One of the particular primary routes to hacking these early copy protections has been to any system that simulates the particular normal CPU procedure. The CPU simulator provides a number of other stuff in order to the hacker, like the ability to single-step through each processor instruction and in order to examine the PROCESSOR registers and modified memory spaces as the simulation works any modern disassembler/debugger can do this specific. The Apple 2 provided a built-in opcode disassembler, allowing raw memory to be able to be decoded into CPU opcodes, and this would be utilized to examine just what the copy-protection was about to do next. Generally there was small to no defense available to typically the copy protection program, since all the secrets are made visible with the simulation. However, because the simulation itself must operate on the original CPU, in addition to the application being hacked, the particular simulation would frequently run extremely slowly even at highest speed.