Solved

How to protect and/or hide product key on a desktop?

Posted on 2006-10-28
7
935 Views
Last Modified: 2013-12-04
Hi.

We've run into an interesting situation - is there a way to protect / hide / encrypt a product key on XP Pro SP2?  Basically, what I want to do is prevent someone from downloading a little program to extract the product key from an installed system.  I'm just not sure how to do it, or if it can even be done.

Any help and/or suggestions would be most appreciated.  
0
Comment
Question by:navigator010897
7 Comments
 
LVL 54

Accepted Solution

by:
McKnife earned 125 total points
ID: 17825409
I bet this can only be done with admin rights. Try to run rockxp for example without admin rights, it will fail.
This is the same for hashed passwords.
0
 
LVL 15

Expert Comment

by:plimpias
ID: 17825563
Like McKnife said. if you give the user non admin rights they wont' be able to do this


Giving users non admin rights is best practice, it the case that users need access to certain things. It is recommended that you enable group policy and set the permissions to the things they needs.

Always work with computers locked down, and unlock the things you need

Never work with computers unlocked, and start locking it down

Meaning non-admin and admin rights.

Along with key extraction there are several other things that the user with admin can do.

Install a sniffer on the networ, extract passwors from the machine, get ALL product keys for the computer, install keyloggers, viruses, spyware......the list goes on

I would recommened like McKnife said that do not give the users admin rights.
0
 
LVL 1

Author Comment

by:navigator010897
ID: 17825749
In most areas of the network, that is how we normally do it.  The problem is, in this particular classroom setting, the students are studying for network certification.  So, due to the rights they require to be able to do some of the labs, this is not necissarily an option.  

Is there another way to prevent the product id from being obtained?
0
Migrating Your Company's PCs

To keep pace with competitors, businesses must keep employees productive, and that means providing them with the latest technology. This document provides the tips and tricks you need to help you migrate an outdated PC fleet to new desktops, laptops, and tablets.

 
LVL 15

Assisted Solution

by:plimpias
plimpias earned 125 total points
ID: 17825826
For classrooms i tend to setup virtual PC's with 180 Day eval license.

Virtual PC is now free

But to answer your questions, no. There are plenty of tools that allow you to extract the already encrypted key.
0
 
LVL 54

Expert Comment

by:McKnife
ID: 17826441
It is stored encrypted in
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\DigitalProductId
You could turn on auiting on that registry branch.
Another way would be to delete that key (after saving it). But some applications might need it, at least the wga check.
0
 
LVL 1

Expert Comment

by:Computer101
ID: 21091581
Forced accept.

Computer101
EE Admin
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
OfficeMate Freezes on login or does not load after login credentials are input.
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question