64 captures
27 May 2007 - 27 Jan 2026
Apr MAY Jun
27
2006 2007 2008
success
fail
About this capture
COLLECTED BY
Organization: Alexa Crawls
Starting in 1996, Alexa Internet has been donating their crawl data to the Internet Archive. Flowing in every day, these data are added to the Wayback Machine after an embargo period.
Collection: 41_crawl
this data is currently not publicly accessible.
TIMESTAMPS
The Wayback Machine - https://web.archive.org/web/20070527075709/http://www.computerworld.com:80/action/article.do?command=viewArticleBasic&articleId=9004970
Home
News
E-mail Newsletters
Tech Dispenser
Shark Bait
Knowledge Centers
Opinion/Blogs
Webcasts
Podcasts
White Papers
Computerworld Reports
Zones
RSS Feeds
Events
Print Subscriptions

Subscribe to our e-mail newsletters
For more info on a specific newsletter, click the title. Details will be displayed in a new window.
Computerworld Daily News (First Look and Wrap-Up)
Computerworld Blogs Newsletter
The Weekly Top 10
More E-Mail Newsletters

Subscribe to Computerworld
40 years of the most authoritative source of news and information for IT leaders.

The Skinny on Windows SPP and Reduced Functionality in Vista

What's the truth about Microsoft's controversial new antipiracy measure?
Scot Finnie Today's Top Stories or Other Software Stories

Sign up to receive Security Resource Alerts

November 10, 2006 (Computerworld) -- One aspect of Microsoft's Windows Vista operating system that has raised users' hackles is its new antipiracy system, called Software Protection Platform (SPP). To understand SPP, it's necessary to take a few steps back. Microsoft began its aggressive campaign against software piracy in Office XP and Windows XP with functionality called Office product activation (OPA) and Windows product activation (WPA).

In July 2005, Microsoft unleashed Windows Genuine Advantage (WGA), which required users of Microsoft's Windows Update, Microsoft Update and Microsoft Download pages to install the first component of WGA, subsequently dubbed WGA Validation. One of the first pieces of software requiring a WGA check was Windows Defender. At that time, Microsoft began requiring that you either install WGA Validation or not use any of Microsoft's download sites. (It was still possible to get Microsoft's security patches through Windows XP's Automatic Updates without installing WGA Validation.)

WGA Validation is a piece of code that runs in Windows and that determines all on its own whether the installed copy of Windows it's running in might have been pirated or improperly authorized. Earlier this year, Microsoft delivered the second component of WGA, called WGA Notifications. Its purpose is to inform the user that WGA Validation has found a problem with the installed copy of Windows. It also tries to help the user find a solution, including asking for money to relicense Windows.

WGA Notifications ran into a buzz saw of criticism when an early version of it reconnected with Microsoft servers in the background on a daily basis. Even more important, there was a wave of reported false positives. WGA Notifications is technically an optional install from Windows Update or Automatic Updates, but the manner in which you choose not to receive it is not intuitive for most users.

WPA and WGA work together on Windows XP machines they're installed on. WGA is also capable of running solo on Windows 2000 computers.

Enter Windows Vista. Microsoft took the opportunity of a new Windows release to unify the processes of WPA, WGA Validation and WGA Notifications. Possibly because of the bad press WGA received over the summer, Vista's new antipiracy system is called Software Protection Platform.

The most overt change in SPP is that Microsoft's antipiracy measures now have an enforcement action. Whereas WGA Notifications just nagged you, with little negative fallout other than the nagging itself, SPP carries a big stick. After numerous warnings and a grace period, SPP will automatically and without option force Windows Vista into what Microsoft terms "reduced functionality mode" (RFM).

How SPP works

Perhaps because many of the early reports about SPP and RFM were based on a series of whirlwind press briefings, an online FAQ, and later a white paper (download Word document), a lot of conflicting reports included different descriptions of how RFM works. We asked Microsoft to provide some clarity on SPP and RFM. Here are the company's answers, relayed by its public relations firm:

CW: What exactly is SPP's reduced functionality mode?

Microsoft: When a user enters RFM, the default Web browser will be started and the user will be presented with an option to purchase a new product key. There is no start menu, no desktop icons, and the desktop background is changed to black. The Web browser will fully function and Internet connectivity will not be blocked. After one hour, the system will automatically log the user out. It will not shut down the machine, and the user can log back in.

Continued...
1 | 2 | NEXT



Print this Story Send Us Feedback E-mail this Story Digg this Story Slashdot this Story

" Celebrate Towel Day by reading Friday's IT Blogwatch: in which Dell finally starts selling Ubuntu Linux PCs...." Read more...
" How could I have been so stupid? What I thought would be a simple test of Kodak's EasyShare..." Read more...
Read more Software posts or See all Blogs

Readers question 'dead skills' list
Readers throw other technologies on the pyre
Symantec may compensate Chinese users hit by buggy update
More top stories...
Apple fixes 17 Mac OS X flaws
Nudity in 'Halo 2' escapes Microsoft's notice
Study: U.S. online ad spending up 35% to $17B in 2006

We fondly recall 21 overpromoted products and technologies that utterly failed to live up to their hype. You choose the biggest flop of all.
Cell phone calls are banned from flights because neither the airlines nor the government nor the wireless carriers want it. Here's why.
We put four of the leading external hard drives to the test and found remarkable differences between the models.
Just because an extension is popular doesn't mean it belongs in your Web browser.
Tech Dispenser is Computerworld's new human-powered technology blog network and news aggregator, with sites and links hand-selected by Computerworld's editors.
What's hot now:

Reviews, analyses, how-tos, visual tours, hot issues and predictions about Microsoft's new OS.
Four years from now, the IT field will be a vastly different place. Will you be ready?
All Zones
Customer Experience Management Zone
Sybase iAnywhere Zone
Open iSCSI SAN Zone
Server Management Zone
The SAS Zone
The SOA Zone
Software Zone
Storage Consolidation Zone




See your link here
The Frenetic Pace of Wireless
Download this Executive Briefing today!
(Source: Computerworld) The rise of mobile and wireless in the enterprise has brought about the rise of new security threats  and strategies to deal with them. Get the full Computerworld report (a $195 value) free for a limited time, compliments of Nokia.
Download this executive briefing
How SMBs Eliminate IT Threats with Proactive Security
How SMBs Eliminate IT Threats with Proactive Security
Watch this on demand webcast!
Go to the webcast
ROI Case Study: Cognos and Avaya
Get this case study now
(Source: Cognos) This case study shows that by extending its Cognos deployment to its value chain operations, Avaya obtained visibility into global operations, protected itself from a supply disruption, and improved worker productivity.
Download this white paper
White Papers
Read up on the latest ideas and technologies from companies that sell hardware, software and services.
Dell PC Deployment Optimization Model
Data Activity Auditing for SOX: An Auditor's Perspective
Complimentary Security Kit: Proactively Protecting Your Customers from Phishing Attacks
View more whitepapers

About Us Advertise Contacts Editorial Calendar Help Desk Jobs at IDG Privacy Policy Reprints Site Map
CIO Computerworld CSO GamePro Games.net IDG Connect IDG World Expo Infoworld
JavaWorld LinuxWorld MacUser Macworld Network World PC World Playlist
Copyright (c) 2007 Computerworld Inc. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of Computerworld Inc. is prohibited. Computerworld and Computerworld.com and the respective logos are trademarks of International Data Group Inc.