`Ba ~A;a^ zNaJf&a^f a fa fa fa fa tf` g aPa"aHAAJaa` jaJf$A;CzapAra ?f A<a`aJg /faBf6` :8Dk*CAag$CAba|f/A@CAR <da f _pNuA?pNuJaHa*<EfC7`f<BfC7`X<RfC7aJC7`B<VfC7`4<MfC7`&<Df,C7C7xaC7\"C7"C7X"C7N`<FfC7T`<KfC7Jak m`ް<LfC7.`<AfC7$`<XfC7`<CfC7`<SfC7`<NfC6ak (m`x<JfC6`d<Pf C6aHC6a@C@\aHC6"`F<GfC6`2<Hf8C6a&k. 2g" EkS-v'~x.re%sn(˅.>%onY) ^Z\m=8o>:'~j>xaOA*[25I>A:IAu^%A U)/L~mc=V$;VUSqۀaVb *8< `dcFLa8*y_@ڴ<FEi»JPˀr:3)IQf(#oFzk#.k/fR6Mɚ|\r%'>Y6=^WVPy^*^1aKPf6o[Ut#"N()g#20NK$NSuIsPyh,^=.[e#س^%fe gI:3za:+v.M,_z1N6M7Ӯ#$S'~g,.N +' 4FBF2ԅopOB_ph`G^Licu0UhQ(_|lO>a"8|6[\ؖ?M\ɑ6*P_9K ҩ31z=pq"Ct.g`nYSꒋD΄΄PG΄D?΄@g΄MV΄P:΄Y8΄Xˆ΄x@B΄`΄:2r΄8΄T2x΄΄҆΄΄9΄*V΄΄g΄ԩ΄F\BrDQ:8D5waA5Jg A- pNupNu":-"zA5lPA- :-kHr :-Vk, :A6<"z-za A5Hk$ :-,jf3NuT aA-V pNupNuprtv z-NAXJLNuH`?/?<6rtakn(0rtak 0" Iap/0a: k f"p`pLNuH8(pa.k 6" IaZ/0a k f"p`pLNuH@"( R f$B / ( ha _/pf r o hpLNuH@ ( g" ( ha/pfpJLNuHxNV8D=D=A=B=C-H@ R=@B@=@pA|@nh .gA=AHARA=A0.r @no2.=Aa`f2 ng*0.ng =@0.ЀѮ=|0.n`Jgt4. ngJ AS/B N^JLNuH><<0.2.A .g2.4.J6.8.:.PE nag|Wg0.a,JL|NuH|?????B/?NNOJL>NuH<>xag.`A0RSfpLNuH2<p1@XQ2<4@1ALNu`p   <"< y2afҁra /92NuH|&(p  H@r2RAH@*t l$afւJnpL>JNuH`?Bg??BgB/?<NNOJLNuCopylock ST (c)1988-90 Rob Northen Computing, U.K. All Rights Reserved.H?a": k& <aʒ/a zC" <":dj C < aC <a,H a|*HC <aaC. <a(HC: <ap BEB$aa N aFk| akraEr :kBB :k$EV4aaE,*ܹE:%Fa <ak :rj ( z!@ :atfpa":JLNu :gC2gC < a :(kC <a :k :j Cpal`"Cpa` :@ :@pa*C #@C"CT <a&CT" :j C p a` :gC pa!@` C pa :kH :tjCj <a`2E$C <aaF :BkE$C <aNu :6kE%zb :k $z%@ :%@ :k* $z%@ :6к%@ :g 5|,<%@E%z :%@ :кaF%@5|B :%@ :g 5|"|%@ :kRj :%@"z )Щa"%@ :"кҩ Һfo a%@NuH :"k zA0<":jR0QLNupC x0aREF4"g0Sf0aRNuH :k* :k$C JYr2:g0SfJYaM`H?pLNu/ LL,:,zNuH>a"H0akn/0/0/L<99^FFFݹEH( aN!@!@$z EGff EG&&ımpE$a:L|JNuHC>r SSfg2NqSfaZ/9$@Ab AF#$LjFdNqNqNqNqNqMH@AL0.z.F#$LNuNsNsNsNsNsC A @g,A >g"A <g|gNu $fBNuA,#HNu"z"HA!I1@ACp"Q :Zg A0#!@Nu,o<FFFݹNsNqNqNqH瀀| y (й o # (й hGfNLNsHz#M .N{ g"o# Yf`"Yf gBYf-LOLXOWNsHz #JHHz/<NMPOLJHHz# ONz/@<N{.HL/</</</</</</</</</<#$|\$]$BB/</</</</</</</</</</</</</</</</</</</<# #$ $P>ak a6Jfa.aJfJj RQa`3>2 L``YO0<a.0<a"k.d<m"p2< KQLOf 2<Q,XONu K2< <R0QNua&a:ka2Nu0k aJg JgaPNuR raDNu"<YI<a4NuH 3a|a0<ap3C r$ /NuprG?<8lG@H33Jg?<aJf 8<g*pr0H2@8IAAa` < fNuxNut`0< ht<gt<fa&NuxNuRa<<  g<<g 8fNuxNugRNuxNut`RP0`@@`aAB 8P H8JNNANPDF@N`@H8pHD@NqFH@NpNsNwNuPNrQ0H@JN@NvJNX...//,/V/\/////////////0 /008./0^0d//0h/0t0.0000d//0//1.11B1v.//100.0/\/0.////..../0d..//,/V./..0.   H@(ep(aټCd4"iNLNu2a.@a|o|fH@J@f 8<gaHH@00?<@00?< ------------------------------------ PROTECT Options ( = decimal number or hexadecimal if preceded with $) /E = encrypt only (no checking for key disk) /B = is a binary file /R = create re-enterable code (68000 instructions only) /V = don't test that system vectors point to rom /M = leave drive motor on after use (less delay) /D = create key disk checking code /F = examine both drives for a key disk /K = length of encryption code in K (=>3) /L = length of to encrypt in K /A = relocation address (binary files only) /X = execution address (offset from relocation address) /C = length of memory to clear from end of program in K /J = address of code to JSR to during program decryption /N = address to write key disk serial number to /S = contents of status register on entry to code /P = protect boot sector, n=first unused sector on key disk /G = serial no. to be used to protect /H = test screen frequency, 50=PAL only, 60=NTSC only Error on command lineKey disk not foundError loading fileError saving fileNot a GemDos fileError reading boot sectorError writing boot sectorBad boot sector checksumNot enough memoryIllegal instruction found at offset $Error encrypting file press a key to exit`F