What sort of copy-protection does Reaktor use?
Reaktor (like all NI software) requires an authorization that is based on your current hardware. The software generates a “system id” based on your hardware configuration, you send this key to NI (usually over an internet connection, but you can send it other ways as well) and they send you an authorization key that unlocks the software.