Solved

CPUID and Or Motherboard ID

Posted on 2004-09-04
7
445 Views
Last Modified: 2010-04-11
How do I go about disabling the CPUID and or Motherboard ID on a P4 running windows xp pro? Step by Step please :}
0
Comment
Question by:pserviss
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
7 Comments
 
LVL 7

Accepted Solution

by:
LimeSMJ earned 500 total points
ID: 11982032
0
 
LVL 23

Expert Comment

by:Tim Holman
ID: 11984791
Why do you want to do this ?
0
 
LVL 7

Expert Comment

by:Jenn3
ID: 11987032
I was examining this issue a while back and here's my understanding.

The Processor ID is a thing of the past in P3 and is by default disabled at BIOS level.

Motherboard ID is usually the manufacturer identification string. Good manufacturer usually include this on the board.

For security purpose, some developers and third parties such as Ionworx sells or include it in their software. The tricky thing is that it cannot be disabled or blocked (unless it's in a BIOS setting) in most cases due to the nature of the ID being burnt onto the board.

Important:
Some security mechanism doesn't even need to look for the ID, instead they relied upon Hardware Characteristics of key component such as a processor's model, step, revisions or a motherboard feature.This is then follow by some Hashing (MD5, SHA1 and etc.) algorithm to generate some kind of fingerprint.
0
 
LVL 23

Expert Comment

by:Tim Holman
ID: 11988454
All depends what you want to avoid.  Disabling CPUID will not help you run unlicensed software, if that's what is intended ?
Neither will it stop people from tracking down illegal activities to your machine.
0
 
LVL 7

Expert Comment

by:LimeSMJ
ID: 11988504
http://www.cdt.org/privacy/issues/pentium3/
http://www.wired.com/news/politics/0,1283,35950,00.html

Illegal or legal computing issues aside... the CPU ID was a bad idea.  Privacy, hacking, directed marketing (SPAM), etc.. ugh.  It would have been ugly.
0

Featured Post

Increase Agility with Enabled Toolchains

Connect your existing build, deployment, management, monitoring, and collaboration platforms. From Puppet to Chef, HipChat to Slack, ServiceNow to JIRA, Splunk to New Relic and beyond, hand off data between systems to engage the right people.

Connect with xMatters.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, close monitoring is a must. According to WhiteHat Security annual report, a substantial number of all web applications are vulnerable always. Monitis offers a new product - fully-featured Website security monitoring and pr…
The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others.  This conference is aimed mainly at government agencies.  So it addresses the various compli…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…

690 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question