9. Understanding Copy Protection

TODO: Not sure where to put this (perhaps in the intro? Different goals of reverse engineering? or perhaps as a part of the next section?) In any case, it should describe common methods to copy protection, and how it basically boils down to a conditional check in your program (with possible a little decryption). Basically it comes down to chosing betwen presenting techniques and then discussing how to use therm, or first discussing how we can us the techniques we are about to discuss.. Which is better?