What If Windows 98 Had Activation?

Or: Yet Another Reason Why ‘Activation’ Is Bad

There are already loads of articles out there explaining why ‘product activation‘, which made it’s first appearance in a piece of Microsoft software in their release of Windows XP, is a bad thing. Product activation, which you may already have experienced, works by making a ‘fingerprint’ of the unique hardware identifiers of your computer’s makeup. This fingerprint, and your unique serial number, are sent to Microsoft either over the internet or using an automated telephone service, after which Microsoft give you a response code that allows Windows XP to work normally. The theory is that this prevents software piracy – if you allow a friend to use ‘your’ serial number, Microsoft will see that the same serial number is now being used with two different ‘fingerprints’ and will deny your friend access to Windows.

Of course, this also means that if you repeatedly make significant changes to your hardware configuration, or you reformat your hard drive, you have to re-activate, and if you do this ‘too frequently’, you’ll look like a pirate, even if you’re not. The ‘activation’ system has come under fire for many reasons: that the ‘fingerprinting’ process being an invasion of privacy is a popular reason. That it doesn’t actually stop determined pirates, but imposes a great inconvenience on many honest users is another. But I’ve not yet seen an article anywhere that suggests a major issue with the system that I thought of while in the shower this morning:

What If Windows 98 Had Activation?

I have several friends who still use Windows 98. And why not? Apart from the fact that it’s still built on top of MS-DOS, it’s a reasonable and functional operating system. More to the point, it does everything they want out of an operating system, and it’ll serve them for years to come.

Microsoft were originally to discontinue support for Windows 98 on January 16, 2004, but this date has since been extended. But let’s pretend that, like all computer software, this particular version is no longer supported (it’ll happen). What then?

Well – that’s not actually a problem: my friends who use Windows 98 can carry on using it for the rest of their lives. If they have any problems with it, they can’t go whinging to Microsoft, ‘cos Microsoft won’t care (is this that dissimilar to their “supported” products?), but they can use it forever and ever for as much as anybody cares. But here’s the problem: suppose my friend needed to ‘activate’ his Windows 98 installation: what would happen? One day, he installs a new network card and it asks him to re-activate, but the internet activation fails. When he calls up the telephone activation service, he gets a recorded announcement stating that his choice of operating system is no longer supported, and he has to go out and buy a new one (and, probably, a new computer, too – on which to run it).

This is a scary thought. If I set up a Windows 2003 Server today (also requires activation), I want it to still be working in a few years time (upgrades aside). Perhaps I’m using it to deploy a centralised database for my business (I recently came across a business who are still using a thirty-year old piece of hardware to manage their data, running an even older operating system) – with Windows activation: this kind of longevity is no longer an option.

And, of course, the scariest point: what happens if, in the future, Microsoft goes out of business. Do we all have to “throw away” our then-useless (well… I say then-useless) copies of Windows?

It’s all very, very scary.

Bush’s Foreign Friends

There’s a new googlebomb out, abusing the way that the popular Google search engine works. To see it in action, go to Google and enter “Bush’s foreign friends” (including the speechmarks) as the search term, and hit the “I’m Feeling Lucky” button.

On The Importance Of A Firewall

This is a graph showing the average amount of time between port scans against Windows boxen, and it’s change from last year to this year. It’s down from 40 minutes to 20 minutes over the last year.

If we take this and assume a few things:

(a) There will always be Windows security vulnerabilities – not an unreasonable assumption in a large piece of software like Windows, or any similarly large program.

(b) Windows security vulnerabilities will always be discovered and exploited long before they are patched by Microsoft – based on past experience, this is a fair statement.

(c) All of the script kiddies doing this port scans are knowledgeable in the most recent exploits against Microsoft Windows – a little pessimistic, perhaps, but with a several-month-long window (ahem) in which to exploit them before they get patched, acceptable.

Therefore, it can be assumed that a new Windows XP PC needs only to be online for 20 minutes before it becomes infected with a ‘push’ virus, contaminated with a trojan, or enslaved as a zombie. On a slow dial-up modem connection, that probably isn’t quite long enough to download a copy of ZoneAlarm

Jeez. Thank Dog for SP2.

Executable Stenography… With A Difference

Somebody’s come up with a program that hides secret messages in executable programs. Well… that’s not so impressive – we’ve all hidden secret messages in JPEG files before by using programs to ‘flip’ certain pixels (example). This works by changing the image in subtle ways that the human eye won’t detect, but that the descrambling application will. But here’s the clever bit…

Typically, when encoding a ‘hidden message’ in an executable, one ‘pads’ the file, making it bigger. The technique used when encoding messages in graphics files can’t be used with executables, because ‘flipping’ bits of the file would stop the program from working (or at least, working as it should), which may arouse suspicion. But this new tool works by exploiting redundancy in the i386 instruction set, swapping instructions or blocks of instructions for other ones which are functionally identical. As a result, the original filesize remains the same, and the program maintains full functionality. It would take an eavesdropper to fully compare the executable with a known original executable in order to determine that there was even a message hidden within it, and (thanks to Blowfish cryptography) yet more effort to decode that message.

