Solved

Licensing?

Posted on 2004-04-20
3
156 Views
Last Modified: 2010-04-19
I'm trying to sell a copy of Windows 2003 Small Business Server standard edition.  I've installed and "registered" the copy once online. Yes, I've uninstalled it. I've been told I can call Microsoft and unregister the product to release my ownership effectively.

Q_20949819

However, when I did call the licensing number I got off their webiste, (800-426-9400) I was told it was not necessasry. That they only use it for marketing purposes.  This was from what I felt was a rather loose lipped rep from a outsource partner that MS paid to handle these calls.

We all know the licensing game/threat too well. My question is does this sound liget to you. Is there an email address I can use to can hard copy confirmation of this instead? Obviously this is a big deal to whom ever I try to sell it to.
0
Comment
Question by:Treasur2
3 Comments
 

Author Comment

by:Treasur2
ID: 10913800
Ok, I've gotten my answer(myself) from a newsgroup on microsoft. From a 'MS-MVP' whom I'm sure wouldn't post there with out being sureeeeeee he/she was/is correct.  Here it is.......




"What you heard is (mostly) correct.
If you have a retail copy of Windows, you are allowed to transfer the
license however you see fit, as long as you remove the software from your
computers and do not retain copies of it.  If you're already activated your
copy of Windows and still want to transfer it, you're allowed to do so.
There is no "deactivation" method, though.

When the person who buys your license tries to activate it, they may need to
call Microsoft, should the online activation fail.  If they do need to call
Microsoft, they just need to explain that the license was transferred / sold
to them, and that they now own the license. After that, they'll be given an
activation code."
0
 
LVL 5

Accepted Solution

by:
Netminder earned 0 total points
ID: 10945314
User resolved; closed, 500 points refunded.

Netminder
Site Admin
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

Organizations create, modify, and maintain huge amounts of data to help their businesses earn money and generally function.  Typically every network user within an organization has a bit of disk space to store in process items and personal files.   …
Recently, I had the need to build a standalone system to run a point-of-sale system. I’m running this on a low-voltage Atom processor, so I wanted a light-weight operating system, but still needed Windows. I chose to use Microsoft Windows Server 200…
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now