ITBusiness.ca

Hackers figure out ways to sidestep Windows 7 activation

Hackers have figured out how to outwit Windows 7’s activation process, continuing a long-running battle with Microsoft, which has blocked such tactics in the past.

According to an article published more than a week ago on My Digital Life, hackers have devised a pair of methods that circumvent the new operating system’s product activation, a key component of Microsoft’s antipiracy technologies.

Related stories

Windows 7 hack kit made public, Android netbook possible

Preparing to upgrade from XP to Windows 7 the easy way

A detailed, step-by-step guide to installing Windows 7

Microsoft said it knew about the hacks and was looking into ways to block them. “We’re aware of this workaround and are already working to address it,” a company spokeswoman said today.

Two utilities, called “RemoveWAT” and “Chew-WGA,” remove the activation technologies or prevent them from running, said My Digital Life.

Both hacking tools trick Windows 7 into reporting that it has been properly activated, preventing the nagging on-screen displays and other visual cues from appearing that Microsoft has built into its software to mark counterfeit software.

With Windows 7, Microsoft dropped the “Windows Genuine Advantage” (WGA) name for its integrated antipiracy software, and replaced it with “Windows Activation Technologies” (WAT).

The end result on users’ screens, however, remained similar to what Vista displayed.

The most evident change to Windows 7 was the discarding of a delay during log-in on a machine with an inactivated copy of Windows.

Under Vista’s scheme, users had to wait 15 seconds before clicking the “Activate Later” button to proceed to the desktop.

In Windows 7, users can click that button immediately.

Microsoft made dramatic changes to Vista’s illegitimate software warnings nearly two years ago, then followed those with nearly identical modifications to the older Windows XP.

In both operating systems, the company dumped the reduced functionality mode that essentially made the machine unusable, and instead boosted the number of on-screen messages and planted a black background on the desktop.

Microsoft has blocked anti-activation hacks in the past, using Windows Update to push changes to users.

In early 2008, for example, the company stymied a pair of activation cracks with just such an update, then rolled the crack detection code into Vista Service Pack 1 (SP1) a month later.

It issued another update in February 2009 to block another crack that affected Vista Ultimate.

In that month Microsoft started to feed Windows Vista Ultimate users an update that sniffed out pirated copies.

The update and others in the weeks to come, was yet another milestone in the anti-activation crack campaign Microsoft launched almost exactly a year ago.

Those cracks were able to evade Vista’s built-in counterfeit-detection technology by sidestepping product activation, essentially duping the operating system into thinking it’s legitimate.

The February update targeted “SoftMod,” an activation hack that tricked Vista into thinking it’s being booted on a PC that had the operating system installed — and activated — at the factory. Typically, computer makers pre-activate Windows before they ship systems, eliminating the chore for customers.

SoftMod could be used to create a bootable CD, which then had to be used each time the PC was booted, or with some care it could be installed on the machine’s hard drive.

The SoftMod detection update was offered only to Vista Ultimate users. The move may have had to do with that edition’s popularity among pirates. Vista Ultimate was the most expensive and most feature-packed version of the operating system and the dominant edition on file-sharing sites that traffic in illegal software.

The lpost on My Digital Life acknowledged that Microsoft might take the same tack with the Windows 7 workarounds.

“As [the] cracks based on removal of activation component involves patching, changes and modification to many system files, it’s likely to be easily detected and nullified by Microsoft, especially in [the] next WGA update or Service Pack 1 (SP1) for Windows 7 and Windows Server 2008 R2,” My Digital Life reported.

Source: Computerworld.com

Exit mobile version