A lot of people, really ungrateful. Knowingly piracy is illegal, or knowingly breaks. So since you asked me, as a messenger of peace in the Software department, in order to avoid all of us "do not understand is snapped" mentality, to explain what is your mouth "KMS activation."
First, answer the questions of most people: keys, pronunciations (Mìyào), which refer to the special code needed for decryption.
KMS, full name key Management Service. A lot of people may not know that KMS is actually Microsoft officially recognized as a way of system activation. This mode of activation is mainly used for bulk activation of enterprise computers. For example, your company has bought 3000 identical desktops, but there are no built-in OEM systems for the machines. What about this? As a result, you will need a system administrator, the system administrator, to purchase a bulk activation key with your company's ticket (that is, the volume Key,vol key, which is often seen, must be very expensive). However, the key is still not enough Ah, there is not always 3000 machines a set of power-on settings input key to activate it? At this point the advantages of KMS are reflected. The administrator needs to set up an activation server (activation server) and install KMS clients on each client to enable bulk activation and management. That is, administrators can not only remotely activate your computer, but can also remotely deactivate or even control your computer.
Let's use the diagram to explain:
Well, that's probably it.
So what do you do with software that claims to be able to activate Windows for free (such as KMS Pico, ponies, etc.)? I did some searching and found that the algorithms used by these software are three different:
1. Create a virtual task on the local computer, unlimited trial system (low level, easy to be blocked)
2. Use the software developer's activation server to activate (advanced, not easily blocked)
3. Establish a Virtual activation server (service) on the local computer and send an activated analog signal (intermediate)
However, every algorithm has its drawbacks. The first unlimited trial, Microsoft as long as easy to give you a patch you are finished, no difficulty; in the second case, if Microsoft finds out that your activation of the server's illegal use will also directly kill the key, all the computers activated from the server will appear inactive; Finally, Microsoft has taken steps to Not only does Windows Defender report Poison, it also deletes the task directly when the system is updated.
Some people say that these are temporary problems, if the activation of the new cracked just fine. Let's look at the more serious problem: When your computer is activated remotely, it usually shows:
What do you mean? That means your system is no longer yours-it becomes a team or administrator. Don't take it for granted--an administrator can do more than that, copying data to collect information is a piece of cake, and it's even more powerful to reset your system directly and retain the privileges of the KMS. Maybe one day the developer of KMS Pico was unhappy and pressed the red button ...
So, it's not a superiority, it's not brain-black. With genuine, use to rest assured, in the mind also steadfast.