Feeds

MS offers real Windows XP to users of counterfeit software

Testing the waters in the UK?

  • alert
  • submit to reddit

Top three mobile application threats

A Microsoft UK replacement scheme for pirate copies of Windows XP suggests the company is testing the waters to see how feasible it is to convert sections of its unlicensed user base to legitimate users. The scheme is however limited at the moment - to the UK, and to copies sold pre-installed on a new computer prior to 1st November. There are however clear signs that Microsoft considered running the offer for standalone retail product before taking a step back.

The instructions, for example, say at several points that you should send in "the product" without adding any 'if available' qualification, and in most cases with OEM Windows preinstalled on a PC you're not actually going to have a product apart from the PC itself. Similarly, the boilerplate witness statement looks very much like a witness statement written on the assumption that it will be applied to a standalone software package. Clearly Microsoft needs to clarify the online instructions, given that the confusion they're likely to cause will affect the uptake rate. A Microsoft spokeswoman suggested to The Register this morning that the witness statement is likely to be a general one used by Microsoft for pirate software reporting, but if that's the case it's still not very helpful.

Microsoft does have a long term and wide-ranging ambition to turn the very large numbers of users of counterfeit Windows into legitimate users. At the same time, it wants to hunt down the companies selling new PCs with pirate software on board, the (probably sensible) rationale here being that if this channel for pirate software is throttled then quite a lot of the problem will go away. Quite a lot of people will end up with pirate Windows installations via this route and either won't know or won't care, whereas a lot less people are likely to go to the trouble of of downloading and installing software when they've already got something on the PC.

So one of the questions here is whether it's more important with the current offer for Microsoft to legitimise the users, or more important to obtain leads and evidence that will allow it to take action against the sources. Or possibly, even to just frighten a reasonable percentage of the sources into cleaning their acts up.

Aside from being limited by the confusion factor, volume licence purchasers are excluded, as are people under 18 (which is perhaps a bit thoughtless, but is likely to be related to the validity of the witness statement) and "employees of Microsoft or its affiliates" (come on, would they really dare?). The offer itself expires at the end of next month, but you can make up to five submissions per person. There isn't much obvious advantage in the offer from the user's point of view, as first you have to use the standard Microsoft process to check whether or not your software is genuine, then collate any accompanying documentation, invoice or receipt, and the witness statement, then send it all to Microsoft. Then they might send you back a copy of the real software - unless there are other factors at play, then it's a bit of work for little obvious return.

Probably, vast numbers of people will not stampede to take this up, and we would not be surprised if the cost of the support phone calls far exceeds the other costs of the programme. There are however signs of where Microsoft would like to be with this kind of operation, as opposed to where it is at the moment. Its product identification guide for example claims that there's an "Is this copy of Windows legal?" link in Windows Explorer's help menu. Your writer failed to find this, and kept getting kicked into the Help Center instead, but readers tell me it exists, so no doubt it's me. Finding myself ignorant of bits of Windows always cheers me up anyway.

The Windows Genuine Advantage scheme potentially provides another component of an online legitimisation service. Here Microsoft is experimenting with easy terms validation in exchange for downloads and sundry special offers, and you could see how this could be expanded into a kind of combination carrot and stick system.

You can envisage an ideal (from Microsoft's point of view) world where software was authenticated online, where support and fixes were conditional on the software either being legitimate or legitimised, and where the penetration of pirate copies of Windows was at least substantially reduced. How do you get there from here, though? Microsoft is clearly testing the waters, but really all that means is that it's trying to find out how. ®

Top three mobile application threats

More from The Register

next story
Ubuntu 14.04 LTS: Great changes, but sssh don't mention the...
Why HELLO Amazon! You weren't here last time
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Next Windows obsolescence panic is 450 days from … NOW!
The clock is ticking louder for Windows Server 2003 R2 users
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
OpenBSD founder wants to bin buggy OpenSSL library, launches fork
One Heartbleed vuln was too many for Theo de Raadt
Got Windows 8.1 Update yet? Get ready for YET ANOTHER ONE – rumor
Leaker claims big release due this fall as Microsoft herds us into the CLOUD
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.