Team Manager is software that was developed by HY-TEK Sports Software which was released in two versions, the Team Manager for Swimming and the Team Manager for Track & Field. Team Manager was designed in order to give its users the capability of having an automated way of tracking the team’s performance as well as the administration part. It also has the capability of allowing its users to manage its team member’s information using the Internet since it is also using a technology that is web-based. Among its several features are its capabilities of viewing as well as printing the rosters of the team which can include the attendance list together with the member’s personal information. It includes an online journal that can be used for printing and storing of schedules, notes and newsletters. Team Manager gives it users the ability to export records, best times, entries and meet results with their Team Stats using the Internet.
Az-Tech Everlock is a disk based copy protection software which can be used for both DOS and Windows programs. The Everlock protection scheme features a master diskette that cannot be copied by any software because it uses a specialized track format on the floppy diskette. The wrapped program that the software features has a combination of encryption and anti-debugger mechanism keeping the cracker away from the true code. Then the wrapped program decrypts itself into the memory where it performs verification if file EV?1.SYS and EV?2.SYS are present with a hidden attribute and contains authentic information.when the copy protection is based on a floppy diskette, the wrapped program also verifies if contents of the 8192 byte sector and a specialize formatted track is present. In hard drives, information from EV??.SYS files is the means for a valid authorization. A program which is the ILE0100.CHK, a zero byte length, deleted file is place in the root directory where it automatically searches all drives, which includes network drives, for valid authorization. When there is failure in validating authorization, the wrapped program will reset all modified system parameters then delete itself out of memory and will exit to DOS.
To be able to open an EV3 file or .ev3, you need to know what type of EV3 file it is. There are two types of EV3 file. One is the new or second generation format of the Meet Event File for HY-TEK Sports Software program Team Manager 5.0 for swimming or TM 5.0, a software that aims to help athletes, coaches and parents to monitor schedules, events and records of entries such as athlete registration, information and attendance, and race records. These information can be shared through distribution of printed forms using the said program or through files [such as HTML] shared through the Internet with formats such as EV3 file. Compared to its older version HYV file, the EV3 file has more parameters. The TM 5.0 requires a minimum of 500 MHZ Pentium, AMD or Celeron computer with 1 GB RAM running on Microsoft Windows XP or Windows Vista. The other software that uses EV3 file extension is EverKey with its Everlock Options File. It was developed by AZ-Tech although the company does not support it to this day. This program helps you to secure your Product and to manage the terms of your license by establishing specific and unique information pertaining to your Product using an Authorization Device called “Rockey†and an Authorization Check for backup and restoration that can be accessed using the “Rockeyâ€Â. DOS and Windows are supported by EveryKey.
Az-Tech Everlock is a disk based copy protection software which can be used for both DOS and Windows programs. The Everlock protection scheme features a master diskette that cannot be copied by any software because it uses a specialized track format on the floppy diskette. The wrapped program that the software features has a combination of encryption and anti-debugger mechanism keeping the cracker away from the true code. Then the wrapped program decrypts itself into the memory where it performs verification if file EV?1.SYS and EV?2.SYS are present with a hidden attribute and contains authentic information.when the copy protection is based on a floppy diskette, the wrapped program also verifies if contents of the 8192 byte sector and a specialize formatted track is present. In hard drives, information from EV??.SYS files is the means for a valid authorization. A program which is the ILE0100.CHK, a zero byte length, deleted file is place in the root directory where it automatically searches all drives, which includes network drives, for valid authorization. When there is failure in validating authorization, the wrapped program will reset all modified system parameters then delete itself out of memory and will exit to DOS.