USER MANUAL HACKSTOP ΔΝΝ[ 1 HACKSTOP (HS) ]ΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΔ Synopsis: HackStop (HS) protects DOS COM and EXE files against hacking, analysis, reverse engineering and unpacking. HackStop additionally encrypts COM files! HackStop uses a variety of dif- ferent anti-debugging tricks to prevent hacking of HackStopped programs. HackStop is distributed as Shareware. ώ Have you ever written a program, then found out the next day that your program had been cracked or hacked and uploaded to all the BBB's across the world? ώ Have you ever invested lots of time and money developing a program which you released as Shareware with a registration option? Just to find out that someone made a generic "key" registration program to register your current and future versions of that software? ώ Have you ever invest money in purchasing a copy-protection product like a key-disk or a dongle plug protection to pro- tect your software from being copied by everyone? Then disco- vering the next day a cracked copy of your program on a BBS - even though it was "protected"? IF YOU ANSWERED YES TO ANY OF THE ABOVE, THEN THIS IS WHAT YOU SHOULD TEST: HACKSTOP As you know, everything can be cracked with time. Someday, some wizard out there will figure a way to trace through HackStop's protection. After spending some years, he might find a by-pass method ;-). But all you need to do is request a updated version of HackStop and you will put him back to square one! - He will have to forget everything he did and restart from scratch, because all the routines would be different. We are all sick of those hackers and crackers who steal our soft- ware investments, it's time to do something about it. This program was not written to make money (you can not do this with a share- ware like HackStop), it was written to help the hard working com- puter programmers like yourselves. The registration costs are very low, for the amount of time it took me to develop HackStop. HS.DOC Documentation for HackStop Page 1 1.1 Table Of Contents 1 HackStop (HS)...........................................1 1.1 Table Of Contents...................................2 1.2 Why Should I Choose HackStop?.......................3 1.3 How To Use HackStop?................................3 1.4 Files That Can't Be HackStopped.....................4 1.5 Commandline-Parameters..............................4 1.6 Why Should I Use HackStop?..........................5 2 Technical Notes.........................................5 2.1 How Does An Unpacker Work?..........................5 2.2 How Does HackStop Work?.............................6 2.3 Requirements........................................6 2.4 About HackStop......................................6 2.5 On-Line Compressors.................................7 2.6 More Protection?....................................7 2.7 Protection Against Viruses?.........................7 3 Legal Terms And Disclaimer..............................8 3.1 Disclaimer..........................................8 3.2 Documentation.......................................8 3.3 License - Shareware.................................8 3.4 Distribution Restrictions...........................9 4 Closing................................................10 4.1 Registration.......................................10 4.2 Personalised Versions Of HS........................10 4.3 Updates............................................11 4.4 How to get the newest version of HackStop..........11 4.5 My Address.........................................11 4.6 Enhancements In Future Versions....................11 4.7 Some technical stuff...............................12 4.8 Credits............................................12 HS.DOC Documentation for HackStop Page 2 1.2 Why Should I Choose HackStop? HackStop is designed to encrypt and secure your executable program files by placing a special security envelope around them. To protect a specific file, simply run HackStop on it, and you and your users will never know that it's there unless somebody tries to hack or analyse it. Do not expect to be able to easily trace through HackStop's security envelope with a debugger - advanced debug traps help destroy this option. Furthermore HackStop has different levels of encryption to stop tracing or analysing at- tempts on protected programs. HackStop is the most advanced exe- cutable protection program of its type that you can buy to keep your programs from being altered or reverse engineered! HackStop was written because all the other programs I know have security holes (see below). HackStop is very popular in the under- ground and very often used. To disable any tool that will use a simple 'XOR' technique Hack- Stop has included a simple "mini mutation engine" to ensure that the encryption keys are unique! HackStop uses "memory encryption" - only the current running procedure is unencrypted! After finish- ing that procedure it will be encrypted again with a different key! In the current version HackStop has five (5) layers of en- cryption. HackStop has included code against all popular hacking tools like: ― Generic Unpackers (TRON -p, CUP, UNP, XO, CUP386, X-Tract) ― AutoHack, SnapShot, Intruder, CUNP, TEU & UPC 1.3 How To Use HackStop? The command-line syntax for HackStop is the following: hs filespec [-/options] For example to protect all your COM files in the current direc- tory: hs *.com To protect all EXECUTABLE (COM & EXE) files in the current di- rectory type: hs *.