible), 7=already_install, 9=act_of_piracy

       programming :
      To install the key from a floppy unit to an hard drive, inserts in yours
      soft the keycopie command with as parameters the source unit, target
      unit, & key number.

      FIN INSTALL KEY

      UNINSTALL KEY

      Destroy an hard drive directory key. This uninstallation is
      irreversible: the key is not re-installed in a floppy (it's not a true
      uninstallation, but a key suppression).

      Floppy key can't be uninstall. If problem, the soft warns you.

       possible errors 
      DSK: 3=available only with KDD unit
      DD:  0=ok, 2=path_not_exist, 3=bad DSK or DD RAM

       programming :
      To destroy an hard drive key, inserts in yours soft the keydeinst
      command with as parameters the unit and key number.

      FIN UNINSTALL KEY

    FIN KDINIT

    KDRUN

    This module allows to implement the standard key protection with all
    programming language. You needs to use ours interfaces or to call the
    module with an exec command (Exec in Borland Pascal).

    limit
    * For writing (option Keywrit), as the key is passed through the command
    line, its must not include the following characters: #32 (space), #60 (<),
    #62 (>), #124 (|) because they are used by DOS. If you want to use them,
    you must use the hexadecimal write option: strike without space the
    hexadecimal code (with 2 numerals) of yours characters key.

    FIN KDRUN


    KDDEMO

    KDDEMOx files are protected soft samples:

    - KDDEMO: key procedure as Pascal/Delphi unit (DOS/DPMI/WIN3&95).

    - KDDEMOL: key procedure as libraries DLL (DPMI Borland/WIN/WIN95)

    - KDRTI: key procedure as runtimes (autonomous executable) for
      all language via ours interfaces.

    FIN KDDEMO

   FIN STANDARD KEY PROTECTION



   Chapter 3:

   DATE-COUNTER PROTECTION

    KPINIT

      This soft allows  date-counter  key protection on floppies and hard
      drives (pack KP), version for single computer or networks (key is
      controlled by libraries).

      All attempts to pirate the system can destroy it. Thanks to warn yours
      customers.

      A direct use by command line is also possible. With it you can
      automatized protected floppies generation (use batch file).

      limit
      * version WIN NT: key can't be install on floppy.

      COMMON MENUS

      Menus PATH, KEY NUMBER, READ KEY, INSTALL KEY & UNINSTALL KEY are the
      same as those of KDINIT.

      note:
      * hard drive install/uninstall key menus don't modify the floppy key
       (it's not a true install/uninstall).

       programming :

      To read floppy or hard drive key, inserts in yours applications the
      keyPtest command with as parameters the station, unit, key number &
      use modality. With this last parameter, you can increase, left unchange,
      decrease the use counter, or update the key. You can also if necessary,
      divide the use counter (nbuse) in several small-counters (cf KD.H).

      If you want to control the network users number, you must inserts in
      the exit procedure of yours application the keyPexit command to
      decrease the network users counter.

      To install a key from a floppy to an hard drive, or to uninstall a key,
      inserts in yours application the keyPinstal command with as parameters
      the station, source unit, target unit, key number, and desired function.

      To suppress a key from an hard drive, inserts in yours applications the
      keyPdeinst command with as parameters the station, unit, and key
      number.

      If I/O problem on floppy, use the keyreset command before all other
      command to reset the drive.

      If problem with the network users counter, inserts the keyPreset
      command to reset the counter.

      FIN COMMON MENUS

      WRITE DATE-COUNTER

      Write a date-counter key in the specified directory or unit.

      When you make a new floppy key (except illimited version), you lessen
      the key counter. This counter is shown in the screen upper right corner.

      When you modify a floppy key, you don't lessen the key counter (except
      if you also change the key number).

      When you modify an hard drive key, you don't lessen the key counter
      (you can make all tests you want). To modify an hard drive key,
      you must first install the key from a floppy key (or create it with
      the module "KEYMEDIA").

