Windows Vista permission type, Initial Exploration

Source: Internet
Author: User

 

550) This. style. width = 550; If (this. Height> 550) This. style. width = (this. Width * 550)/This. height; ">

After Microsoft went public on Windows Vista, Volume activation 2.0 was introduced to lower-level versions!

In the past, the convenience of using OEM or Vol to grant a large number of permission versions will be limited! Once again, it is proved that the consumers who pay the money are the most inconvenient to use!

550) This. style. width = 550; If (this. Height> 550) This. style. width = (this. Width * 550)/This. height; ">

At this moment, let's briefly explain the differences in the active activation methods of various Vista regions:

550) This. style. width = 550; If (this. Height> 550) This. style. width = (this. Width * 550)/This. height; ">

◆ Individual users

It is the consumer of Vista, which directly goes to the store or online store, just like the micro-product to be activated, individuals using Home Basic, Home Premium, and ultimate versions can activate them manually through the Internet or by calling them, windows Vista requires activation within 30 days.

◆ OEM authorization

Or when a personal phone is installed with Vista, in the OEM version of Windows Vista, The SLIC information in the hardware system BIOS will be checked to determine whether the hardware system contains legal authorizations. In the past Windows XP, you can modify and refresh the BIOS to verify that the OEM version of Windows recognizes any hardware system as a system with authorized permissions, microsoft has made new technical restrictions on this method.

However, this is the most popular forum in February. The original Vista OEM version does not recognize the SLIC information of BIOS, according to the version sequence entered by the user, the certificate in the security case (1000xx. xrm-MS) to re-override the certificate, and then use slmgr. vbs-ILC certificate used for activation! When it comes to the relevant content, you can find a lot of theoretical content and downstream content on the Internet.

After introducing the two versions that consumers will encounter, discuss the sequence control of Vista Business and Enterprise in the industry:

550) This. style. width = 550; If (this. Height> 550) This. style. width = (this. Width * 550)/This. height; ">

As we said at the same beginning, the maximum sequence vulnerability in Windows XP is more convenient than the OEM version, except for the OEM version, there are a large number of permission granting orders in vol. This part really comes from the enterprise's outbound order, but it is the school's permission granting part of each school!

Windows Vista does not provide unlimited granting of permissions because of the volume license key (vlk) leakage in Windows XP, instead, it is resolved as VL 2.0 (volume license 2.0). There are two solutions:

◆ Multiple activation keys (multiple activation keys), which provide limited authorizations for small organizations or single-host users (for example, 10 PCs ). Each product has its own allowable volume of dynamic data. If the amount of dynamic data is large, the excessive volume of dynamic data will cause the consumption of dynamic data sets, no more actions will be available!

The Mak can manage each system under a given sequence. Its dynamic route through the Internet or telephone lines, each computer must be directed back to Microsoft's dynamic customer service center, a dynamic Microsoft Server is installed, the dynamic dataset area will be small. The good thing about the Mak operation is that it can automatically specify and modify the gold medal, and does not need to be updated on a regular basis.

◆ Volume license key-Management Service (volume license key-Management Service) is provided to more than 25 computers to access the network of the group.

The Kingdom Management Service (KMS) allows organizations to manually update their computers in the managed environment without the need to manually update Microsoft. The system administrators of the Organization can use the kms token to manage the service on the hosts controlled by the Organization. KMS is mainly used in managed environments. Windows Vista's computer will be moved to the central computer of the kms server.

In the mks solution, a computer must be built as a kms server (Windows Vista or Longhorn server) and activated immediately, for other Windows Vista client systems, request a verification certificate and an action from this kms instance, and operate on the VM) systems in the environment can also use kms to drive, but they do not increase the number of systems. This solution combines the Business and Enterprise versions of Vista.

After an event is triggered, the user must renew the event to the kms host at least every 180 days to update the event. When the user side is not yet active, it will crash and the kms host will crash every two hours (the time is configurable. Once triggered, they will wait every seven days (Time is configurable) until they reach the kms host, if it succeeds, it will update its 180-day life cycle. When using a kms-triggered kms client, you must periodically update the manual operation. If they fail to log on to the kms host after 180 days, they will enter the 30-day period, they will enter the refined function mode (RFM) until the master and kms are successfully renewed, or until the Mak is installed, and the system has been moved through the connected or telephone mode. This function prevents the computers that have been removed from the Organization from being operated without permission granting. Just need a taxi!

I hope the above information will help you.

However, as you can imagine, the more Windows users use it, the more difficult it is to pay for it!

 

550) This. style. width = 550; If (this. Height> 550) This. style. width = (this. Width * 550)/This. height; ">

Windows Vista volume activation 2.0 Technical Guidance

  • Used for the Mak architecture, please refer to volume activation management tool (vamt) 1.0
  • For kms architecture usage, please refer to using Key Management Service (x86) for Windows Server 2003 SP1

Microsoft has launched a convenient automatic security suite (Windows AIK) in addition to ghost, which we are familiar with in the past) you can assist in security, self-built, and deployment of the Microsoft Windows Vista family's production systems and go to the official Chinese version of the following website.

550) This. style. width = 550; If (this. Height> 550) This. style. width = (this. Width * 550)/This. height; ">

[Materials for examination]

Microsoft technet-Windows Vista volume activation 2.0 technical guidance technical guidelines, English version
Microsoft technet-Windows Vista volume activation 2.0: FAQ, English version
Microsoft technet-Windows Vista volume activation 2.0 step-by-step guide

Microsoft technet-certificate migration from Key Management Service and key recovery at Microsoft
Microsoft technet-Introduction to Windows PE

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.