* HackStop will only protect files ending with "COM" and "EXE"! Please note that a file CANNOT be expanded after being protected with HackStop (you can probably think why). So please preserve a backup file until you are sure that the protected file runs cor- rectly. Some incompatibilities may possibly arise with certain files, especially with overlaid EXE programs. For this reason, HackStop can create backup files, see section "Parameters". To make backup files invoke HS with the additionally option "-b". Example: hs *.* -b HS.DOC Documentation for HackStop Page 3 This is all that you need to know before you can really start pro- tecting your program files with HackStop. 1.4 Files That Can't Be HackStopped Files smaller than 68 bytes and COM files larger than approxi- mately 62000 bytes, Windows and OS/2 files cannot be protected by HackStop. The reason for this is that a Windows or OS/2 program is basically a small DOS program that says something like "This pro- gram requires Windows" with a pointer to the actual Windows program. HackStop will automatically detect if a file has a Windows, OS/2 or a linear executable header and does not waste your time trying to protect it. Also -due to the structure of HackStop- files larger than the 600 KB neighbourhood cannot be HackStopped because the entire file has to be able to fit in the memory once when it loads. Please note that files with overlays cannot be HackStopped because the "Load Window" of DOS could now be too small for this file. Also, files with a weird EXE header will not be protected by HackStop for your own safety. Hint: Try to compress such files before HackStop'ing them! If you can compress and run them, you should be able to protect them with HackStop afterwards! You can technically protect files like COMMAND.COM but in my opi- nion it makes no sense to protect DOS system files. 1.5 Commandline-Parameters HackStop can be invoked with the following additional commandline parameters: Parameter Meaning -? -h Display a short help, how to use HackStop. -^ Show HS internal compiler information. -b Make a backup file with the extension ".BAK". Warning, old backup files are overwritten! If you have files with the same filename, but dif- ferent extension, you should use the "-bh" op- tion instead! -bh Make a backup file with the extension ".EHS" for EXE files and ".CHS" for COM files. Warning, old backup files are overwritten! -i Shows a little intro with greetings and other nice stuff - now with Adlib sound! -k Kills the "HSxxMsDos" signature at the end of HackStopped files. You can use this option to fool unpacker tools. This option is only avail- able in the registered version! HS.DOC Documentation for HackStop Page 4 -p Show the release number and the personalised text of HS. Remark: Options are not case sensitive. You can use "-", "/" and "," to introduce an option! Examples: hs -? hs /^ hs *.com ,bh hs *.exe -k hs -i 1.6 Why Should I Use HackStop? HackStop's first concern is security. Do you think compressing your files with PKLITE or something similar is protection enough? A hacker can also decompress a program compressed with PKLITE or LZEXE quite easily. Even if a program is compressed with the sup- posedly "invincible" -E option of the professional version of PKLITE or the "pu" option of WWPack. There are a lot of tools which can do this. I have at least about 30 different unpackers which can unpack PKLITE or LZEXE. I have a batch file (!) which is able to remove protection from COM files added by most of the popular protection tools! This batch file works with all protection programs I have access to, except with HackStop and RCRYPT! After decompressing a compressed program, any hacker can change your program (remove copyright screens, disassemble code, etc...), compress it again, and spread it around. Fortunately, hacking is not quite that rampant, but it still is a possibility and a risk, and it is much better to pay a few "DM" up-front to be safe than to be sorry in the future. Thinking NO software protection program is 100% fool-proof, I am pretty sure this program is a good choice for protecting your programs. This is the main reason, why I first developed RCRYPT for COM files, ROSETINY for EXE files (which requires TinyProg) and then HackStop. ROSETINY is the predecessor of HS, using only one (!) debugger trap and has NO