>>51066491>apart from EVERYTHINGYea, everything except for the code you're reverse engineering, which is the important part and is largely similar for both platforms.
If you're looking to crack a program, you're typically looking at a couple different techniques in the majority of cases. In simple cases, you need to switch a jump to reverse the outcome of some sort of condition. A slightly more complex case is a key which matches some sort of mathematical solution needs to exist on the system. Hardly ever is the code that performs these checks operating system dependent. Its just plain old x86. Sure, maybe the key file is opened with a different API, but, that is hardly complex on either system. Of course there are many variations on these two license enforcement strategies, but few of them are very OS specific.
If you want to learn, start learning assembly, and start debugging some programs. There are some good books out there (PMA, Secrets of Reversing etc). Also, Lena's reversing tutorials on tuts4u is a good start. More than anything, it just takes practice.