A day or so later, after checking with his Windows-using friend, he returned with this sheepish admission: Indeed. For my hands-on tests, I used a fresh copy of Windows 7 Ultimate, installed without a product key.
If you do intend to try this stuff out for yourself, I recommend extreme caution.
My hunt for utilities that bypass Windows 7 activation technologies led me to some very seedy corners of the Internet.
First, I did what any red-blooded wannabe pirate would do and tried some Google searches.
Of the first 10 hits, six were inactive or had been taken down.
After downloading files from the remaining four sites, I submitted them to Virustotal.com, where three of the four samples came back positive for nasty, difficult-to-remove Windows 7 rootkits.
Here's one example: And that experience is borne out by at least one real-world experience, which was reported, ironically, in the Talkback section of this blog.After I wrote about Microsoft's most recent anti-piracy initiative last week, one commenter (a loud, proud Linux advocate) insisted that the update opened a secret back-channel, probably as part of a plot by Microsoft to covertly gain access to its customers' PCs. In the interest of research, I've been digging into message boards and forums run by unabashed Windows enthusiasts who are intent on breaking Microsoft's activation technology.I've had these forums bookmarked for years and stop in every once in a while just to see what's new.This time I decided to drop by and actually try some of tools and utilities to see if I could become a pirate, too. In this post, I'll share my experiences, including close encounters with some very nasty malware and some analysis on how the latest showdown between Microsoft and the pirates is likely to play out.You won't find names or direct links here—although these guys seem like genuine enthusiasts, I have no intention of giving them any free publicity.