KeyPro production method, roughly three (on the Printer Port) 1. Logic: But because the Printer Port does not provide power supply, it is unable to use general TTL ICs, so this method is less. (But also to make low consumption) Electric logic (ASIC) to make KeyPro protection) 2.EEPROM: Because EEPROM 93C46 series (non-volatile memory) is very power-saving, you can use the signal of Printer Port Output as a power supply, more often. 3. Logic EEPROM: However, the high-foot magic high-feet is a company that makes Keypro, making a low power-consuming logic (ASIC) plus EEPROM, so that the protection of the first layer of first protection method: (more professional ) The logic analyzer is required to record the signal between Printer Port and KeyPro. Separate the "Bulin Digital" and use PAL (programmed logic) to make the same logic. But the general PAL is very power consuming to make you simulate it out. It is not possible to use directly on the Printer Port. You must do a power supply or make a CARD in the slot of the PC on the second protection method: (more simple) You can buy a printer's extension line (25PIN D type The public mother) will pick up the PRINTER PORT of the extension line, one end to KEYPRO. After the first PIN to the 17th PIN, one is removed (it is best to use the soldering iron, because the use of the foot must pick up) If you remove one, you will be separated, and you will be separated. (Because EEPROM (93c46) is an eight foot of the IC, only three Di, Do, Cs add VCC, GND) if The first PIN is separated from the 17PIN, which is very congratulations that you have succeeded 2/3, and then use the four legs to arrange the combination (plus the 18 PIN to any pin for any pin of the 25th PIN. GND to read the information with a filter, if the arrangement does not read it is FFH, and if there is any other information, then once again, please replicate a EEPROM (93c46), follow the just foot pick, Plug in the Printer Port, then execute a program verification, I wish you a third kind of protection method of success: I have been shared with you after it is not successful. (Principles with a way to protect the crack method, it is a bit like it is not yet success)