encryption at all! ROSETINY is yet -after being over three years out in the wild- unpackable by any unpacker I know. You can do this by hand, but it's a hard job! ΔΝΝ[ 2 TECHNICAL NOTES ]ΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΔ 2.1 How Does An Unpacker Work? When an unprotection utility (such as X-Tract, TPCX, CUP, XOPEN, UNP or TRON) unprotects a file, it creates a virtual DOS environ- ment for the file to run in until the file finishes decrypting or unpacking itself. When this is done, the unprotect utility "simply" writes what is in memory back to disk. Now you have your unprotected file. The program may use a highly sophisticated HS.DOC Documentation for HackStop Page 5 decryption every time, but all the unprotecting program has to do, is just trace through the decryptor until it gets to the entry point of the host program. Then all encryption is for naught. One of the tricks for fooling unprotection utilities and debuggers lies in the fact that the unprotector must always have control over the HackStopped program in order to stop it when it is de- crypted in memory. If you remove the unprotector's control and subvert it without harming the operating system, you are one step ahead in protecting your programs. 2.2 How Does HackStop Work? To fool unpackers or generic cracking/disinfection programs you must *ONLY* disable single step tracing and breakpoints, that's all! HackStop uses a variety of different anti-debugging tech- niques, therefore ANY unpacker I know will crash when trying to trace through HackStopped programs. This is so effective that even TRON and UNP will crash if they ONLY TRY to determine the type of packer used. For this reason any HackStopped program header looks like ordinary code to confuse all tracing programs like RVK, DE- COM, TBCLEAN, TRON or UNP and all virus scanners using heuristic search methods! The second part of the HackStop header is multiple encrypted to disable setting breakpoints or to disassemble the code. In my opinion it is NOT possible to trace HackStopped programs with a real-mode software program! Additionally HackStop uses op- code and normal encryption, so it could take days to disassemble the code! If you have a program with is able to remove the protec- tion added by HackStop, please send me the program and I will send you an enhanced version of HackStop! 2.3 Requirements The requirements to run HackStop are basically zero: DOS 3.30, an IBM PC with 128 KB, etc... I can run this program on my 8 MHz XT and I have done much testing of HackStop on even this lowest com- mon denominator type of machine, to make sure that HackStop will run on every type of computer from 8088 to Pentium Pro and beyond. 2.4 About HackStop HackStop is written entirely in assembly language (MASM 6.0 + macros + ASM libraries). I have written and tested HackStop on my Pentium 90, 486 DX 4/100, 486 DX/50, 386 DX/40, 386 SX/16 and on my 4.77/8 MHz "turbo" XT. Furthermore I have tested HackStop on more than 30 different machines with different DOS and Windows versions. HackStop's anti-debugging techniques (which uses the same anti-debugger macros like ROSETINY, CHKPC or HMS) has been around for over five years, with many people pitching in ideas to make it more secure. If you have any suggestions, questions, com- ments etc. about HackStop, you can contact me. See address below. HackStop adds something in the neighbourhood of 2300 bytes to the average, depending on the program type (COM or EXE) and released version. If you ever have programmed in assembler you will know that more than 2 kilobyte of anti-debugger code is a lot of stuff to trace through! HS.DOC Documentation for HackStop Page 6 Note that HackStopped programs require DOS 3.30 or better (is there anybody using DOS 2.x?). HackStop keeps the time and date stamp of the files the same after HackStop'ing as it was be- forehand. 2.5 On-Line Compressors You do not need to have an on-line compressor, but you are STRONGLY recommended to use one because it garbles the program and makes it harder to modify or to patch. Please note that Hack- Stopped COM files normally are no longer compressible due to the strong encryption! I strongly recommend to compress COM files be- fore they are HackStopped. This makes it harder to attack them af- terwards. COM files are generally easy to hack, because they fit into one segment and have no relocations. If you have the choice between COM and EXE file type, choose EXE files, they are safer! For this reason an additional program (COM2EXE) is included in this package to convert COM files to EXE. You can protect COM files with HackStop - convert them with COM2EXE and protect them again with HackStop. This adds a two- level security envelope around your file which makes the hacking a little bit harder. 2.6 More Protection? I suggest first to compress your program with your favourite com- pressor and then protect it with HackStop (see above). All utili- ties to check files for compression will fail on COM files because they are encrypted! I have not encounter a program with is able to recognise compression on HackStopped EXE files... BTW, some popular online compressors like WWPack, Pklite, LZEXE or Diet put a signature into the exe-header. If HackStop finds this signature it will replace it with "HS". I think COM files do not need ANY further protection, because COM files are encrypted too! EXE files can be compressed and scrambled using ROSETINY. ROSETINY is yet unpackable/unhackable! After Hack- Stop'ing them you can be sure NOBODY is able to debug or hack your programs! 2.7 Protection Against Viruses? HackStopped programs are immunised against the standard Jerusalem (1808) virus family (for this reason all hackstopped programs end with the sign "MsDos"). Additionally tracing viruses like Happy_Shiny or DAME:Trigger will hang the system if they are try- ing to infect programs protected with HackStop. If you need addi- tional protection use a file shield like VSS, F-Xlock or FileShield. The basic idea behind this philosophy is that you are able to protect, scramble or compress HackStopped programs fur- thermore after adding HackStop to them. It may be possible for a protected program to set off some anti- viral programs that have heuristic abilities. This has not hap- pened to my knowledge (they cannot seem to trace through the de- HS.DOC Documentation for HackStop Page 7 cryption algorithm) but some are (AVP, Suspicious and Toolkit) set to alert the user if they detect a decryption algorithm at the be- ginning of a file's execution. So far, however, none of the heuristic programs I have tested seem to be able to identify the decryption algorithm as being such. TBSCAN did not indicate any heuristic flag! ΔΝΝ[ 3 LEGAL TERMS AND DISCLAIMER ]ΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΔ 3.1 Disclaimer HackStop basically has no legal guarantee and warranty because I do not want to get sued over it, and should be used "as is." Here is the official disclaimer: HackStop ("program") does alter executable files and may have or cause compatibility problems with them (that is why YOU should keep a backup file, in case of incompatibility with a particular file) in certain cir- cumstances. Under no circumstances may ROSE, Ralph Roth ("author") be held liable or accountable for any damage to system files, executable files, data files, or any other system or data damage due to use or misuse of his program. The author also may not be held accountable for loss of profits or for any other damages incurred by the use or misuse of his program. The author has forewarned any users that damage to files may occur with use or misuse of his program, and in executing the program, the user fully understands these risks and this disclaimer. 3.2 Documentation Information in the documentation is subject to change without no- tice and does not represent a commitment on the part of ROSE. 3.3 License - Shareware The supplied software contains NO public domain program(s). The program and all accompanying documentation are Copyright (c) 1994- 97 by ROSE. All rights reserved. This software and accompanying documentation is protected by the Copyright laws of Germany. Any use of this software in violation of Copyright law or the terms of this limited licence will be prosecuted to the best of our ability. The conditions under which you may copy this software and documentation are clearly outlined below under 'Distribution Restrictions'. HackStop is distributed as SHAREWARE. You may use HackStop for the purposes of evaluating it (after understanding the disclaimer and the documentation) for 60 days. No files protected by HackStop during this trial period may be distributed to OTHER computers at all, commercially or non-commercially. If you find HackStop to be of use to you, you must register HackStop with the author. HS.DOC Documentation for HackStop Page 8 ROSE hereby guarantees you a limited licence to use this software for evaluation purposes for a period not to exceed sixty (60) days. If you intend to continue using this software (and/or its documentation) after the sixty (60) day evaluation period, you must make a registration payment to ROSE. Using this software af- ter the sixty (60) day evaluation period without registering the software is a violation of the terms of this limited licence! You shall not use, copy, emulate, clone, rent, lease, sell, mo- dify, decompile, disassemble, otherwise reverse engineer, or transfer the program, or any subset of the program, except as pro- vided for in this agreement. Any such unauthorised use shall re- sult in immediate and automatic termination of this licence. All rights not expressly granted here are reserved by ROSE. 3.4 Distribution Restrictions As the copyright holder, ROSE authorises distribution by indi- viduals only in accordance with the following restrictions. The