Feeds

Woundup How WinXP product activation will work

Maybe...

  • alert
  • submit to reddit

High performance access to file storage

According to an e-mail I recently received from a Microsoft spokeswoman, the new Windows Product Activation feature in Windows XP is still in full effect. How this will work is still unknown, but Ars Technica has a write-up of what we might expect. Ars itself qualifies the piece heavily, as there's no way of knowing yet if this is really how it's going to work. But it might be.

As mentioned here numerous times, the customer who buys Windows XP will need to activate it through the Internet or a phone system. Most likely, the majority of XP users will already have the Internet, making the activation process much easier, although the phone system should all be automated and will not interfere with Microsoft Support (Not a lot of chance of doing noticeable damage there, eh? - Ed).

Ars sums it up pretty well: "When contacting Microsoft, you will provide that Product ID code and a "hardware code" generated by WPA. Taking these two numbers, Microsoft will then issue you another ID, and it's this ID that will activate Windows. According to several sources, the final ID and your country name are all that are required to activate Windows." This was confirmed to The Register by Microsoft some weeks back, and one of the things worth noting about the XP beta install process is the way it flags 'no invasion of privacy.' Microsoft is sensitive about this.

What about users who like to install Windows on the four computers they have at home? This stops, basically, so do they buy the extra licences or join the warez world? Jury out.

And a follow-up to the "Chi-Ro" stuff. These are the Greek versions of XP, as used on the banners of early Christian Emperor Constantine. They are also, as numerous readers have pointed out, pronounced approximately "Cairo," which was the MS all-singing all-dancing new look that didn't actually ship, way back. So Microsoft product name designators, far from being superficial marketing-centric airheads, speak Greek, know some ancient history, and are aware in considerable detail of the history of This Great Company they work for.

Nah, we don't believe that either. Coincidence, must be...

Any tips, queries? Send them to Luis at The Register. ®

This week's Windows Roundups

WinXP beta 2 slips, but ship date won't

All our Windows roundups are archived here

Combat fraud and increase customer satisfaction

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
New Facebook phone app allows you to stalk your mates
Nearby Friends feature goes live in a few weeks
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.