Pirates Spoof Vista's Enterprise Activation - InformationWeek
IoT
IoT
Software // Enterprise Applications
News
12/8/2006
01:15 PM
50%
50%
RELATED EVENTS
CAO Discusses Their Roll & The Skills Needed to Do the Job
Jul 26, 2017
LWhat does a chief analytics officer do each day? To help us answer that question we welcome Dun & ...Read More>>

Pirates Spoof Vista's Enterprise Activation

The software spoofs a Key Management Service server, one of the two technologies that Microsoft debuted last month that let businesses activate a large number of copies of Windows Vista.

Pirates are circulating a hack that lets them activate counterfeit copies of Windows Vista using a spoofed server that Microsoft relies on to make sure enterprises switch on the new operating system.

The software, loaded with the long name of "Microsoft.Windows.Vista.Local.Activation.Server-MelindaGates" is available on several pirate Web sites. It spoofs a Key Management Service server, one of the two technologies that Microsoft debuted last month that let businesses activate a large number of copies of Windows Vista. KMS requires that at least 25 PCs be connected to a corporation's network.

Vista is the first version of Windows that Microsoft requires volume license customers to activate. Besides KMS, the Redmond, Wash. developer also offers Multiple Activation Key, which resembles the retail version's activation process. PCs activated using KMS must reactivate at least once every six months.

The MelindaGates hack uses a VMware image of a KMS server to activate -- and keep activated -- a pirated edition of Windows Vista Business. "Looks like Windows Vista Volume Activation 2.0 is a big bust," wrote a user identified as "clank" on the PirateBay Web site Friday.

Like every edition of Windows, Vista has been plagued with counterfeit copies. Pirated editions with cracked activation keys were posted long before Microsoft officially launched the OS Nov. 30.

However, the Redmond, Wash. developer has gone to greater lengths to stymie counterfeiting, including the overall effort it's dubbed "VA 2.0" for Volume Activation 2.0, which uses a new set of technologies to activate and validate Vista and essentially turn off faux copies.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
[Interop ITX 2017] State Of DevOps Report
[Interop ITX 2017] State Of DevOps Report
The DevOps movement brings application development and infrastructure operations together to increase efficiency and deploy applications more quickly. But embracing DevOps means making significant cultural, organizational, and technological changes. This research report will examine how and why IT organizations are adopting DevOps methodologies, the effects on their staff and processes, and the tools they are utilizing for the best results.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll