<<< Date Index >>>     <<< Thread Index >>>

[IP] more on Windows Genuine Advantage First hand Experience





Begin forwarded message:

From: Rahul Tongia <tongia@xxxxxxxxxxxxxx>
Date: June 15, 2006 5:25:43 PM EDT
To: dave@xxxxxxxxxx
Subject: Re: [IP] Windows Genuine Advantage First hand Experience

Dave,

One more data point to add to this thread...

I had to update my MS-Office 2000 for the *critical* security update today, and even though the tools online supposedly allow you to download larger files that then don't require the installation CDs, I had dig out the CDs when it kept asking for a Data1.msi file. Bleah. I don' keep installation CDs on me, and I doubt most people do, either.

I'm not saying I know an easy answer to how to manage anti-piracy with security, but it MUST be better than this!

Rahul

--On Thursday, June 15, 2006 11:04 AM -0400 David Farber <dave@xxxxxxxxxx> wrote:



Begin forwarded message:

From: Robert Grosshandler <rob@xxxxxxxxx>
Date: June 15, 2006 10:26:52 AM EDT
To: dave@xxxxxxxxxx
Subject: Windows Genuine Advantage First hand Experience

Yesterday, I had the pleasure of a system I purchased myself being
targeted
by WGA as being "bad". The system had been repaired, who knows what had been done to the drive. Plus, it had been out of my hands for a while,
so
it is possible the Windows product key had been "borrowed" and used
elsewhere.

The process to become "good" again was a bit tedious, but not terrible.
Mostly tedious because the keys used are so long.

First, the system told me it was "bad" when I did Microsoft Update.
Following the links in the page telling me of this unfortunate news, I
found
a link to a tool to let me re-enter the Product Key (from the sticker on
the
laptop).

Reboot.

Still bad.

New screen from validation process, which had a very long key on it, plus
localized toll free telephone number to call.

Call the automated system. Enter very long key. (Really good automated
system, fwiw.)  Still bad.

Get automatically routed to a person (in India it sounded like, but no
language issues.)

Read code to person.

He asked me how many computers were using this key (just this one),
model of
computer, where purchased, when purchased. He did NOT ask me personally
identifiable info.

He read me back long code.  Enter code.  System now "good".

Throughout, I was given the presumption of innocence, never did I feel
"guilty of stealing".

Whole process took maybe a half hour, including the reboot.

News from the front.


Rob

=================================
Robert N. Grosshandler
www.iGive.com

Turn your online shopping into philanthropy for your favorite cause


---
[This E-mail scanned for viruses by Declude Virus]



-------------------------------------
You are subscribed as tongia@xxxxxxxxxxxxxx
To manage your subscription, go to
  http://v2.listbox.com/member/?listname=ip

Archives at:
http://www.interesting-people.org/archives/interesting-people/





-------------------------------------
You are subscribed as roessler@xxxxxxxxxxxxxxxxxx
To manage your subscription, go to
 http://v2.listbox.com/member/?listname=ip

Archives at: http://www.interesting-people.org/archives/interesting-people/