For all those interested on the list, some of the info(all that I know and have access to) is freely available on my site at http://www.ubasics.com/adam/pic/piclinks.shtml#SECURITY Please note that I do not condone using other's code w/o permission, and I generally regard anyone asking for this info as shady. But it is also important from a programmer's standpoint to know the weaknesses of their tools and products. My personal view is that anything can be obtained if the desire to get it is strong enough. If you honestly think that multimillion dollar corporations (or organizations with the money/time/tools) will be chomping at the bit to get your code, a PIC ain't gonna do it. There is a good bit of info on the above site and the sites it links to about probing techniques, and just about every other method of protecting a chip and how to get past those protections. -Adam http://www.ubasics.com/adam/pic/ (Many thanks to David Tait, as this is a modified mirror of his now gone PIClinks and Archive pages. He's the one that pulled it all together (And I've got only 20 broken links left! :-) I can't believe how well he did at keeping the broken links to a minimum.) zelda wrote: > > hello, > > if u get any infos about that plz contact me .... it's possible, bu > ppl don't want to share ...:( > > regards > > WF AUTOMACAO - KITS EDUCACIONAIS NACIONAIS wrote: > > > I know that's possible to desprotect the PIC16C84... > > > > And the PIC16F84? Is it possible? How? > > > > E-mail me private! > > > > Thanks! > > > > Miguel Wisintainer