Microsoft's former CEO Ballmer once criticized that 90% of Windows installed on Chinese computers are pirated . Whether the data is wrong or not is not discussed here, but it is a fact that pirated software is rampant in China. Some people are so ignorant about piracy that they cannot tell the difference between genuine and pirated products. Microsoft itself is also responsible for this situation to a large extent. Today, I will talk to you about the topic of Windows system to help you understand what is a genuine system and what is a pirated system. First of all, let's understand the concept of piracy. Piracy refers to the act of making a copy of the copyrighted work or publication by a new manufacturer that is completely consistent with the source code and redistributing it without the consent or authorization of the copyright owner. In most countries and regions, this behavior is defined as an infringement of intellectual property rights and even constitutes a crime, which will be punished by the country where it is located.Pirated CDs and pirated systems have appeared since the Windows 9X era. At that time, Microsoft's anti-theft technology was not mature, and you only needed to enter the product key to activate it . Later, when Windows XP became popular, the activation method was changed to online activation. Although it was a little more troublesome than before, the majority of netizens quickly cracked Windows XP. Since then, although Windows 7/Windows 8 and Win10 have adopted more advanced anti-piracy technology, more sophisticated activation tools have also followed. Some friends will say that there is no difference between the pirated system I use and the genuine system. All functions are the same as the genuine one, so there is no need to buy a genuine operating system. In fact, this idea is wrong. Even if we put aside factors such as morality and law, there are still many differences between pirated systems and genuine systems. They are mainly divided into the following situations: 1. If you used a pirated Windows 7 system to upgrade to a Windows 10 system through Microsoft's free upgrade policy, then the Windows 10 system is still a pirated system. 2. Use GHOST to install the system. The operating system has been modified and packaged into GHOST after cracking. 3. KMS activation, using Microsoft's batch activation loophole for corporate computers to activate. 4. Telephone activation, Microsoft provides "Activation ID" service for genuine users who cannot use the key to activate online due to hardware changes and reinstallation of the system. The above methods are currently the most common pirated activation methods. Although Microsoft has suspended the free upgrade policy for Windos 10, many netizens can still bypass detection by modifying the system time to achieve the purpose of activation. Below, the author will elaborate on the principles of KMS activation and telephone activation, as well as the problems that may arise. Disadvantages of KMS activation method KMS stands for Key Management Service. You may not believe it, but KMS is actually an activation method officially recognized by Microsoft . Reasons for the emergence of KMS: The best way to avoid the activation mechanism for Windows XP and Server 2003 is to download the VOL version or MSDN operating system. Just enter the correct serial number, and some do not even need a serial number. After installation, there is no need to activate it at all. And just run a script program, a free genuine Windows is born. Why can we download the MSDN or VOL version of XP and 2003 so easily? In fact, the MSDN version of the Windows XP series system is the system used internally by Microsoft, and the VOL version is the enterprise version, so neither of them requires activation. However, these versions were eventually leaked, resulting in the inability to stop the piracy of XP, and even WGA was powerless. But in the Vista era, Microsoft had already learned this lesson, so there is no VOL version of Vista at all, and Windows Vista Enterprise designed for enterprises still needs to be activated, and there is also a special activation mechanism - KMS. KMS, that is, the system administrator (System Administrator) uses a volume activation key (that is, the Volume Key, Vol key that everyone often sees, sets up an activation server (Activation Server), and installs the KMS client on each client, so that batch activation and management can be performed, which greatly reduces the workload. The use of the activation tool will utilize the local area network and the KMS server to download a VMWare The virtual machine image of the KMS server is then debugged with VMWare so that the virtual machine can be connected to the host into a local area network. Then, it is activated once every 180 days to keep the system activated. In addition, the trial period of these versions of the system is a total of 180 days. If it is about to expire, you can use a script to extend it up to 3 times, each time for 60 days, to achieve the purpose of activation. The disadvantage of this activation method is that after successful activation, your computer will become a team computer. The developer of the KMS tool is the administrator. Don't take it lightly. The administrator can perform very high operations. Copying data and collecting information is a piece of cake. What's more, you can directly reset your system and retain the KMS permissions . Maybe one day the KMS developer is unhappy and will help you clear the computer. Disadvantages of telephone activation Telephone activation uses the local hardware information and system information as parameters, and uses an algorithm to get a set of results, which is a 48-bit ID feature code. This algorithm is built-in to the Windows system. Then use this set of product IDs as parameters to calculate with another algorithm to get the activation ID. This algorithm is on the Microsoft server, so you need to make an international call to tell it the parameters to generate the key. The picture comes from the Internet. Finally, this set of activation ID and product ID is used as parameters to activate the system with a certain algorithm. This algorithm is built into the system and may be updated. So once multiple products from multiple IPs are activated with this key, it must be a pirated version, so Microsoft will block the key and activation will not be possible. Genuine systems are the most worry-free to use . There is also an activation tool that is too lazy to even crack it, and directly replaces the system file to achieve the purpose of activation. By modifying slmgr.vbs to force the system to pass the verification, it is actually to let the unverified system also write the Windows activated sign. If the software is linked to Microsoft through upgrade or any other means, it will be immediately detected. After unpacking the software, another EXE file will appear. The source file will appear after unpacking it again. In fact, it is a replacement batch. In addition to replacing some dlls, slmgr.vbs will also be modified. The result of the modification is that no matter whether the system passes the genuine verification, it will prompt that it is genuine. In fact, it is not activated at all. There will be a black screen during use, showing that it is not activated. After talking about so many pirated systems, what is a genuine system? What are the advantages? It's very simple. The original system downloaded from Microsoft's official website and the operating system activated by purchasing the key through legal channels is the genuine system. The genuine system runs relatively stably, and there will be no black screen or blue screen, and no castration of functions . If you buy a whole machine from an e-commerce company, for cost considerations, it will generally be pre-installed with an unactivated original system, while laptops will generally be pre-installed with a genuine activated system. Of course, all the functions of the original system are as safe as the genuine system, but some functions will be missing. For example, the watermark in the lower right corner, personalized settings, etc. So if you want to be more worry-free and more focused when using your computer, then you should buy a genuine system! As a winner of Toutiao's Qingyun Plan and Baijiahao's Bai+ Plan, the 2019 Baidu Digital Author of the Year, the Baijiahao's Most Popular Author in the Technology Field, the 2019 Sogou Technology and Culture Author, and the 2021 Baijiahao Quarterly Influential Creator, he has won many awards, including the 2013 Sohu Best Industry Media Person, the 2015 China New Media Entrepreneurship Competition Beijing Third Place, the 2015 Guangmang Experience Award, the 2015 China New Media Entrepreneurship Competition Finals Third Place, and the 2018 Baidu Dynamic Annual Powerful Celebrity. |
>>: Do you think the official version of iOS 10.2 improves iPhone battery life?
Over the years, I've seen a trend of moving f...
Many people order takeout every day. Before order...
In a blink of an eye, 2023 is drawing to a close,...
After so many upgrades, do you still remember the...
In the recent mobile phone circle, the word "...
It is obvious that after experiencing the rapid v...
Christopher Meng's "Intimate Relationshi...
By reviewing a growth case I did last year - the ...
Tik Tok Female Hacker-mia Creates Differentiated ...
In real life, highly sensitive personality (HSP) ...
The flowers are the same every year, but the peop...
Since the advent of dual-SIM dual-standby mobile p...
The year-end cold wave is coming! December 23-26 ...
Tao and art are one of the topics that entreprene...
Introduction to the resource of Luosi Chinese Lan...