      ATTENTION:
      For date-counter keys, Key-Disk control the floppy key number to
      differentiate yours different applications. If you pass a bad key
      number, the floppy will appear as not protected (error n4 no_key).

      If problem, the soft warns you.

       possible errors 
      DD/DSK: 0=ok, 1=err_I/O, 3=RAMDD (if DD) or bad disk (if DSK)
      DD only:
      2=path_not_exist, 4=no_key, 9=act_of_piracy, 10=no_station (if network)

       programming :
      The key use counter, last access date, and network users counter
      parameter are automatically modify when you call keyPtest command
      (except if you use the test mode 'T') (see KP.H).

      Option "KEYMEDIA"

      To create directly an hard drive key, inserts in yours softs the
      keyPcreate command. The "update trial number" (nbmajl) parameter
      control both install trials and subsequent update trials (date or
      counter). Particularity: if nbmajl=0 (1 install trial is authorised),
      if nbmajl=9 (install is possible even is blocked).

      limit
      * by this method, you can install, by directory, in yours customers
      hard drives, only one soft a time (yours install pre-codes are common,
      the last created erase the previous one). If you want to install
      several softs a times (and so give conjointly their install codes),
      install yours softs in distinct directories.


	UPDATE TRIAL NUMBER

      Choice the highest number of trials for an update of the limit date
      and/or the use counter: [0=lock,9=infinite] (6).

      Strike 0 to lock the update procedure, and 9 if you not want to limit
      the update trial number.

      If yours customer fail all trials (by bad update codes), the update
      procedure will be definitively  lock , and you will have to send the
      user an update of yours application by floppies (witch needs to
      uninstall, then re-install all the protected executables).

      Key-Disk gives you 3 update possibilities:
	- easy date limit update
	- date limit update
	- use counter update

      EASY DATE LIMIT UPDATE
      It's a periodic limit date update (annual except the first one): the
      limit date is push away to the end of the following year, and the use
      counter is reset to infinite.

      If you wish to use this protection by date with the counter protection,
      you must update simultaneously the date then the counter.

      Update it made owing to a  secret code  unique variable each year.
      KPCODE soft tells you codes to communicate to yours customers each
      year.

      If you update an hard drive key, for each uninstall / new install,
      yours customer must strike again the update code (or all update codes
      in chronological order if the floppy key has not been update since
      many periods).


      DATE LIMIT/USE COUNTER UPDATE (WITH PRE-CODE)
      Update is made owing an  update code  unique associated with a
       pre-code . KPMAJ soft tells you codes to communicate to yours
      customers.

      Key-Disk ask you the days number or the tokens number to add to the
      active limit date or use counter. The highest value of the limit date
      is the 31/12/2079(=infinite), the highest value of the counter is 99999
      (Key-Disk don't consider supplementary days or token).

      IMPORTANT:
      If you wish to activate the counter protection, simply add tokens.
      In opposite, to cancel the counter protection simply add zero token.
      The soft will reset the counter to zero (counter at 0=infinite).

      notes:
      * If update is a success, the update trial number is reset.
      * to preserve they new rights in expectation of further uninstallation
       / installation, we recommend yours customers to do the update on
       floppy key. This is necessary for updates with pre-code because
       update codes are valid only one time.
      * to update a floppy key, first uninstall the key from all the station.
      * easy update codes are valid for all the installations (see
       install counter ). Update codes with PRE-CODES are specific to each
      installation. They must be use immediately after the pre-code obtention,
      and before all other use of the protected soft, this because pre-codes
      are changed at every access.

       programming :
      Easy date update don't need pre-code, you must only know the
      application actual limit date (we recommend to print it somewhere on
      screen), and use the KPCODE module.

      Date & counter updates with pre-code are more complex. The pre-code is
      given by the keyPmajPcode function that you must include in the
      protected application. Definitive codes are given by the KPMAJ
      module, it can be written upper-case or lower-case.

      KPCODE & KPMAJ modules MUST NOT be in yours customer package.

