| 10:07 am on Mar 3, 2007 (gmt 0)|
Is it possible that they will find a master code or a volume licensing code which can then be used on large numbers of machines?
| 10:24 am on Mar 3, 2007 (gmt 0)|
This is a big news indeed :)
Hackers and crackers have been cracking softwares. But this is a challenge to Microsoft. I have heard that Microsoft told Vista was hack proof.
This fact may put strong blow on Microsoft's marketing ability.
| 10:42 am on Mar 3, 2007 (gmt 0)|
|I have heard that Microsoft told Vista was hack proof. |
Do you have a reference for that? That would be quite a claim.
It will be interesting to see how MS reacts to this. It is quite early in the product cycle for something like this to be happening. My guess is that they'll simply have to limit the number of times an incorrect key can be tried. That would be difficult to add to existing copies though.
| 12:34 pm on Mar 3, 2007 (gmt 0)|
This is brute force - it could take an hour or year(s).
Let's see, tie up my PC for a year and spend $300 on electricity or pay $120 for a legitimate copy...
[edited by: BillyS at 12:36 pm (utc) on Mar. 3, 2007]
| 12:38 pm on Mar 3, 2007 (gmt 0)|
Great tool. And when the computer has finally genereated a valid key you can send your grand grand grand grand (...grand) child down to the local software retailer to fetch the new Windows 40000 for you.
| 3:14 pm on Mar 3, 2007 (gmt 0)|
It is a hoax.
| 12:34 pm on Mar 4, 2007 (gmt 0)|
|My guess is that they'll simply have to limit the number of times an incorrect key can be tried. |
I believe the usual tactic is to allow an attack to continue, but, after a dozen or so attempts, simply fail irrespective of whether the entered code is correct or not!
An OEM bios hack (by software) is more likey to bear fruit, but may be detectable (even if implemented by virtualisation software).
That leaves actually flashing the bios to create a fake Dell PC, or whatever. This should be possible unless the identification is stored in a non-flashable area.