Language Selection

English French German Italian Portuguese Spanish

M$ plans to give some pirates a break

Filed under
Microsoft

The move is the latest in a series of expansions for the Windows Genuine Advantage program, which Microsoft quietly launched last September. The program, which runs software that verifies whether a particular copy of Windows is legitimately licensed, is the linchpin of a campaign by Microsoft to boost the number of paying customers among the millions of people that use Windows.

The Windows Genuine effort started as a purely voluntary program, but Microsoft has since been requiring validation for more and more customers who want to download software from the company.

In March, for example, Microsoft said it would require those who want to download a foreign-language pack for Windows to first validate their copy of Windows.

Starting Wednesday, customers in the United States whose copies of Windows XP Professional do not pass validation will be presented with the option of getting a free licensed copy. To do so, customers will have to fill out a counterfeit report with Microsoft and be able to provide the Windows disk they have as well as some kind of receipt for their purchase.

"Our goal is really to ensure that the complimentary offer is for people who really truly were unknowing victims of counterfeit," said David Lazar, director of the Genuine Windows program.

Those who don't have the disk or the receipt are eligible to buy a licensed copy online for $149. That's less than the cost of a full copy of Windows XP Pro but more than what customers pay when they get Windows on a new PC.

"At first glance it seems kind of self-defeating to reward pirates with a free licensed copy," said The NPD Group analyst Ross Rubin. However, he said it is an opportunity for Microsoft to show customers the benefits of its official software and potentially win them over as legitimate customers for future versions. Plus, it could help them track down those who are heading up piracy rings.

"Much as narcotics officers bypass the lower-level dealers to get at the kingpins, what they are likely trying to do is get at the distributors (of pirated Windows)," Rubin said.

Test program

For now, the Windows validation process remains optional for most customers, though sometime this summer, Microsoft plans to make such scanning mandatory for those who want to download software from the company's site.

Full Story.

More in Tux Machines

Linux Gaming For Older/Lower-End Graphics Cards In 2018

A request came in this week to look at how low-end and older graphics cards are performing with current generation Linux games on OpenGL and Vulkan. With ten older/lower-end NVIDIA GeForce and AMD Radeon graphics cards, here is a look at their performance with a variety of native Linux games atop Ubuntu using the latest Radeon and NVIDIA drivers. Read more Also: Wine 3.0 open-source compatibility layer now available

Red Hat Patch Warning

  • We Didn't Pull CPU Microcode Update to Pass the Buck
  • Red Hat Will Revert Spectre Patches After Receiving Reports of Boot Issues
    Red Hat is releasing updates that are reverting previous patches for the Spectre vulnerability (Variant 2, aka CVE-2017-5715) after customers complained that some systems were failing to boot. "Red Hat is no longer providing microcode to address Spectre, variant 2, due to instabilities introduced that are causing customer systems to not boot," the company said yesterday. "The latest microcode_ctl and linux-firmware packages are reverting these unstable microprocessor firmware changes to versions that were known to be stable and well tested, released prior to the Spectre/Meltdown embargo lift date on Jan 3rd," Red Had added.

Android Leftovers

Security: Updates, SOS Fund, IR, ME, and WPA

  • Security updates for Friday
  • Seeking SOS Fund Projects
    I’m spending some time over the next few days looking for the next round of projects which might benefit from an SOS Fund security audit.
  • Strong Incident Response Starts with Careful Preparation
    Through working every day with organizations’ incident response (IR) teams, I am confronted with the entire spectrum of operational maturity. However, even in the companies with robust IR functions, the rapidly evolving threat landscape, constantly changing best practices, and surplus of available tools make it easy to overlook important steps during planning. As a result, by the time an incident occurs, it’s too late to improve their foundational procedures.
  • The Intel Management Engine: an attack on computer users' freedom
    Over time, Intel imposed the Management Engine on all Intel computers, removed the ability for computer users and manufacturers to disable it, and extended its control over the computer to nearly 100%. It even has access to the main computer's memory.
  • What Is WPA3, and When Will I Get It On My Wi-Fi?
    WPA2 is a security standard that governs what happens when you connect to a closed Wi-Fi network using a password. WPA2 defines the protocol a router and Wi-Fi client devices use to perform the “handshake” that allows them to securely connect and how they communicate. Unlike the original WPA standard, WPA2 requires implementation of strong AES encryption that is much more difficult to crack. This encryption ensures that a Wi-Fi access point (like a router) and a Wi-Fi client (like a laptop or phone) can communicate wirelessly without their traffic being snooped on.