	FIN UPDATE TRIAL NUMBER

	LIMIT DATE

	ALLOWS SOFT PROTECTION BY DATE

      Choice the limit date: [1/1/1980, 31/12/2079=infinite] (end of year)
      It's the  use limit date of yours soft  (you can strike jj/mm/aaaa or
      jj/mm/aa).

      This date control is robust, Key-Disk implements functions to
      detect if the user had "play" with the system date.

      notes:
      * if you don't want a date protection, strike a space, the soft will
      take 31/12/2079=infinite.
      * if invalid date, soft warns by a beep.
      * date protection is complex, it's not only based on system date
      (the efficiency increase with time). You must warn yours customers
      not to  play  with the date system (due to the last access date,
      they will not be able to go backward).

	FIN LIMIT DATE

	LAST ACCESS DATE

      Choice the last access date: jj/mm/aaaa or aa (today date by default).

      This parameter is used to control the limit date and the  first use 
      date. Customers can't use yours soft at a previous date.

      notes:
      * to select again today date, strike a space.
      * if invalid date, soft warns by a beep.

	FIN LAST ACCESS DATE

	LAST ACCESS TIME

      Choice the last access date: hh:mm:ss (today time by default).

      This parameter is used to control the limit date.

      note:
      * if invalid time, soft warns by a beep.

	FIN LAST ACCESS TIME

	USE NUMBER

	ALLOWS SOFT PROTECTION BY COUNTER

      Choice the highest use number you want: [0=infinite,99999] (0).

      It's  yours soft use limit access  (or the highest value of any
      counter all purpose you want).

      If you strike zero, access isn't limited. Otherwise, It's the highest
      number of use until the limit date.

      notes:
      * this use number applied to all the stations (if install on network).
      * this use number is used in the samples to control soft access, but
      you can use it as you like (access counter to treatment, printer
      works counter...).
      * demo versions are limited to 100 uses.

	FIN USE NUMBER

	INSTALL COUNTER

      Choice an install counter: [0=lock,200=infinite] (1)
      It' the  highest installation number  yours customers can do.

      If you strike zero, the hard drive installation is forbidden. If you
      strike 200, installations are not limited.

      Installation don't erase the floppy key, Sole the install counter is
      increase (it's decrease with install, and increase with uninstall).

      KPINST module allows yours customers to install/uninstall yours soft
      on they hard drives.

      KPINSTAL module allows only yours customers to install yours soft
      on they hard drives (an erase option replace the uninstall procedure).

      notes
      * When you uninstall a key, the active use counter, and the last access
      date-time are written on floppy key so that the user keeps his actual
      rights.

      * the install counter isn't active on the KPINIT Install menu:
      install is always possible (this because, It's a copy, not a true
      installation).

      limit
      As there is only one use counter, yours customers must install yours
      soft on all the stations before a first uninstallation (is not, they
      can lose some access rights). They must also re-install the floppy key
      before another uninstallation (for same reason).

       programming :
      The install counter is controlled by the keyPinstal function.

	FIN INSTALL COUNTER

	NETWORK USER NUMBER

      Choice the highest network users number: [0=infinite,99] (0).
      It's the  highest number of concurrent users  in networks
      (concurrent licenses independent of the stations).

       programming :
      Each new station that access the protected soft is memorised by the
      KeyPtest function (include in KP library). Before exit, you must take
      off the station of the actual user list by the KeyPexit function. If
      for some reason (power cut, fatal error ...), yours protected soft is
      interrupt, at the following execution it will give an error n 12
      (station already active), then will correct the error automatically by
      the KeyPexit function. You can also, if absolute necessity, use the
      KeyPreset function: reset the network user counter to zero.

      notes
      * each station must define an unique station number by the command:
	SET KD_POSTE=xxxx (see yours DOS manual).
      * network protection is limited to 10000 stations (0 to 9999)
	(with 99 simultaneously active for a same protected soft if you
	control concurrent network users).

	FIN NETWORK USER NUMBER

      FIN WRITE DATE-COUNTER

    FIN KPINIT

    KPINST

    This module allows install / uninstall from floppy to hard drive. Each
    install increase the install counter (the opposite for uninstall).

