Defeating a 40-year-old copy protection dongle
In a unique case of software archaeology, a researcher successfully bypassed hardware-based copy protection for a legacy RPG (Report Program Generator) II compiler used by an accounting firm. The firm was incredibly still running Windows 98 in 2026 to execute 40-year-old software requiring a physical dongle on a parallel port. By using the Reko disassembler to analyze 16-bit x86 executables, the researcher identified a specific 0x90-byte code segment responsible for dongle communication. Analysis revealed that the routine returned a constant value in the BX register regardless of input. Through brute-force testing within DosBox, the constant was identified as 7606h. Applying a four-byte assembly patch (MOV BX, 7606; RETF) successfully emulated the dongle presence, allowing the software—and its compiler—to run on modern emulators without the original hardware.