Feeds

MS unveils Win2K anti-piracy tools

Look out fellas, they've got stickers on 'em

  • alert
  • submit to reddit

Seven Steps to Software Security

Microsoft outlined the anti-piracy measures for its Windows 2000 Professional operating system today at the Computer Trade Show in Birmingham. The US giant, which let copies of the software loose into the OEM channel on Monday in readiness for next month's launch, has added a couple of natty little features to try and foil the counterfeiters. Firstly, it claims the CD media - which will only be available through the distribution channel and not to direct buyers - is very difficult to copy because it is entirely hologrammed. The company will also be shipping a hologrammed authenticity sticker with the product name and code of the machine with every copy of the software. PC sellers will be told to stick one on the outside of every PC shipped to prove the software is genuine. "The sticker will give users visible proof of authenticity," said Des O'Carroll, Microsoft OEM channel sales manager. "It will also help system builders selling genuine software to justify their machine pricing." Carroll also claimed this would educate users into understanding that it was illegal to make multiple copies of software. Microsoft has announced an introductory offer for the channel of seven copies of Professional for the price of six. However, the company was criticised by resellers over its lack of plans to explain to customers that the sticker and hologrammed CD were necessary to ensure the OS was legal. Carroll said Microsoft would not be running any advertising campaigns to tell customers of the changes. Educating users will be left to the channel. ® See also: Win2K pains Pete Sherriff Microsoft fudges Win2K speed trials

Boost IT visibility and business value

More from The Register

next story
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.