Skip to main content

How Windows Activation Works How To Make Windows Genuine


Hello guys, how was your day, I think my last post was so much weird how to kill your social network , But it is a truth of some people's life that social networks has spoiled their social life. Here we are going to disscuss how WPA (Windows Product Activation) works. About WPA it's a license validation process introduced  by microsoft. Well it sucks a lot if you are using a pirated copy of windows and have a permanent internet connection. First time WPA was used in Windows XP by Microsoft and Windows 7 also use this process to validate your license. I will not say i am going to reveal wpa secrets, but you can read a fully licensed paper for technical knowledge http://www.licenturion.com/xp/fully-licensed-wpa.txt

Some rumors about WPA i am going to answer-
(1) When we activate our windows online using internet connection microsoft can access our private data and location?
Ans. WPA doesn't send any of your personal information and private data to microsoft, but there is another option to register with microsoft if you want to register.
(2)After 1 or 2 years it will asks for license again?
Ans. It,s not possible without a technical fault, because once you activate your windows , microsoft makes the installation ID, which is a combination of your hardware configuration and product key.
If you change your computer it can create some problems so you can contact microsoft. I haven't faced this problem.
(3)Registering with microsoft can damage my computer , Because it's microsoft's so they can do anything if i am running windows?
Ans. Microsoft doesn,t access your data or anything which is considered personal. If you are using a 30 days trial version or pirated copy of windows, then it will try to turn off some windows features.
But registered and genuine version don't create any problem.
(4) After computer format it will ask for new key?
Ans. As i told you that the installation ID is a 50 digit ID combination of your Product key & Hardware configuration, So if your product Installation ID detects your hardware you can Use one Installation ID again and again. As I know microsoft detects 10 hardware components when making Installation key(ID) . 7 of 10 hardware components should match to activate your Installation ID again if you have done some changes in your Hardware otherwise you need to contact customer support via mail or via phone.

Comments

Popular posts from this blog

#2 Why Security Is so important

                     Why  Security   ?   It is  Really  a question Every Body Knows How Important Security Is Here is Some Top Reasons Why Security is Most Important     ·         Evolution Of Technologies has focused primarily on ease of use ·         Computer  infrastruture  Management is  becomming  more complex for the common Man ·         Skill Level Required For Exploiting Security  Weakness Is Constantly ·         Direct Impact Of Security Breach on corporate asset base goodwill ·          Increased Networked Environment And Network Based Application

How To Hack Wifi Passwords With Windows 100% Works

How to Crack a Wpa2-Psk Password with Windows :- It,s very common question on the internet to How to hack a Facebook account password and how to hack a WiFi password. Even if you search on YouTube you will find a lots of tutorial to How to hack a WiFi password using backtrack. However, backtrack OS is not most handy OS for normal users. Today i am going to show you how to a crack a Wp2-psk password with windows machine. Software Requirement for this lab :- 1. CommView for Wifi ( Download ) 2.  Elcomsoft Wireless Security Auditor (Download ) Presently i am connected with my own wifi network Virusfound and i want to hack the password of Ultimate that is secured with Wpa2-psk encryption. First you need to be capture the Wpa2, four-way handsake with CommView. Open commView and click on the Start option  then click on the capture option to start the capture now it will show you all available AP , Now click on the Tools > Select the Node Reassoi...

How to make a Trojan

Most of you may be curious to know about  how to make a Trojan  or Virus on your own. Well, here is an answer to your curiosity. In this, post I’ll show you  how to make a simple trojan  on your own using the C programming language. This trojan when executed will eat up the hard disk space on the root drive (The drive on which the Windows is installed, usually C: Drive) of the computer on which it is run. Also, this trojan works pretty quickly and is capable of eating up approximately 1 GB of hard disk space for every minute it is run. So, I’ll call this as Space Eater Trojan. Since this program is written using a high level programming language, it is often undetected by antivirus programs. The source code for this program is available for download at the end of this post. Let’s see how this trojan works: Before I move on to explain the working of this program, you need to know  what exactly is a Trojan horse  and how...