Atari's original console for writing software was the Atari 800 XT, a 16-bit machine with two 32-bit processors, first Atari 800 and then 8056. The 8056 CPU was superscalar and from the outset allowed writing more than a single program instruction per cycle, and provided for the emulating of IBM PC compatibles and the instructions soon become quite complex. The Atari 800 was originally meant to be a complementary add-on for the 8056.
The legal status of reverse engineering varies widely around the world. In the United States the 1979 amendments to the 1988 Computer Fraud and Abuse Act make reverse engineering a criminal act under a specific exception. In the EU the exception to copyright laws does not apply to reverse engineering. In many countries cracking of software is illegal because of the former Civil Aviation Authority or customs regulations. The definition of cracking and reverse engineering are regulated in these cases.
The method of encryption and how it is used in most commercial software has proven to be the programmer's strong suit. The individual application designer and, more often, the application packager is often less concerned about security than the programmer of the packager or the unpacking software. Usually the programmer of the packager will not even know that an encrypted copy exists. It would make sense to obtain, unpack and replace such a disk with an unencrypted one. The first record of a DR/P editor in the public domain is a private response to the first letter in the first DR/P verification request . Not surprisingly, the response was to give permission for the program to be cracked. Shortly thereafter Viktor Toth published a program the name of which was the first ever DR/P (after being cracked) in public. While the DR/P protection itself only ran in real mode for MS-DOS, the decompression routine of the DR/P program he wrote could be compiled and run in protected mode with support for 16-bit instructions. 7211a4ac4a