package is defined as the entire file either as 'self ex- tracting executable' or an 'archive' as distributed by ROSE. The authenticity of the package can be verified by contacting ROSE or using the program CrCheck. The original archive is packed by RAR, using its AV check. If the package is changed in any way, the dis- tribution is forbidden. Please contact ROSE to obtain a complete package suitable for distribution. You are hereby granted per- mission by ROSE to copy the package for your own use or for others to evaluate, ONLY when the following conditions are met: ώ The package - including all related program files and doc- umentation files - CANNOT be modified in any way and must be distributed as a complete unchanged package, without excep- tion. Small supplements to the package, such as the introduc- tory or installation batch files are acceptable. This should always be done by supplying EXTRA files, never by altering the package (file) as distributed by ROSE. ώ No price or other compensation may be charged for the pack- age. A distribution cost may be charged for the cost of the diskette, shipping and handling, as long as the total (per disk) does not exceed US$ 10. The package CANNOT be sold as part of some other inclusive package, nor can it be included in any commercial or non-commercial software packaging offer, without a written agreement from ROSE. ώ ROSE prohibits the distribution of outdated versions of the package, without written permission from ROSE. If the version you have obtained is over twelve (12) months old, please con- tact ROSE to ensure that you have the most current version. ώ The package, program(s) or documentation cannot be 'rented' or 'leased' to others. If you wish to add any of our packages to a CD-ROM or other collection, please check the release date of the version you have. If the version is over twelve (12) months old then please contact ROSE to ensure that you have the most current version. ώ If you would like to distribute the package as a 'Disk-of- the-Month', or as part of a subscription or monthly service, then you must contact ROSE in advance to ensure that you have the most current version of the software. Only current ver- sions may be shipped as 'Disk-of-the-Month' disks. HS.DOC Documentation for HackStop Page 9 ώ You may not list any of my products in advertisements, ca- talogues, or other literature that describes this product as 'FREE SOFTWARE'. This is 'Try-Before-You-Buy' software, it is not free! ΔΝΝ[ 4 CLOSING ]ΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΝΔ There is no doubt that HackStop can save you time, effort, energy and money. There are NO "run-time fees", "royalties" or anything of the type attached to the cost of HackStop. You can protect and distribute as many files as you want with HackStop ONCE YOU REGIS- TER. The cost is DM 30,-- per copy of HackStop. Please use the file REGISTER.DOC to order a registered version of HackStop! Please send the register form to my address, even if you have transferred the money to my bank account, because our address will often be unreadable on checks! 4.1 Registration There is almost no difference between the registered and unreg- istered version of HackStop except for the "beg remark" and the ASCII remark in HackStopped programs, saying that it is an UN- REGISTERED SHAREWARE version. The registered version of HackStop has a different 'data offset',other antidebugging macros and dif- ferent protector length, so programs protected with the Shareware version will always differ from the registered versions! Additionally the registered version of HackStop supports the switch "-k" to remove the HackStop signature. Along with register- ing HackStop you will receive the newest currently available ver- sion of HackStop! To register your copy of HackStop please print out the file REGISTER.DOC. Additionally with the registered version of HackStop you will re- ceive the newest versions of ROSE COM Crypt/286, ROSE EXE Cryptor (REC) and ROSETINY (Freeware) as well as beta versions of HackStop or other file protection tools, if available! German users will additionally receive some bonus antivirus programs in German writ- ten by ROSE Softwareentwicklung. I always try to put as many pro- grams as possible (packed with RAR) on the disc containing HackStop... 4.2 Personalised Versions Of HS You can obtain a so called "personalised" version of HS. The dif- ference between the normal version and this version is that your copy of HS carries your name and address or an advertising slogan. For this reason personalised HS versions will produce hackstopped programs with a different length and a different offset that means that they are harder to attack than the registered (standard) or Shareware version. COMMERCIAL USE OF HACKSTOP REQUIRES A REGISTRATION! Please note: Some user want to have a "personalised" string like: (C) by SuperSoft etc. Please do not use "(C) by" or "Copyright by" because this is confusing who has developed HackStop. :-) If you want, you can include up to 6-10 lines of text into your person- alised version! You can send us your text logo to be included in HS.DOC Documentation for HackStop Page 10 HS.EXE. There is also a version available with no text. This makes the envelope a little bit smaller and harder to detect. 