    The install / uninstall by this module (or by KeyPinstal function) acts
    only on Key-Disk key, files & sub-directories of the protected directory
    are not modified.

    To make operations incompatible with the key protection (format or
    displacement), you must just temporarily uninstall the key, then install
    it again (it takes only few seconds).

    note:
    When you uninstall a key, active use counter and last use date-time are
    written on floppy key so that the user keeps his actual rights.

    limit:
    As there is only one use counter, yours customers must install yours soft
    on all the stations before a first uninstallation (is not, they can lose
    some access rights). They must also re-install the floppy key before an
    another uninstallation (for same reason).

     programming :
    For a better protection we recommend to create yours own install
    procedure with keyPinstal function.

    FIN KPINST

    KPINSTAL

    This module allows only the installation from floppy to hard drive.
    Each install increase the install counter (see KPINST). An erase option
    replace the uninstall procedure.

    note
    As the protected soft can't be uninstall, this module offers a better
    protection against copy.

    FIN KPINSTAL

    KPCODE

    This module gives  annual update codes  for easy update. You must
    communicate these each year to yours customers. This soft MUST NOT be in
    yours customer package.

    Easy update codes are valid for all stations (see  install counter ).

    FIN KPCODE

    KPMAJ

    This module gives  definitive limit date & use counter update codes .
    You must communicate these to yours customers (an update pre-code is
    necessary, for this include the KeyPmajPcode function in the
    protected soft). This module MUST NOT be in yours customer package.

    Update codes with pre-codes are specific to each installation. They must
    be use immediately after the pre-code obtention, and before all other use
    of yours protected soft, this because pre-codes are changed at every
    access.

    Update and install (KeyMedia option) can be totally automatised owing
    to the batch command, the code is returned in KPMAJ.COD file. This
    allows the use of robots and servers.

    note:
    * KPMAJ display, with the update code, the present counter & limit date
    of yours installed applications: this allows a cross control (very
    usefull if you forget or don't want to display these informations in
    yours softs).

    Multimedia Option KeyMedia:
    KPMAJ gives install codes (to create directly hard drive key). You must
    communicate these to yours customers (an install pre-code is
    necessary, for this include the KeyPcreate function in the protected
    soft). Each install code request decrease yours key counter by one unit.

    FIN KPMAJ

    KPRUN

    This module allows to implement the date-counter key protection with all
    programming language. You need to use ours interfaces or to call the
    module with an exec command (Exec in Borland Pascal).

    FIN KPRUN


    KPDEMO

    KPDEMOx files are protected soft samples:

    - KPDEMO: key procedure as Pascal/Delphi unit (DOS/DPMI/WIN3/WIN95/NT).

    - KPDEMOL: key procedure as libraries DLL (DPMI Borland/WIN/WIN95/NT)

    - KPRTI: key procedure as runtimes (autonomous executable) for all
      language via ours interfaces.

    FIN KPDEMO

   FIN DATE-COUNTER PROTECTION



    Chapter 4:

   EXECUTABLE PROTECTION

    KEXEINIT

      With this soft you can directly protect DOS executable file (.EXE)
      (pack KEXE, version single computer or networks).

      All attempts to pirate the system can destroy it. Thanks to warn yours
      customers.

      A direct use by command line is also possible. With it you can
      automatized protected floppies generation (use batch file).

      KEXEINIT supports the DOS PATH command that allows to use it from all
      directory (APPEND command is useless if the associated files are in
      the same directory).

      SOFT ID

      Choice the protected  soft ID number  (1 to 65535).
      In one hard drive directory, you can install up to 65535 softs. To
      avoid conflict, we recommend to use only one ID number by soft. So,
      yours customers will have no problem, and you will be able to develop
      & protect 65535 softs!

      notes:
      * record yours application key number to avoid double use. If not, the
      protection will be lessen, and/or the install will be impossible.
      * ours other customer softs can exist in the same directory & with the
      same key number that yours without problem (but not recommended, softs
      & data can be destroy).

      limits:
      * 65535 key by hard drive directory & by customer (1 to 65535).
      * one key only by floppy (key number don't matter).

