Solved

How to protect and/or hide product key on a desktop?

Posted on 2006-10-28
7
945 Views
Last Modified: 2013-12-04
Hi.

We've run into an interesting situation - is there a way to protect / hide / encrypt a product key on XP Pro SP2?  Basically, what I want to do is prevent someone from downloading a little program to extract the product key from an installed system.  I'm just not sure how to do it, or if it can even be done.

Any help and/or suggestions would be most appreciated.  
0
Comment
Question by:navigator010897
7 Comments
 
LVL 54

Accepted Solution

by:
McKnife earned 125 total points
ID: 17825409
I bet this can only be done with admin rights. Try to run rockxp for example without admin rights, it will fail.
This is the same for hashed passwords.
0
 
LVL 15

Expert Comment

by:plimpias
ID: 17825563
Like McKnife said. if you give the user non admin rights they wont' be able to do this


Giving users non admin rights is best practice, it the case that users need access to certain things. It is recommended that you enable group policy and set the permissions to the things they needs.

Always work with computers locked down, and unlock the things you need

Never work with computers unlocked, and start locking it down

Meaning non-admin and admin rights.

Along with key extraction there are several other things that the user with admin can do.

Install a sniffer on the networ, extract passwors from the machine, get ALL product keys for the computer, install keyloggers, viruses, spyware......the list goes on

I would recommened like McKnife said that do not give the users admin rights.
0
 
LVL 1

Author Comment

by:navigator010897
ID: 17825749
In most areas of the network, that is how we normally do it.  The problem is, in this particular classroom setting, the students are studying for network certification.  So, due to the rights they require to be able to do some of the labs, this is not necissarily an option.  

Is there another way to prevent the product id from being obtained?
0
The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

 
LVL 15

Assisted Solution

by:plimpias
plimpias earned 125 total points
ID: 17825826
For classrooms i tend to setup virtual PC's with 180 Day eval license.

Virtual PC is now free

But to answer your questions, no. There are plenty of tools that allow you to extract the already encrypted key.
0
 
LVL 54

Expert Comment

by:McKnife
ID: 17826441
It is stored encrypted in
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\DigitalProductId
You could turn on auiting on that registry branch.
Another way would be to delete that key (after saving it). But some applications might need it, at least the wga check.
0
 
LVL 1

Expert Comment

by:Computer101
ID: 21091581
Forced accept.

Computer101
EE Admin
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

685 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question