Re: Spore Registration Code Generator 154

0 views
Skip to first unread message
Message has been deleted

Keena Wiegert

unread,
Jul 12, 2024, 6:17:44 AM7/12/24
to probcostwatchduc

I purchased a used hard copy of Spore yesterday for my son. Upon trying to install today I realized there is no Registration Key inside the case. Is there a way I can be issued a Registration Key for it? The game was purhcased along side a full hard copy of CREATURE CREATOR which does have it's manual with Registration Key. I could provide the CREATURE CREATOR Registration Key as a reference of association with this copy of "Spore" the full game if that helps? Greatly appreciate help with this, my 8 year old son has been dying for this game for quiet a while and his little heart is breaking. PLEASE HELP! Thanks!

Spore Registration Code Generator 154


Download https://lpoms.com/2yN1SR



As you mentioned Spore is a used copy, I don't think you will get provided with another key by EA. The code was used by the original owner of the game most likely and if they didn't use it they should provide you with the code.

my spore disappeared from my account , i tried to contact an ea advisor but he said just put all games to display and it will appear but i didnt, i am searching it for days and still you never have an advisor or something that really can do something

Is there any way to get the code re-sent? I'm trying to reinstall my games after a major upgrade and this one game is giving me a headache. Oh, and yes, I have gone round and round and round with trying to find a way to get direct contact, but, frankly, it's like wandering in a maze of twisty passages, all of them alike.

[EDIT] Nevermind. I eventually found my way through the maze and landed on a live chat, but nobody was answering (despite it saying it was less than a five minute wait). I do have the phone number now, though, and I'll call during the week and get them to trace my order. And then I'll copy and save my serial number MYSELF so I never have to do this again.

AND... just as I was about to post this, I logged into Origin again and the Product Code was there! I can assure you that it wasn't there when we started troubleshooting. Oh well, on to the next issue I guess...

This is BS i want my money back you guys ripped me off and i want my money i never recived a registration code and these isnsrtuctions are for windows and i have a Mac. So please give me my money back.

Easier said than done since any serious protection scheme will check values in multiple places and also will derive critical information from the serial key for later use so that when you think you guessed it, the program will crash.

To create a keygen you have to understand the algorithm and write a program to re-do the exact same calculation (I remember an old version of MS Office whose serial had a very simple rule, the sum of the digit should have been a multiple of 7, so writing the keygen was rather trivial).

Some heavily protected application have the code encrypted so that the file can't be disassembled. It is decrypted when loaded into memory but then they refuse to start if they detect that an in-memory debugger has started,

If you know assembler it takes roughly a weekend to learn how to do this. I've done it just some years ago (never released anything though. It was just research for my game-development job. To write a hard to crack key you have to understand how people approach cracking).

Nils's post deals with key generators. For cracks, usually you find a branch point and invert (or remove the condition) the logic. For example, you'll test to see if the software is registered, and the test may return zero if so, and then jump accordingly. You can change the "jump if equals zero (je)" to "jump if not-equals zero (jne)" by modifying a single byte. Or you can write no-operations over various portions of the code that do things that you don't want to do.

There are a few methods used to do this. You can step through the code in a debugger, which does generally require a decent knowledge of assembly. Using that you can get an idea of where in the program copy protection/keygen methods are called. With that, you can use a disassembler like IDA Pro to analyze the code more closely and try to understand what is going on, and how you can bypass it. I've cracked time-limited Betas before by inserting NOOP instructions over the date-check.

It really just comes down to a good understanding of software and a basic understanding of assembly. Hak5 did a two-part series on the first two episodes this season on kind of the basics of reverse engineering and cracking. It's really basic, but it's probably exactly what you're looking for.

A would-be cracker disassembles the program and looks for the "copy protection" bits, specifically for the algorithm that determines if a serial number is valid. From that code, you can often see what pattern of bits is required to unlock the functionality, and then write a generator to create numbers with those patterns.

The serial number you can just extract the algorithm and start throwing "Guesses" at it and look for a positive response. Computers are powerful, usually only takes a little while before it starts spitting out hits.