      FIN SOFT ID


      DRIVE

      Choice a drive where to protect yours floppies.
      You can only select A or B.

      notes:
      * KEXEINIT don't control available space disk. If it's full, soft warns
      you, and you must reduce the number of files to protect, or make a
      temporary stocking on hard drive (see the following).
      * the protected soft must be installed on hard drive to works
       (use impossible from a floppy).

      FIN DRIVE


      INSTALL NUMBER

      Choice the highest install number you want: [1,200] (1 by default)
      It's the  highest number of installation  yours customers can do
      with yours soft.

      FIN INSTALL NUMBER


      LIMIT DATE ACCESS

      Choice the limit date: [1/1/1980, 31/12/2079=infinite] (end of year)
      It's yours soft  use limit date  (you can strike jj/mm/aaaa or
      jj/mm/aa).

      This date control is robust, Key-Disk implements functions to prevent
      users to "play" with the system date.

      notes:
      * if you don't want a date protection, strike a space, the soft will
      take 31/12/2079=infinite.
      * if invalid date, soft warns by a beep.
      * date protection is complex, not only base on the system date
      (efficiency increase with time). You must warn yours customers not to
       play  with the date system (due to the last access date, they will
      not be able to go backward).

      FIN LIMIT DATE ACCESS


      COUNTER ACCESS

      Choice the highest use number you want: [0=infinite,99999] (0).

      It's yours soft  use limit access 

      If you strike zero, access isn't limited. Otherwise, It's the highest
      use number until the limit date.

      notes:
      * this use number applied to all protected executables install in
      one application.
      * protected executables warn the user when there is only 90 available
      uses left.
      * demo versions are limited to 100 uses.

      FIN COUNTER ACCESS


      TEMPORARY STOCKING

      Choice a temporary stocking directory for the protected files.

      You must:

       1) copy these files on blank floppies.
       2) copy again in yours customers install hard drive directory.
       3) finish installation with KEXEINST.

      notes:
      * You can copy a part of these files on the protected floppy (that
      contains KEXEINST). If they are not squeeze, they will be automatically
      install by KEXEINST.
      * It's a peremptory option when the size of all protected executables
      is greatest than the floppy capacity. This option can also be used to
      reduce executable size with compress tools.
      * Owing to this option, you can use ours key protection with the
      installation soft you want (with or not file compression).

      WARNING:
      * Key-Disk erase all executable protected files already in this
      directory and not yet install.
      * If the directory don't exist, Key-Disk creates it.

      FIN TEMPORARY STOCKING


      REVERSIBILITY

      Choice N if you want the uninstall procedure  don't reset the
      install counter . In this case, yours customers will be irreversibly
      limited by the authorized install number.

      It's a supplementary protection against copy.

      FIN REVERSIBILITY


      HIGHER PROTECTION

      Choice O if you want a more sophisticated protection.

      limit:
      * with the reinforce protection, protected executables can only
      access directly to same name file (ex: overlay file .OVR, config file
      .CFG...). For all others, no supposition on they localization can
      be made (use the DOS APPEND command if necessary).

      FIN HIGHER PROTECTION


      FILES TO PROTECT

      Strike the executable names (with if necessary they full path, but
      without the extension .EXE), separate by a comma ,. The soft
      accepts all DOS executable (DOS real mode with or not overlay, DOS
      protected mode). One exception, terminate resident softs (TSR) are not
      supported.

      To speed protected floppies creation, process as this:

       1) run KEXEINIT with temporary executable stocking.
	 (see option "temporary stocking")
       2) run again KEXEINIT WITHOUT executable to protect.
	 (this to create all the protected floppies)
       3) copy the executable file on the protected floppies.

      notes:
      * the highest executable number you can protect depends on they file
      name length. You can write 255 characters (28 executables minimum).
      * the command files .COM can't be directly protect. They must first
      be translate to executable file .EXE. You can use for that many tools.

