Solved

How to protect and/or hide product key on a desktop?

Posted on 2006-10-28
7
927 Views
Last Modified: 2013-12-04
Hi.

We've run into an interesting situation - is there a way to protect / hide / encrypt a product key on XP Pro SP2?  Basically, what I want to do is prevent someone from downloading a little program to extract the product key from an installed system.  I'm just not sure how to do it, or if it can even be done.

Any help and/or suggestions would be most appreciated.  
0
Comment
Question by:navigator010897
7 Comments
 
LVL 53

Accepted Solution

by:
McKnife earned 125 total points
ID: 17825409
I bet this can only be done with admin rights. Try to run rockxp for example without admin rights, it will fail.
This is the same for hashed passwords.
0
 
LVL 15

Expert Comment

by:plimpias
ID: 17825563
Like McKnife said. if you give the user non admin rights they wont' be able to do this


Giving users non admin rights is best practice, it the case that users need access to certain things. It is recommended that you enable group policy and set the permissions to the things they needs.

Always work with computers locked down, and unlock the things you need

Never work with computers unlocked, and start locking it down

Meaning non-admin and admin rights.

Along with key extraction there are several other things that the user with admin can do.

Install a sniffer on the networ, extract passwors from the machine, get ALL product keys for the computer, install keyloggers, viruses, spyware......the list goes on

I would recommened like McKnife said that do not give the users admin rights.
0
 
LVL 1

Author Comment

by:navigator010897
ID: 17825749
In most areas of the network, that is how we normally do it.  The problem is, in this particular classroom setting, the students are studying for network certification.  So, due to the rights they require to be able to do some of the labs, this is not necissarily an option.  

Is there another way to prevent the product id from being obtained?
0
Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

 
LVL 15

Assisted Solution

by:plimpias
plimpias earned 125 total points
ID: 17825826
For classrooms i tend to setup virtual PC's with 180 Day eval license.

Virtual PC is now free

But to answer your questions, no. There are plenty of tools that allow you to extract the already encrypted key.
0
 
LVL 53

Expert Comment

by:McKnife
ID: 17826441
It is stored encrypted in
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\DigitalProductId
You could turn on auiting on that registry branch.
Another way would be to delete that key (after saving it). But some applications might need it, at least the wga check.
0
 
LVL 1

Expert Comment

by:Computer101
ID: 21091581
Forced accept.

Computer101
EE Admin
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

As I write this article, I am finishing cleanup from the Qakbot virus variant found in the wild on April 18, 2011.  It was a messy beast that had varying levels of infection, speculated as being dependent on how long it resided on the infected syste…
Recently, I read that Microsoft has analysed statistics for their security intelligence report. It revealed: still, the clear majority of windows users do their daily work as administrator. An administrative account is a burden, security-wise. My ar…
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
When you create an app prototype with Adobe XD, you can insert system screens -- sharing or Control Center, for example -- with just a few clicks. This video shows you how. You can take the full course on Experts Exchange at http://bit.ly/XDcourse.

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now