Unveiling the Pirate Part 1
This was a three part article from ‘The Transactor’ in 1984
This is a very interesting article about copy protection.
It lists the five methods commonly used to protect software as:
l – Diskette protection
2 – Dongle Protection
3 – ROM Protection
4 – Program In ROM Pack
5 – No Protection
DOWNLOAD the four page PDF here: Unveiling-Part1