Solved

How to protect and/or hide product key on a desktop?

Posted on 2006-10-28
7
941 Views
Last Modified: 2013-12-04
Hi.

We've run into an interesting situation - is there a way to protect / hide / encrypt a product key on XP Pro SP2?  Basically, what I want to do is prevent someone from downloading a little program to extract the product key from an installed system.  I'm just not sure how to do it, or if it can even be done.

Any help and/or suggestions would be most appreciated.  
0
Comment
Question by:navigator010897
7 Comments
 
LVL 54

Accepted Solution

by:
McKnife earned 125 total points
ID: 17825409
I bet this can only be done with admin rights. Try to run rockxp for example without admin rights, it will fail.
This is the same for hashed passwords.
0
 
LVL 15

Expert Comment

by:plimpias
ID: 17825563
Like McKnife said. if you give the user non admin rights they wont' be able to do this


Giving users non admin rights is best practice, it the case that users need access to certain things. It is recommended that you enable group policy and set the permissions to the things they needs.

Always work with computers locked down, and unlock the things you need

Never work with computers unlocked, and start locking it down

Meaning non-admin and admin rights.

Along with key extraction there are several other things that the user with admin can do.

Install a sniffer on the networ, extract passwors from the machine, get ALL product keys for the computer, install keyloggers, viruses, spyware......the list goes on

I would recommened like McKnife said that do not give the users admin rights.
0
 
LVL 1

Author Comment

by:navigator010897
ID: 17825749
In most areas of the network, that is how we normally do it.  The problem is, in this particular classroom setting, the students are studying for network certification.  So, due to the rights they require to be able to do some of the labs, this is not necissarily an option.  

Is there another way to prevent the product id from being obtained?
0
Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

 
LVL 15

Assisted Solution

by:plimpias
plimpias earned 125 total points
ID: 17825826
For classrooms i tend to setup virtual PC's with 180 Day eval license.

Virtual PC is now free

But to answer your questions, no. There are plenty of tools that allow you to extract the already encrypted key.
0
 
LVL 54

Expert Comment

by:McKnife
ID: 17826441
It is stored encrypted in
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\DigitalProductId
You could turn on auiting on that registry branch.
Another way would be to delete that key (after saving it). But some applications might need it, at least the wga check.
0
 
LVL 1

Expert Comment

by:Computer101
ID: 21091581
Forced accept.

Computer101
EE Admin
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In today's information driven age, entrepreneurs have so many great tools and options at their disposal to help turn good ideas into a thriving business. With cloud-based online services, such as Amazon's Web Services (AWS) or Microsoft's Azure, bus…
Users of Windows 10 Professional can disable automatic reboots using the policy editor. This tool is not included in the Windows home edition. But don't worry! Follow the instructions below to install (a Win7) policy editor on your Windows 10 Home e…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…

860 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question