Feeds

New MS protection tech did go live in latest WinXP beta

Previous MS statements published in error, crackers put thinking caps on

  • alert
  • submit to reddit

Intelligent flash storage arrays

Despite earlier claims to the contrary made by, er, Microsoft in its beta newsgroup, the registry hack that allows testers to circumvent Product Activation has been removed from the latest external build of Windows XP, 2446. It appears that Microsoft initially posted the wrong rev of the release notes, and our informants tell us testers are now having heated arguments about withdrawal, editing and reposting of newsgroup messages.

John Gray of Microsoft yesterday confirmed to testers that the regkey allowing product activation to be switched off was no longer active, so as of this build of XP Microsoft's security systems go into live battle testing. Microsoft did say in the notes for the previous external build, 2428, that the regkey wouldn't be available in future builds, but despite this the actual decision to remove it from 2446 must have been relatively recent.

Microsoft does not as yet have worldwide call centre support up and running, as we reported yesterday and as the original 2446 release notes said, so testers outside of the US and Canada won't necessarily be able to activate the product. But Microsoft intends to have the system live for them by 10th March. Testers have 14 days from installation to activate the product, either over the Web or by voice, while the time limit in the finished product will be 30 days.

Build 2446 became available via the usual unofficial sources on the Web yesterday, but as yet nobody seems to be claiming a crack for the product activation system. Internally, Microsoft is at something in excess of build 2450 by now.

Related story:
MS gears up for public WinXP beta with interim external build

Intelligent flash storage arrays

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
First in line to order a Nexus 6? AT&T has a BRICK for you
Black Screen of Death plagues early Google-mobe batch
Whistling Google: PLEASE! Brussels can only hurt Europe, not us
And Commish is VERY pro-Google. Why should we worry?
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?