Feeds

Woundup Win2k slow progress, more on Whistler keys

But it's all pretty quiet out there...

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

ZDNet has an interesting piece concerning the slow but sure growth of Windows 2000. The news that has dominated the Web sites since Windows 2000 was released a year ago is probably the deployment issue. Millions of companies have already either upgraded from NT or have been convinced, and upgraded from a Unix/Linux operating system. Why?

The piece claims that recent tests show Windows 2000 is the most reliable Windows ever (the barb is 'with the possible exception of NT 3.51) and is more flexible and dynamic. Also, Windows 2000 is the foundation for .NET. But companies are still wary of Active Directory, and Unix still remains a logical first choice in many case. It's going to be a long haul...

On the Whistler security issue, several users have e-mailed me different ideas about why and how this will prevent pirated copies from spreading. But to begin, the first e-mail I received today was about a crack already being available for the product key. It's unbelievable how fast people discover what Microsoft did, but it seems the file replaces the winnt32u.dll file in the /i386 directory.

A Mr. Demski has the same theory as I have concerning the new product keys for Whistler. "If every tester has their own unique key, and is leaked, [Microsoft] will know exactly which tester leaked it, and then will take further action." It's the obvious answer, and probably the one that makes the most sense if Microsoft really wants to crack down on piracy. Each product key works with a specific hardware configuration, and you must call in to Microsoft and activate the key when you first install Whistler.

After that, the only people who can use the key would have to have precisely the same hardware. Getting to unique, of course, is trickier. There's obviously a problem with Microsoft accepting over 500,000 calls from Beta testers to activate Whistler, and when it ships, it's going to be a lot worse.

Any tips, queries? Send them to Luis at The Register. ®

This week's Windows Roundups

Whistler beta requires product key, IE6 escapes
Whistler 2419, MS product names

All our Windows roundups are archived here

Reducing security risks from open source software

More from The Register

next story
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
Apple: We'll unleash OS X Yosemite beta on the MASSES on 24 July
Starting today, regular fanbois will be guinea pigs, it tells Reg
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.