      FIN FILES TO PROTECT


      EXECUTABLE CATEGORY

      You can only directly protect DOS/DPMI applications.

      In fact, for Windows 16-bit & 32-bit applications, libraries DLL are
      available for all programming language.

      The direct executable protection is not advise because more sensitive
      to act of piracy than an internal protection by insertion in the source
      code of key procedures.

      FIN EXECUTABLE CATEGORY

      VALIDATE KEXEINIT

      Protects yours executable with the selected floppy.

      When you create new floppy key (except illimited version), you lessen
      the key counter. This counter is shown in the screen upper right corner.

      When you modify a floppy key, you don't lessen the key counter (except
      if you also change the soft ID).

      If problem, the soft warns you.

      notes:
      * verify that the floppy is not protected against writing.
      * some floppy marks works better than others.

       possible errors 
      DD/DSK: 0=ok, 1=err_I/O, 3=RAMDD (if DD) or bad disk (if DSK)
      DD only:
      2=path_not_exist, 4=no_key, 9=act_of_piracy, 10=no_station (if network)

      FIN VALIDATE KEXEINIT

      CANCEL KEXEINIT

       Quit Key-Disk.

      FIN CANCEL KEXEINIT

    FIN KEXEINIT



    KEXEINST

   KEXEINST install yours protected soft on customers hard drive.
   It is automatically copied on the protected floppy.

   You control it by command line.

   Use: KEXEINST path {options}
      path = install or uninstall directory (for install: this directory is
      created if not present, for uninstall: it's destroy if empty).
      options:
      /B   = protect on B drive (active drive by default).
      /U   = uninstall the soft (install by default).
       (the uninstall only erase the protected executable, you have to
	destroy the other files).

      ex: KEXEINST  C:\KD    -> install in C:\KD
      ex: KEXEINST  C:\KD /B -> install in C:\KD from B:
      ex: KEXEINST  C:\KD /U -> uninstall the soft from C:\KD

      notes:
      * if you run KEXEINIT with the  temporary stocking  option, you must
      before running KEXEINST, copy the protected files from the temporary
      stocking directory to yours customers install directory.
      * For the protected floppy installation, KEXEINIT control the available
      hard drive space. For the other package floppies, you must control
      yours customers hard drive space yourself.

    FIN KEXEINST

    KEXERUN

    This module is used automatically by KEXEINIT. You must only be sure
    it's in the same directory.

    FIN KEXERUN

   FIN EXECUTABLE PROTECTION



    Chapter 5:

   GET A LICENSE

   To obtains  an user license , return the registration form.

   In registered version, shareware warnings & delays are suppressed,
   and protected hard drives & floppies can be used with no limits by yours
   customers.


       THE USER LICENSE

       If you want an user license you mush accept the license statement:

1 - KEY-DISK can only be distribute in full pack. The number of files, they
contents, the documentation, and the attach elements of the soft must not be
changed. It can't be distribute in a commercial purpose, nor integrated in
other products for the sale without a former author written agreement.
KEY-DISK must be use to protect directly the licence-holder software.

2 - After one month for free-trial, use without license is illicite. At the
issue of this period, you must take a license or destroy KEY-DISK from yours
computer, and not install it again.

3 - Sole the author can attrib user licences. You may not rent or lease the
software, but you may transfer your rights under this Licence Agreement and
a written author agreement on a permanent basis provided you transfer all
copies of the software and all written materials. You may not reverse
engineer, decompile or disassemble the software. You have a royalty-free
right to reproduce and distribute executable files protected using the
software. You may not copy the product manual or written materials
accompanying the software.

4 - KEY-DISK is protected by both French Copyright Law and the International
Treaty provisions. You must use the software program on a single terminal
connected to a single computer (one install by license). The soft upgrade
versions form a sole and same license with the soft they improve.

