Feeds

Windows 7 Ultimate product activation hacked?

I want my free PC

Boost IT visibility and business value

Updated You could get a free (and illegal) copy of Windows 7 Ultimate if reports of a leaked OEM product activation key are accurate.

According to MyDigitalLife, a leaked OEM copy of Windows 7 was posted to a Chinese forum, with the OEM's key then identified and snatched.

An OEM activation key will unlock multiple copies, and it's reported this particular key will work on machines from Dell, Hewlett-Packard, Lenovo, and MSI.

The key appears to provide the last piece in a puzzle needed to activate copies of Windows 7 Ultimate on PCs. MyDigitalLife said the crack would pass Microsoft's Windows Genuine Advantage (WGA) validation process.

If the reports are correct, this would not be the first time that the activation keys needed for a planned new version of Windows have been cracked. But it would the first time in quite a while.

The product activation keys for Windows XP, launched in October 2001, were cracked in the period before that operating system's release.

This time, the key enabler appears to be a Windows 7 Ultimate OEM-SLP product key. This key appears to have been retrieved from a leaked copy of Windows 7 Ultimate DVD ISO for PC maker Lenovo posted to a Chinese forum.

MyDigitalLife reported: "The ISO was quickly grabbed to retrieve boot.wim, which was then used to retrieve the OEM-SLP product key and OEM certificate for Windows 7 Ultimate."

The crack came before Windows 7s official release to OEMs. PC makers are due to get their copies of Windows 7 two days after downloads are made available to TechNet and MSDN subscribers on August 6.

Microsoft in a statement strongly advised customers not to download Windows 7 from unauthorized sources.

"Downloading Windows 7 from peer-to-peer Web sites is piracy, and exposes users to increased risks - such as viruses, Trojans and other malware and malicious code - that usually accompany counterfeit software. These risks can seriously harm or permanently destroy data and often expose users to identity theft and other criminal schemes," the company said.®

This article has been updated to include comment from Microsoft.

Build a business case: developing custom apps

More from The Register

next story
Why has the web gone to hell? Market chaos and HUMAN NATURE
Tim Berners-Lee isn't happy, but we should be
Microsoft boots 1,500 dodgy apps from the Windows Store
DEVELOPERS! DEVELOPERS! DEVELOPERS! Naughty, misleading developers!
Mozilla's 'Tiles' ads debut in new Firefox nightlies
You can try turning them off and on again
'Stop dissing Google or quit': OK, I quit, says Code Club co-founder
And now a message from our sponsors: 'STFU or else'
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Uber, Lyft and cutting corners: The true face of the Sharing Economy
Casual labour and tired ideas = not really web-tastic
Linux turns 23 and Linus Torvalds celebrates as only he can
No, not with swearing, but by controlling the release cycle
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.