The article which follows explains the operation of the HASP family of software protection keys (dongles) with particular emphasis on the HASPCODE service. Aladdin Knowledge Systems (AKS), the originators and suppliers of this range of products, have made the claim that their keys cannot be emulated in software. This article not only shows this to be a wrong assertion, but also sets out just how to go about collecting information relevant to any HASP key from the executable it is supposed to protect. The reader should note that the information given may not apply to HASP4, the latest generation of keys from AKS. The author will endeavour to establish the nature and operation of the HASP4 keys and report on the findings as they become available. .......