5 - BTI warrants that the software will perform substantially in accordance
with the product manual, and that the supplied hardware will be free from
defects for a period of 60 days from the date of receipt. BTI's entire
liability and yours exclusive remedy shall be, at BTI's option, either return
of the price paid or repair or replacement of the software or hardware that
does not meet BTI's limited warranty and which is returned to BTI with a copy
of your receipt. This limited warranty is void if failure has resulted from
accident, abuse or misapplication. Any replacement will be warranted for the
remainder of the original warranty period or 30 days, whichever is longer.
BTI disclaims all other warranties, either express or implied.

6 - the author is not responsible for damages that can happen during
installation, uninstallation, the use, the illicite or piracy usage, by the
registered user or somebody else.

7 - Ours optional maintenance contract warrants the good running order of
ours units & libraries only with Pascal/Delphi files given as sample.
In fact, we don't claim & secure ours procedures implementation on the very
numerous & miscellaneous languages available on the market. The assistance
contract will do the best but don't warrant anything regarding the
implementation success of ours libraries with a specific language (except
Borland Pascal/Delphi). The use of ours procedures is on the responsibility
of the customer (he must be aware with the use of libraries). The best is to
test completely ours Demo versions before purchase, to ensure the result with
yours equipment. What ever are the programming problems, ours products are
not refund.

8 - if a license term is judged inapplicable, null or of null effect, the
other terms will remain valid, and the author reserve his rights on all
the rights not-explicitly grant with this licence.

       FIN THE USER LICENSE


       AVANTAGES TO REGISTER

    To become a registered user gives you the following rights and privileges:

  - to receive the last version  totally operational , adjust to yours
    needs, and the right to use it in legality.

  - an  help line support  free for the soft installation.

  - The possibility to obtain a  rectified version  of the soft in ours
    possibility limits (free except shipping & handling)

  - to receive news about  last upgrades , and possibility to get them
    freely during 60 days (except shipping & handling), and after at the
    Update tariff.

       FIN AVANTAGES TO REGISTER


       FOR MORE INFORMATIONS

     If you want more informations on a product, phone, fax or write to
     the following address:

       B.T.I Software - Borland Partner.
       6 av Victor Hugo 13600 LA CIOTAT FRANCE
       tl/fax: 33 (0) 4 42 83 25 10  contact: M. Bleuze

       North agency : BTI 25 Place Jule Guesde  62780 CUCQ-TREPIED FRANCE

       FIN FOR MORE INFORMATIONS

   FIN GET A LICENSE



   APPENDIX

      FAQ

   -  what computer are supported ?
     Key-Disk works correctly on all compatible I.B.M. PC computer.

   -  what exploitation system are supported ?
     Key-Disk supports all systems compatible with MSDOS from version 4.0
     to 7.0, WINDOWS 3.x, and WINDOWS 95 (4.0). The KP multimedia version
     works also on WIN NT 4.0. For other version or system, contact us.

   -  what media are supported ?
     Key-Disk accepts all HD floppies (3.5" or 5.25"), all hard drives, and
     all networks MSDOS compatible (for disk access).

   -  that is the media part used by the key protection ?
     Key protection don't modify the floppy available space, and takes only
     some sectors on hard drives. The associated tools (KPINST, KPINSTALL...)
     are self-reliant, they can be copied in other floppies.

   -  How install & uninstall the protected soft ?
     Library functions and tools to install, uninstall or destroy the key
     protection on a new media are supplied.

   -  Does key protection possibly damage an hard drive ?
     No, because no low-level format command is used. In worse, if the
     uninstall procedure failed (that is theoretically impossible), you will
     loss some sectors. In all case, a new drive FORMAT command will erase
     all trail of protection.

   -  Does the key protection can be shared ?
     Yes, a same key can be shared by different applications, and this
     whatever they are (DOS/DPMI 16-bits, WINDOWS 16/32-bits).

   -  And, what about hard drive DEFRAG command ?
     Key protection supports hard drive defrag command: tests certified on
     MSDOS ver 6.x and WIN 95 tools (DEFRAG.EXE, SCANDISK.EXE). For other,
     the best is to warn yours customers, and to make the necessary tests.
     If problem, contact us.

