how to check the window key of any OS.

kaliyaodi

Broken In
hi friend's,
During installation of any operating system we need a serial key.
can any one tell me how this key is checked.
Is there any key file stored in installation disk or what.
somebodies tell me that when you enter the CD-key it is checked by an algorithm and not against a set of keys.
Is it correct. if yes then tell me how an algorithm is used to check the key.
 

gagan007

Uhu, Not Gonna Happen!
hahaha you are straightaway asking the business secret of the biggest software firm in the world.

well you guessed it right...it is actually an algorithm that work and not a set of keys...I have a msdn subscription from where I can download a variety of softwares from MS site...once downloaded i can retrieve upto 10 keys (under my license) from the site and enter it during the installation of the same downloaded software...

regarding your last question, i do not know the answer...but i think a cracker can answer that...
 
During installation of any operating system we need a serial key.
Question itself is wrong. Linux never asks for keys crap and its a great Operating system considering its vast flavors aimed at different user groups.
Secondly, a CD key is a specific software-based key for a computer program. Product activation is a license validation procedure required by some proprietary computer software programs. In one form, product activation refers to a method patented by Uniloc where a software application hashes hardware serial numbers and an ID number specific to the product's license to generate a unique installation ID. This installation ID is sent to the manufacturer to verify the authenticity of the product key and to ensure that the product key is not being used for multiple installations.
Alternatively, the software vendor sends the user a unique product serial number. When the user installs the application it requests that the user enter their product serial number, and checks it with the vendor's systems over the Internet. The application obtains the license limits that apply to that user's license, such as a time limit or enabling of product features, from the vendor's system and optionally also locks the license to the user's system; a common approach is to exchange encrypted files at an Internet terminal.
 
Top Bottom