by George Nicolaou, Glafkos Charalambous - Tuesday, 1 July 2008.
This paper is a guide into better understanding most of the approaches a reverse engineer can follow in order to achieve his goal. Additionally, it includes a number of advices on how to better protect your software against tracing its sensitive information, like serial key checks and authentication procedures. This paper is not about changing anyone’s ideals, it's about people that believe that reverse engineering can create a safer world
Download the paper in PDF format here