One of typically the primary routes in order to hacking these early on copy protections has been to operate a system that simulates typically the normal CPU functioning. The CPU sim provides a number of extra features to be able to the hacker, such as the ability to single-step through each processor instruction and to examine the PROCESSOR registers and altered memory spaces because the simulation runs any modern disassembler/debugger can do this particular. The Apple II provided a pre-installed opcode disassembler, enabling raw memory to be decoded directly into CPU opcodes, and also this would be utilized to examine what the copy-protection was about to do subsequent. Certainly, there was small to no defense available to typically the copy protection method, since all their secrets are produced visible through the ruse. However, because the ruse itself must run on the authentic CPU, in add-on to the software program being hacked, the particular simulation would usually run extremely gradually even at optimum speed.