Feeds

Oops! Dell gives away Win2k product key. Not quite

Close, but no cigar...

  • alert
  • submit to reddit

The Power of One Brief: Top reasons to choose HP BladeSystem

Microsoft's favourite OEM seems to blotting its copybook big-time. First, there's an escaped Dell OEM copy of the RTM version of WinXP on the loose, and now, if you happen to have a copy of Windows 2000 but for some unaccountable reason you don't have a product key, well...

Dell is there to help, but on closer examination prompted by about 60 emails from our nice readers it turns out the company has sneakily blotted out the last block of the key it's publishing on its web site. Win2k product keys are five block, and the Dell leak - sigh - is only four. Figure out for yourself how long it's going to take you to get the right one(s) by trial and error (five characters to check).

The eagle-eyed team at tecChannel ((story auf Deutsch) started this. If you go to Dell's Latitude 810 spec page, then click on the 360 demo link, you get a nice rotatable image of the machine.

Then flip the Latitude over, rotate and zoom until you see ever so clearly one of those standard stickers you get on the bottom of machines these days. Alternatively, you could just wander through other people's office flipping up machines when nobody's looking, but it's cool that Dell is doing a proper virtual version of this classic product key vulnerability. Dell is a deeply happening e-company, as we all know, and can thus be said to be walking the talk.

But, ah, doesn't Microsoft get really heavy about this sort of thing, these days? One enthusiast who's apparently no better than he should be recently published a take-down notice he received from Microsoft saying: "The above location [we won't trouble you or him by publishing the site details] is offering 'Cracks' or 'Serial Numbers', intended to circumvent protection applied to prevent the unauthorized copying and use of copyrighted computer programs, for distribution by technical means."

Presumably blotting out the last bit means Dell's take-down notice isn't on the way... ®

Eight steps to building an HP BladeSystem

More from The Register

next story
NSA man: 'Tell me about your Turkish connections'
Spooks ask Dabbsy to suggest a nice hotel with pool
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
Motorist 'thought car had caught fire' as Adele track came on stereo
'FIRE' caption on dashboard prompts dunderheaded hard shoulder halt
Yahoo! Japan! launches! service! for! the! dead!
If you're reading this email, I am no longer alive
Plucky Rockall podule man back on (proper) dry land
Bold, barmy Brit adventurer Nick Hancock escapes North Atlantic islet
Russia sends SEX-CRAZED GECKOS to SPAAAAACE!
In space... no one can hear you're green...
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.