Toggle Menu
 
Challenges
Challenge #1

$100,000 Prize If You Can Prove DOS was copied from CP/M

Zeidman Consulting is offering a $100,000 reward to the first person or persons who use accepted forensic techniques to prove that Microsoft copied MS-DOS source code from DRI's CP/M source code. To apply for this reward, you must send an application to Challenges@ZeidmanConsulting.com. We record the date and time for all applications that we receive. If two or more applications qualify for the reward, the person or persons with the first complete application that we receive will get the reward. We will not be responsible for lost emails, lost mail, or any other circumstances whereby we do not receive an application that was sent to us or receive it after a delay. If we require further information or clarification, then the date and time of your application will be considered the date and time that you fully respond to our request, to our satisfaction. If two or more applications are received at the same date and time, we reserve the right to give the reward to the application that we feel best solves the challenge. Our decision will be binding.

Any submission that is found to violate the laws of the United States or is found to have been obtained in a way that violates the laws of the United States will be automatically disqualified and will forfeit any rewards given to it.

Zeidman Consulting reserves the right to modify these challenge rules at any time.

Go here to download Bob Zeidman's analysis showing that Microsoft's DOS source code was not copied from Digital Research's CP/M source code.

The application must be in PDF format and include the following sections.

Software

It is important that we know how the code was compared. Please provide the following information in your application.

DOS code

  1. Which version of DOS did you compare?

  2. Did you compare source code or binary code?

  3. Where did you obtain this code? If the code is not publicly available, you will need to provide us with a copy so that we can verify your results. You must be able to prove that these files contain legitimate Microsoft DOS code.

CP/M code

  1. Which version of CP/M did you compare?

  2. Did you compare source code or binary code?

  3. Where did you obtain this code? If the code is not publicly available, you will need to provide us with a copy so that we can verify your results. You must be able to prove that these files contain legitimate Digital Research CP/M code.

Forensic Tools

It is important that we verify that the tools you used are accepted forensic tools. To help us make that determination, please answer the following questions in your application.

  1. List all the forensic tools you used for the comparison.

  2. List textbooks where each of these tools has been peer described to find software copying.

or

  1. Attach articles in peer-reviewed academic journals where each of these tools has been described to find software copying.

or

  1. Attach court orders or other court documents where each of these tools has been accepted for finding software copying.

or

  1. Attach signed letters from three computer scientists or practicing forensic engineers supporting the use of these tools for finding software copying, along with their CVs.

Forensic process

It is important that we verify that the process you used is an accepted software forensic technique. To help us make that determination, please answer the following questions in your application.

  1. Describe in detail the forensic process you used.

  2. List textbooks where this process has been described to find software copying.

or

  1. Attach articles in peer-reviewed academic journals where this process has been described to find software copying.

or

  1. Attach court orders or other court documents where this process has been accepted for finding software copying.

or

  1. Attach signed letters from three computer scientists or practicing forensic engineers supporting the use of this process for finding software copying, along with their CVs.

Results

Attach the following documents supporting your results.

  1. Outputs from any tools you used.

  2. A side-by-side comparison of the specific code you believe was copied.

  3. Your detailed reasons for believing the code was copied.

Personal Information

Include your name, email address, signature, and date at the end of the application below this statement:

I declare that the information in this application is true and accurate to the best of my knowledge and belief.

You will receive our response when we have gone through your application.

Challenge #2

$100,000 Prize If You Can Find This Secret Command in DOS

Zeidman Consulting is offering a $100,000 reward to the person or persons who demonstrate or find source code for a secret function in MS-DOS that prints Gary Kildall's name or a copyright notice for Digital Research, Inc. To apply for this reward, you must send an application to Challenges@ZeidmanConsulting.com. We record the date and time for all applications that we receive. If two or more applications qualify for the reward, the person or persons with the first complete application that we receive will get the reward. We will not be responsible for lost emails, lost mail, or any other circumstances whereby we do not receive an application that was sent to us or receive it after a delay. If we require further information or clarification, then the date and time of your application will be considered the date and time that you fully respond to our request, to our satisfaction. If two or more applications are received at the same date and time, we reserve the right to give the reward to the application that we feel best solves the challenge. Our decision will be binding.

Any submission that is found to violate the laws of the United States or is found to have been obtained in a way that violates the laws of the United States will be automatically disqualified and will forfeit any rewards given to it.

Zeidman Consulting reserves the right to modify these challenge rules at any time.

Go here to download Bob Zeidman's analysis showing that Microsoft's DOS does not contain this secret command..

The application must be in PDF format and include the following sections.

Version

It is important that we know which versions of DOS was examined, so that we can replicate the results. Please provide the following information in your application.

  1. Which version of DOS did you use?

  2. Where did you obtain this code? If the code is not publicly available, you will need to provide us with a copy so that we can verify your results. You must be able to prove that these files contain legitimate Microsoft DOS code.

Software

It is important that we have access to any software that you used so that we can verify your results. Please provide the following information in your application.

  1. List any software you used that is required to duplicate your results including version numbers for the software.

Hardware

It is important that we have known the hardware that you used so that we can duplicate your results. Answer the following questions with as many details as possible.

  1. Describe the computer that was used including:

  • Processor manufacturer and model

  • Computer manufacturer and model

Process

It is important that we understand the process you used so that we can duplicate your results.

  1. Describe the process you used.

Results

Attach the following documents supporting your results.

  1. A video of the screen with an explanation of the command and any preparation required.

or

  1. A detailed written explanation of the command and any preparation required.

or

  1. A printout of the code that performs the secret function along with a detailed written description of how the code works.

Personal Information

Include your name, email address, signature, and date at the end of the application below this statement:

I declare that the information in this application is true and accurate to the best of my knowledge and belief.

You will receive our response when we have gone through your application.

LATEST NEWS
Bob Zeidman Earns IEEE Outstanding Engineer Award for Pioneering Contributions to Software Forensics.
Read more...
CONTACT US
10981 Willow Valley Ct
Las Vegas, NV 89135
Tel +1 (650) 741-5809
Info@ZeidmanConsulting.com
S.A.F.E. Corporation
Visit our sister site Software Analysis and Forensic Engineering Corporation, the leading provider of software analysis and comparison tools for IP litigation.Software Analysis and Forensic Engineering Corporation (SAFE) the leading provider of software analysis and comparison tools for IP litigation.
COPYRIGHT INFO