Feeds

MS tips its hand on WinXP protection system

Suddenly, the builds got a lot less crackable...

  • alert
  • submit to reddit

New hybrid storage solutions

Microsoft's adoring public in the unofficial beta distribution channel seems to be awarding null points to the latest escapee from Fort Redmond, WinXP build 2469. This might have something to do with 2469 being seriously harder to crack than previous efforts, but problems with DirectX seem to be turning them off as well.

2469 is the second interim build that's been issued to beta testers since WinXP beta 2, and would have leaked anyway, this being the way of all beta builds that Microsoft releases to external testers. This one however got out a lot faster via a leaked beta tester's ID, which was publiced on IRC channels and which gave an indeterminate number of people download rights from the beta site for seven hours. How many people downloaded, and what they had rights to, is not entirely clear. Microsoft says only a few, to not very much, but we're not too sure about that.

However few leaks there actually are, the next stage in the process is for the code to be passed around in ever-widening circles, and for the protection to be cracked - up until 2469, the latter took place in approximately 24-48 hours. But not this time around.

Microsoft, as we've noted in the past, didn't exactly stretch itself when devising the protection on the earlier builds, and although you were supposed to activate them within 14 days in order to keep running them, cracks and working keys circulated via IRC and published on a few web sites meant that anyone who had illicit code could easily get around that.

The importance of 2469 would therefore seem to us to be that it's the first build where Microsoft has given us some indication of how tough the protection in the shipping product will be. So this might be Product Activation, Release Candidate 1. According to Joolz of MSWinXP.net (which is currently running a Verdict on 2469 piece), the problem lies in something Microsoft's done to winlogon.exe. "The old crack was to replace that file with an older version. This no longer works. It blue screens during setup if you do that! Its winlogon.exe that handles the activation."

It's therefore taking the crackers longer to figure out how to get round this, and as 2469 is substantially less popular than 2465 (big negative is that the broken DirectX means you can't play movies full screen in Media Player), maybe they'll never bother.

The pull of RC1, which is due next month, will likely encourage them to redouble their efforts, if they haven't got around the new system before then, but then you have to wonder how many more shots Microsoft has in its locker.

Undoubtedly whatever protects WinXP when it ships will be cracked, but if protection systems get cracked beforehand, then surely Microsoft will be using tougher ones for the shipping code. So although the crackers aren't part of the beta, in a funny sort of way, they are, when it comes to protection. ®

Related links:
Tester ID leak leaves WinXP beta site wide open

Security for virtualized datacentres

More from The Register

next story
Not appy with your Chromebook? Well now it can run Android apps
Google offers beta of tricky OS-inside-OS tech
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
NHS grows a NoSQL backbone and rips out its Oracle Spine
Open source? In the government? Ha ha! What, wait ...?
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Intel: Hey, enterprises, drop everything and DO HADOOP
Big Data analytics projected to run on more servers than any other app
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.