Feeds

Hackers in keyless Windows 7 entry

Crack skirts MS code

The Essential Guide to IT Transformation

Hackers have found a way to bypass product activation in Windows 7 and Windows Server 2008 R2 to get free and illegal copies of Microsoft's latest operating systems.

The hack, according to My Digial Life, means you can get Windows 7 and Windows Server 2008 R2 without the need for a product activation key.

The crack apparently mirrors a similar breach in Windows Vista that was foiled by a Microsoft software update.

A Microsoft spokesperson told The Reg: "We're aware of this workaround and are already working to address it."

The company advised customers to avoid using illegal copies of Windows and to check their software is genuine, warning rogue software often contained malware.

Earlier this year, an OEM Windows 7 Ultimate product key was posted to a Chinese forum. The key worked on machines from Dell, Hewlett-Packard, Lenovo and MSI. It would let you bypass Windows Genuine Advantage to potentially unlock multiple copies of Windows 7 Ultimate.

My Digital Life said the fresh hack nullifies the sppcompai.dll thereby passing product activation and licensing in the Windows Activation Technologies' (WAT) Software Protection Platform (SPP) and Software Licensing Client (SLC).

Hackers have also devised tools that turn off any pop-ups or reminders that say the system has not been registered or the trial period has expired.

The hack has been blamed on Microsoft creating a system designed to give users plenty of opportunities to enter their details in case they make mistakes. "The crack is possible probably due to leniency allowed on the part of Microsoft on [the] activation mechanism to avoid getting too many false-positive or complaint on activation error [sic]," My Digital Life wrote. ®

The Power of One eBook: Top reasons to choose HP BladeSystem

More from The Register

next story
That AMAZING Windows comeback: Wow – 0.5% growth in 2015
Whoooah, my face is going all floppy with the speed
Think Google Glass is creepy? Wait until it READS YOUR MIND
Startup penetrates the mind of Glassholes
Linux turns the crank on code for cars
Got a feel for your automobile
Google policy wonk patronises Brits over EU search biz probe
Downgrading rivals? Whetstone: 'I just don't think it's really true'
Victim of Tor-hidden revenge smut site sues Tor Project developers
But EFF lawyer says deep-web team 'no more liable' than web server makers
Chrome Remote Desktop adds Linux to supported OS list
Drive Debian from the confines of a Chromebook
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
The Power of One eBook: Top reasons to choose HP BladeSystem
Only the Power of One delivers leading infrastructure convergence, availability and scalability with federation, and agility through data center automation.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.