As for hacking, I used to be able to step through programs at a high level and look for a point where it stopped working. Then you go back to the last "Call" that succeeded and step into it, then repeat. Back then, the copy protection was usually writing to the disk and seeing if a subsequent read succeeded (If so, the copy protection failed because they used to burn part of the floppy with a laser so it couldn't be written to).

I'm sure it's still similar, but they go through a lot of effort to hide the location of the call. Last one I tried I gave up because it kept loading code over the code I was single-stepping through, and I'm sure it's gotten lots more complicated since then.

I wonder why they don't just distribute personalized binaries, where the name of the owner is stored somewhere (encrypted and obfuscated) in the binary or better distributed over the whole binary.. AFAIK Apple is doing this with the Music files from the iTunes store, however there it's far too easy, to remove the name from the files.

"Advertising" means any written or graphic representation designed to elicit enrollment or the sale of goods or services and includes signs, displays, circulars, business cards, brochures, and recruitment materials in print, on air, or online.

"Electrical energy treatments" means advanced practice esthetic services for the cosmetic care of the skin that use electrical energy as applied by skin care equipment used on the epidermal layer. Electrical energy treatments use light, direct current, indirect current, or sound energy, but do not include laser as identified in Minnesota Statutes, section 147.081, subdivision 3, as the practice of medicine.

"Hazardous" means a hazardous substance or harmful physical agent as defined under part 5206.1500, subpart 6, or any substance defined as hazardous in Code of Federal Regulations, title 29, part 1910.1200.

"Lymphatic drainage" means a procedure using a light rhythmic pressure applied by manual or other means to the skin using specific lymphatic manipulations to promote drainage of the lymphatic fluid through the tissue.

"Nursing home" means a facility that is licensed under Minnesota Statutes, chapter 144A, and does not include any attached or adjacent facilities that are not licensed as a nursing home under Minnesota Statutes, chapter 144A.

"Sharps" means any object, sterile or contaminated, that may purposefully or accidentally cut or penetrate the skin or mucosa including presterilized single-use lancets, dermal blades, and razor blades.

"Sharps container" means a closed, puncture-resistant, leak-proof container, labeled with the international biohazard symbol, that is used for handling, storage, transportation, and disposal of sharps.

"Special event" means an event held for any purpose other than the provision of licensed services, where a participant in the event may receive the limited cosmetology services described in part 2105.0410, subpart 2, at a location not in a licensed salon.

"Suite-style salon" means a business under part 2105.0397 specializing in leasing or renting individual rooms or suites to licensees, where the salon license may be carried by the business or where each suite has its own salon license.

"Unregulated service" means those services not defined as the practice of cosmetology under Minnesota Statutes, section 155A.23, subdivision 3, and that are exempt from regulation by the board. Unregulated services are ear piercing; body art; body painting; henna tattoos and permanent tattoos; eyebrow embroidery; eyebrow microblading; permanent hair removal; permanent makeup; tanning by UV radiation and spray tanning units; injectables; services for theatrical, television, film, fashion, photography, or media productions or media appearances; mortuary services; massage; body wraps and lymphatic drainage when performed by a massage therapist; the practice of medicine as defined in Minnesota Statutes, section 147.081, subdivision 3; hair braiding; and threading as defined in Minnesota Statutes, section 155A.23, subdivision 13.

"Work area" means a space where regulated services are provided. A separate work area is created when the service area is partitioned from other salon spaces or work areas by walls at least six feet high and doorways of less than five feet in width.

The practice of cosmetology includes the services defined under Minnesota Statutes, section 155A.23, subdivision 3, and includes all services in subparts 2, 3, and 4. Cosmetology does not include advanced practice esthetic services in subpart 5. Cosmetology practice includes:

The practice of esthiology is the cosmetic treatment of the stratum corneum of the epidermal layer of the skin surface. Esthetic practice includes eyelash technology services in subpart 4 and includes items A to F:

The practice of nail technology is the cosmetic care of the hands, feet, and nails. Nail technician services do not include waxing, eyelash or eyebrow enhancements, or any other esthetician service. Nail technicians must not use any tool or equipment to penetrate the skin.

b1e95dc632
Reply all
Reply to author
Forward
0 new messages