Feeds

Woundup Win2k slow progress, more on Whistler keys

But it's all pretty quiet out there...

  • alert
  • submit to reddit

High performance access to file storage

ZDNet has an interesting piece concerning the slow but sure growth of Windows 2000. The news that has dominated the Web sites since Windows 2000 was released a year ago is probably the deployment issue. Millions of companies have already either upgraded from NT or have been convinced, and upgraded from a Unix/Linux operating system. Why?

The piece claims that recent tests show Windows 2000 is the most reliable Windows ever (the barb is 'with the possible exception of NT 3.51) and is more flexible and dynamic. Also, Windows 2000 is the foundation for .NET. But companies are still wary of Active Directory, and Unix still remains a logical first choice in many case. It's going to be a long haul...

On the Whistler security issue, several users have e-mailed me different ideas about why and how this will prevent pirated copies from spreading. But to begin, the first e-mail I received today was about a crack already being available for the product key. It's unbelievable how fast people discover what Microsoft did, but it seems the file replaces the winnt32u.dll file in the /i386 directory.

A Mr. Demski has the same theory as I have concerning the new product keys for Whistler. "If every tester has their own unique key, and is leaked, [Microsoft] will know exactly which tester leaked it, and then will take further action." It's the obvious answer, and probably the one that makes the most sense if Microsoft really wants to crack down on piracy. Each product key works with a specific hardware configuration, and you must call in to Microsoft and activate the key when you first install Whistler.

After that, the only people who can use the key would have to have precisely the same hardware. Getting to unique, of course, is trickier. There's obviously a problem with Microsoft accepting over 500,000 calls from Beta testers to activate Whistler, and when it ships, it's going to be a lot worse.

Any tips, queries? Send them to Luis at The Register. ®

This week's Windows Roundups

Whistler beta requires product key, IE6 escapes
Whistler 2419, MS product names

All our Windows roundups are archived here

Combat fraud and increase customer satisfaction

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
New Facebook phone app allows you to stalk your mates
Nearby Friends feature goes live in a few weeks
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.