   -  And, what about hard drive FORMAT command ?
     Key protection will be lost. You must to face it, authorised many
     installs, or supply a new floppy key.

   - And, what about moveable hard drive?
     For the standard single computer version, keys only works on the central
     unit of the install. To transfer an hard drive from one computer to
     another, without key uninstall & reinstall, choice the option
     "Moveable hard drive".

   -  And, what about act of piracy ?
     Key protection is complex: it's made of different sub-keys. If one
     sub-key is altered, Key-Disk procedure warns you by a special error
     code: choice yours adequate answer.

   -  that are the consequences on protected soft ?
     Size of the executable increase (about 100 Ko), and time of load is
     longer of few seconds (for key tests). Except this, and the limitation
     of yours soft to the exploitation systems supports by Key-Disk, yours
     soft has the same performances as previously. To test the key, the
     protection procedures need temporally about 30 Ko of RAM memory (for
     stack), and few dozen of Ko for heap.

   -  It's possible to create rapidly floppy keys ?
     Yes, KDINIT, KPINIT, KEXEINIT line command options & menus allows mass
     production. Distributor versions make possible the use of floppy
     duplicator by a third party.

   -  It's possible to modify by phone the key parameters ?
     Yes, with a secret code you can modify the limit date and the use
     counter.

   -  Is the coexistence of key in a same media limited ?
     Yes, Key-Disk allows only one key by floppy, and 65535 keys by hard
     drive directory. Except these limits all is possible: coexistence not
     limited with keys of other customers, and those of ours concurrents.

   -  with an update of the protected soft do i shall redistribute a floppy
       key to my customers ?
     No, as the key is dependent only of the protected media, you just have
     to distribute yours new application files.

   -  Is Key-Disk protection worth compared to dongles ?
     It exist two methods to pass round a protection system: copy or
     extricate. Against the first, Key-Disk is powerful as dongle (we don't
     find copy soft that works on it, and we warrant the no-copy). For the
     second, as ours protection implementation can be personalized, our key
     is equal and better than dongle. It's for this reason that we recommend
     the use of an internal protection, with call to library procedures,
     than an external one (as a direct executable protection, standard and
     weak method).

      FIN FAQ


      GLOSSARY

   -  ASCII  American Standard Code for Information Interchange
     Standard numeric for character codes.

   -  Batch  ASCII file that contains DOS command.

   -  Bit  smallest unit of computer memory (0 or 1).

   -  directory  element of a full drive path (contains files and/or other
     directories).

   -  DOS line command  line preceded by the prompt sign.

   -  DOS prompt sign  sign that computer send when it's ready to receive
     command. In standard, It's composed by active unit & sign '>' (ex: A>).

   -  exploitation system  soft that control all the computer system
     (interface between computer and applications).

   -  Extension (of file)  last part of file name (1 to 3 characters),
     separate from the name by a dot (ex: name.ext).

   -  external protection  copy protection obtains by call to an external
     server (ex: direct executable protection).

   -  file  combined numeric informations stock on a drive.

   -  Input/Output  exchange between Central unit and device.

   -  intern protection   copy protection obtains by call to internal
     procedure. You must prefer this to an external protection every time
     possible.

   -  Octet  8 bits together (number from 0 to 255).

   -  parameter  application value receive by command line.

   -  RAM  Random Access Memory (see ram memory).

   -  ram memory  space that contains temporary data used by the central
     unit (conventional memory + extended memory).

   -  soft  treatments executable by computer.

      FIN GLOSSARY

   FIN APPENDIX


   PRIVATE NOTES

   You can modify with an ASCII text editor this help file KD.TXT where you
   want.

   But, if you don't want to loose yours modifications & annotations with
   further updates, it's recommended to group them in this section. So, it
   will be easy to save them before update, and reinsert them in the new
   help file KD.TXT.

   FIN PRIVATE NOTES

