Feeds

Registration Wizard casts spell on Office 2000

Will turn software counterfeiters into frogs

  • alert
  • submit to reddit

The essential guide to IT transformation

Microsoft has stepped up the war against software piracy by incorporating compulsory registration technology into the retail version of Office 2000 (O2k) and boosting the number of holographic identifiers Windows 2000 (W2k) will carry. The entire surface of W2k CD-ROMs will be one big hologram. Right from the centre of the disc to its very edge, when held at an angle it will reveal the name 'Windows 2000' along with a series of product graphics. PCs with W2k pre-installed will come with a Certificate of Authenticity label attached. The label will be interwoven with a copper thread bearing a hologram. The hologram will carry the words 'Microsoft' and 'Genuine'. The retail version of W2k will come with a similar label. This is all good stuff and -- if nothing else -- should at least make it easier for the PC buying public to tell the real McCoy from pale imitations. But this is nothing compared with what's in store for O2k. The long-awaited next version of Microsoft's world-beating office suite will come with what is euphemistically being called a Registration Wizard. The Wizard will prompt users to register online and will generate an installation number. Although the official release from Microsoft doesn't stress it, the point here is no installation number = no installation. Pow, zap, alakazam, hocus pokus and other assorted wizardry. The bottom line here is that if you don't own a genuine copy of O2k, be prepared for stormy weather when you try and use it. And before hordes of conspiracy theorists (you know who you are) start getting all heated about major corporations collecting your personal details, you only need to enter the name of the country where the software was purchased to get the installation code. You can even use an anonymous Web mail account to register. Microsoft is also upping its efforts to crack down on Web sites distributing illegal copies of its software. It is kickstarting a 24x7 monitoring programme which will scour the Net looking for pirates. When the pirates are spotted, the ISP hosting the offending site will be made to walk the plank... no they won't. We made that bit up. The ISP will, however, be instructed to pull the pirates' site down. In January alone, Microsoft identified and eliminated more than 100 such sites with the help of the ISP community. ® See also: MS unveils Win2K anti-piracy tools Half of UK schools are software pirates Threat of gaol not enough to deter piracy

Secure remote control for conventional and virtual desktops

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
No, thank you. I will not code for the Caliphate
Some assignments, even the Bongster decline must
Kaspersky backpedals on 'done nothing wrong, nothing to fear' blather
Founder (and internet passport fan) now says privacy is precious
TROLL SLAYER Google grabs $1.3 MEEELLION in patent counter-suit
Chocolate Factory hits back at firm for suing customers
Mozilla's 'Tiles' ads debut in new Firefox nightlies
You can try turning them off and on again
Facebook, Google and Instagram 'worse than drugs' says Miley Cyrus
Italian boffins agree with popette's theory that haters are the real wrecking balls
Sit tight, fanbois. Apple's '$400' wearable release slips into early 2015
Sources: time to put in plenty of clock-watching for' iWatch
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.