Unveiling the Pirate Part 1

Unveiling the Pirate Part 1

This was a three part article from ‘The Transactor’ in 1984
This is a very interesting article about copy protection.
It lists the five methods commonly used to protect software as:
l – Diskette protection
2 – Dongle Protection
3 – ROM Protection
4 – Program In ROM Pack
5 – No Protection

DOWNLOAD the four page PDF here: Unveiling-Part1

Leave a Reply

Your email address will not be published. Required fields are marked *