One of the primary routes in order to hacking these earlier copy protections had been to any plan that simulates the particular normal CPU procedure. The CPU simulator provides a number of extra features to be able to the hacker, such as the ability to single-step through each processor instruction and in order to examine the CPU registers and revised memory spaces since the simulation works any modern disassembler/debugger can do this. The Apple II provided a pre-installed opcode disassembler, permitting raw memory to be decoded into CPU opcodes, which would be employed to examine what the copy-protection was about to do subsequent. Generally there was tiny to no security available to the particular copy protection program, since all its secrets are produced visible from the ruse. However, as the ruse itself must operate on the initial CPU, in inclusion to the application being hacked, typically the simulation would often run extremely slowly and gradually even at optimum speed.