4.3 Updates I am sure that I will make enhancements to HS in further releases. You, as a registered user, can order then the newest version of HS for half price. 4.4 How to get the newest version of HackStop First take a look at the file ROSEBBS.TXT - it contains BBS addresses providing new HackStop version for downloading. There is the possibility to get the newest Shareware version of HackStop directly from ROSE Softwareentwicklung. How does it work? If you want to get always the newest programs from me send an email to rar@fh-albsig.de - Subject: HS Dist. List - My handle: I will send you then most of the new programs (all the English ones plus my virus scanner VirScan Plus in German). Encoded is the mail with uudecoded and packed with RAR 2.00. The RAR archives should carry an AV marker signed by "ROSE Softwareentwicklung, Ralph Roth, Germany". The email length is between 40 KB and 600 KB - remember this will not work with some email gateways, especially with FIDO gateways. If you decide to leave the automatic distribution list, you must send me another email - Subject: Remove me from the HS Dist. List - Your handle The adding and removing from the HS Dist. List is done manually by hand. So do not be surprised if you will not be added or removed immediately! Please note that this email account is temporary - from one day to the other it will not longer exist - so if you want to send me normal mail first try my FIDO email address. Address see below or you can find it in the files REGISTER.DOC and ROSEBSS.TXT. 4.5 My Address ROSE Softwareentwicklung Dip.-Ing. (FH) Ralph Roth Finkenweg 24 D 78658 Zimmern Germany E-Mail address, meanwhile invalid?: rar@fh-albsig.de If you got NO response from that E-Mail address try my Fido address: Ralph_Roth@p2.f2101.n246.z2.fidonet.org HS.DOC Documentation for HackStop Page 11 (Fido: Ralph Roth 2:246/2101.2) Check the file REGISTER.DOC for my FAX address! 4.6 Enhancements In Future Versions If there is enough interest (registrations!) in HackStop the fol- lowing features could be implemented: ώ Relocation and encryption of your EXE files (remember COM files are encrypted!). A prototype already exists (REC) which I use to protect HS.EXE and COM2EXE.EXE! ώ Enhanced encryption of the HackStop header using a mutation engine. I think there is no need for this - if you register you will get RCC (ROSE's COM Crypt) which makes use of a mutation engine. ώ Virus selfchecking of COM and EXE files (optional). ώ Password protection of HackStopped COM and EXE files (optional). ώ Optional 80386 checking of HackStopped programs. 80386 anti debugger code. ώ More traps and different debugging macros. ώ Handling of Win 3.x (NE) and Windows 95/Win-NT (PE) EXE programs. Thank you for evaluating HackStop and actually reading the documentation! Happy HackStop'ing! All improvements and sugges- tions will be welcome! If you can hack HackStop, please send me the unpacked files back! 4.7 Some technical stuff With version 1.11, HackStop adds a signature to programs protected with HackStop. You will find at the last 9 bytes at the end of the file the following code: "HS", verhi, verlo, "MsDos" "verhi" and "verlo" are the version numbers of the used HackStop program. If you have used version 1.11 then verhi is 1 and verlo is 11. Some C code: printf("Version used: %i.%02i", verhi, verlo); Note that you can remove this signature with the "-k" switch in the registered version of HackStop! 4.8 Credits I would like to thank and send "greetings" to the following peo- ples for pitching in ideas and doing beta testing of HS: ώ Ben Castricum (author of UNP) ώ Christian Ghisler (author of Win-Commander) HS.DOC Documentation for HackStop Page 12 ώ Marquis Soiree - Top hacker of UCF - Greetz dudes (contact me)! Write a generic HS unpacker next time! ώ Peter Hubinsky (Sysop SAC BBS/SAC ftp) for being the first distributor of HackStop world-wide. ώ Rafal Wierzbicki & Piotr Warezak (authors of WWPack & BSQ) ώ Ralph Biedermann (sysop of LionBox/Germany), all the sysops distributing HackStop! ώ Stefan Kurtzhals (author of SSC) ώ Vrt‘kSoft - J. V lky & L. Vrt‘k (authors of TraceLook). THX guys for pitching in so many ideas in HackStop. ώ Willi Marquardt for antidebugging tricks and for hacking HS. ώ KA0T/Rand0m, X-Adi, UCF - Ohne Worte Jungs! Mehr dazu im Intro! ώ Walter Gabor for correcting the docs. ώ Andreas Marx, J.H. Dinges & Grischa Brockhaus for finding bugs. ώ All I have forgotten to mention: Run HS.EXE with the option "-i" /* the end */ HS.DOC Documentation for HackStop Page 13