Feeds

Windows 8

Apple iOS 7 makes some users literally SICK. As in puking, not upset

Excessive zoom and 3D-effect graphics in Apple's latest iOS is leaving some users reaching for the sick bucket

Microsoft tightens grip on OEM Windows 8 licensing

Factories will report directly to Redmond

  • alert
  • submit to reddit

Protecting against web application threats using SSL

A series of slides leaked online reveal information about Microsoft's new OEM Activation process for Windows 8, which is designed to make it more difficult to activate illegal copies of Redmond's latest OS.

OEM Activation (OA) allows PC manufacturers to ship systems with Windows preinstalled and already activated, so that customers don't need to take any additional steps to activate the OS when they first use a new computer.

In the past, hackers have managed to take advantage of the OA process to activate purloined copies of Windows, which ordinarily need to be activated with a license key. Rogue OEMs have also used similar systems to avoid paying tribute to Redmond.

The slides, which appear to be taken from Microsoft training materials, outline the differences between OA 3.0, which will debut with Windows 8, and earlier versions.

If the slides are authentic, under OA 3.0, manufacturers will be required to write a unique Windows product key into the BIOS of each new PC, keyed to that particular computer's hardware. In the past, OEMs used the same product key for every PC they shipped.

Leaked slide showing the Microsoft's OEM Activation 3.0 process for Windows 8

Looks simple enough.

The vendors will also now obtain their product keys directly from Microsoft via electronic delivery, and each new PC will come with a "Genuine Microsoft" sticker affixed, rather than the earlier Windows Certificate of Authenticity.

Factories will also be required to file production reports to Microsoft detailing their license compliance.

For now, OA 3.0 will only apply to new PCs running the Windows 8 client OS. Other versions, including Windows Server 2012 and Windows Embedded, will not use the new method – at least initially – and Windows 7 and earlier will continue to use the older OEM Activation method.

Microsoft declined to comment. ®

The next step in data security

More from The Register

next story
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
'Windows 9' LEAK: Microsoft's playing catchup with Linux
Multiple desktops and live tiles in restored Start button star in new vids
iOS 8 release: WebGL now runs everywhere. Hurrah for 3D graphics!
HTML 5's pretty neat ... when your browser supports it
Mathematica hits the Web
Wolfram embraces the cloud, promies private cloud cut of its number-cruncher
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Intel: Hey, enterprises, drop everything and DO HADOOP
Big Data analytics projected to run on more servers than any other app
Mozilla shutters Labs, tells nobody it's been dead for five months
Staffer's blog reveals all as projects languish on GitHub
SUSE Linux owner Attachmate gobbled by Micro Focus for $2.3bn
Merger will lead to mainframe and COBOL powerhouse
iOS 8 Healthkit gets a bug SO Apple KILLS it. That's real healthcare!
Not fit for purpose on day of launch, says Cupertino
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.