Microsoft deploys new update for Windows Activation Technologies to detect & deactivate non-genuine copies of Windows 7

This update for Windows Activation Technologies helps detect validation errors and activation exploits & also detects any tampering attempts made to important Windows 7 system files.

Activation exploits are sometimes called “hacks”, and attempt to bypass or compromise Windows’ activation technologies.

This new update is further evidence of Microsoft’s commitment to keeping customers and partners secure. The update will determine whether Windows 7 installed on a PC is genuine and will better protect customers’ PCs by making sure that the integrity of key licensing components remains intact.

When this update is installed, it performs a validation process for the copy of Windows that is running on your computer. However, this validation process does not affect the functionality of Windows. The update process exits silently if it detects no validation errors, activation exploits, or tampered files. In the case where the update discovers a tampered file, it tries to restore the file. This restore may require a restart.

If Windows 7 is non-genuine, the notifications built into Windows 7 will inform the customer that Windows is not genuine by displaying informational dialog boxes with options for the customer to either get more information, or acquire genuine Windows. The desktop wallpaper will be switched to a plain desktop (all of the customer’s desktop icons, gadgets, or pinned applications stay in place). Periodic reminders and a persistent desktop watermark act as further alerts to the customer.

This update package (for both x86 & x64 systems) is available via Windows Update and Microsoft Download Center.

For download & detailed description of this update, check out Microsoft KB2534510.

Microsoft recommends buyers of new PCs should always check for the Certificate of Authenticity (COA) to verify that the PC they are purchasing contains only genuine Windows. Visit the Microsoft How to Tell website to see what a genuine COA should look like.

Advertisements

2 responses to this post.

  1. Thank you for this blog. That’s all I can say. You most definitely have made this blog into something thats eye opening and important. You clearly know so much about the subject, youve covered so many bases. Great stuff from this part of the internet. Again, thank you for this blog.”

    Reply

  2. […] these language files are present on another edition of Windows 7, genuine technologies will detect tampering on the system and display the non-genuine […]

    Reply

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: