Feeds

MS unveils Win2K anti-piracy tools

Look out fellas, they've got stickers on 'em

  • alert
  • submit to reddit

High performance access to file storage

Microsoft outlined the anti-piracy measures for its Windows 2000 Professional operating system today at the Computer Trade Show in Birmingham. The US giant, which let copies of the software loose into the OEM channel on Monday in readiness for next month's launch, has added a couple of natty little features to try and foil the counterfeiters. Firstly, it claims the CD media - which will only be available through the distribution channel and not to direct buyers - is very difficult to copy because it is entirely hologrammed. The company will also be shipping a hologrammed authenticity sticker with the product name and code of the machine with every copy of the software. PC sellers will be told to stick one on the outside of every PC shipped to prove the software is genuine. "The sticker will give users visible proof of authenticity," said Des O'Carroll, Microsoft OEM channel sales manager. "It will also help system builders selling genuine software to justify their machine pricing." Carroll also claimed this would educate users into understanding that it was illegal to make multiple copies of software. Microsoft has announced an introductory offer for the channel of seven copies of Professional for the price of six. However, the company was criticised by resellers over its lack of plans to explain to customers that the sticker and hologrammed CD were necessary to ensure the OS was legal. Carroll said Microsoft would not be running any advertising campaigns to tell customers of the changes. Educating users will be left to the channel. ® See also: Win2K pains Pete Sherriff Microsoft fudges Win2K speed trials

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.