Marvellous.

Thrashing

Thrashing is a computer science term referring to an undesirable occurrence in multiprocessing systems.

When a processor is given multiple jobs to do, it services them a little each in a round-robin fashion (assuming that no priority system is in effect), until each is done. This is, of course, actually significantly less efficient than doing each job one at a time, but doing a little of each job, a little at a time is more productive when dealing with humans, who like – for example – their web page to download at the same time as they write a Word document.

Unfortunately, optimizations to this system can cause it to go wrong. By giving the processor more and more jobs to do, it eventually passes a critical point at which it is spending more time performing administrative tasks and managing it’s ’round robin’ scheme than it is actually performing the tasks you want it to. You’ve probably seen a system doing this. The solution, of course, is to either stop giving the system jobs to do until it can finish some of those it already has, or, better still, to kill some of the running processes to enable the processor to catch up on it’s workload. The solution is not to click irritably on the buttons, or repeatedly demand more and more of the processor.

Today, I feel like a thrashed processor.

How To Keep Up With The Latest Happings On Scatmania (or What Are All Those Pretty Buttons?)

If you’re looking for a way to keep up-do-date with the latest Scatmania happenings, it’s now really really easy. I’ve enhanced my weblog with a heap of useful syndication tools that make keeping track of my latest activities a doddle, even for those of you who are unenlightened and can still be caught using an awful choice of web browser.

You may have noticed that at the bottom of the Scatmania menu there’s a series of button. Most of these buttons (the top five) relate to subscribing to Scatmania, like this:

RSS RSS is a popular format for syndicating news and views on the internet, supported by most weblog communities and applications, as well as by many news sites. To view RSS content, you will need an RSS Aggregator such as Pluck (a plug-in for Internet Explorer), RSSOwl (for most operating systems) or the attractive NewsMac for MacOS. The Opera web browser now supports RSS feeds, too, and it looks likely that other browsers will soon follow suit.
  • The RSS : Journal feed from Scatmania provides you with the latest blog entries, as they happen.
  • The RSS : Comments feed collates the newest comments and replies to my weblog entries.

RSS is a great way to keep up with your friends weblogs and your favourite news sites.

Atom ATOM, like RSS, is a simple way to keep up-to-date with your favourite sites. Just download an ATOM-enabled newsreader (some, like BottomFeeder, can read RSS feeds as well) and point it at the sites you want to watch. Scatmania publishes an ATOM feed of the latest blog entries.
ESF ESF is a small, fast, and simple new way to publish content like weblogs. There aren’t really any programs for reading it right now. Why not consider writing one (see how simple the data format is).
CDF CDF, developed my Microsoft as part of Internet Explorer 4, was supposed to be the future of the way we used the web and subscribed to the services of web sites… but it never took off. However, Internet Explorer to this day provides the means to subscribe to ‘active channels’, and for Internet Explorer users, this may be the easiest way to keep up with Scatmanian events. Just click the button in Internet Explorer and Scatmania will be added to your Favourites list as a submenu, automatically adding new items (and removing old ones) as new entries are added to the blog. Thanks to Aquarionics for suggesting this reincarnation of Internet Explorer ‘active channels’.

So, now you’ve got no excuse for not being up-to-date with my blog… or anybody elses!

The other buttons are mostly just me showing off because I can write standards-compliant code – click on them and see for yourself.

1984 Revisited: What If Apple Took The ‘Microsoft Route’

Daring Fireball has an article about “Apple vs. Microsoft” with a difference. Contrary to many, he argues that if Apple had taken the ‘Microsoft route’ in 1984, with their hardware and software (significantly superior to IBM-PC platforms running Microsoft software), by licensing the platform, they wouldn’t necessarily be the market leader today. It’s a well-written and compelling article, and if you’ve any interest in OS politics or parallel universes, it’s worth a look.

SURGEON GENERAL’S WARNING: Competing Directly Against Microsoft May Be Hazardous to Your Company

Windows Security

Just recieved the following error message from Windows, while trying to connect to a shared directory elsewhere on the network… have never seen one like it before, so I thought I’d share it with you:

Windows Error Message: The System Detected A Possible Attempt To Compromise Security. Please ensure that you can contact the server that authenticated you.

Oh, so now I’m a hacker? Thanks, Windows.

Computer Hardware For Sale: Bargain Prices

Overclockers Australia is running an article, collecting together advertisements for computer hardware and software over the last quarter of a century. I’ve pulled out a few of my favourites:

  • 1989 Tandy 500 MC Professional – only $8499; VGA graphics, 386/20MHz, 2MB RAM – this computer’s a real beast: and what a bargain!
  • Late-80’s Portable Computer – just $2295; 8" (monochrome) screen, CP/M (w/ WORDSTAR, MAILMERGE, and SUPERCALC). Has 64K of RAM and not one but two floppy disk drives (double-density)!
  • Looking to increase your hard storage space (this means you, Paul)? There’s a 10-MB Hard Disk (sold in 1981) for the sweet price of $3398! Yes, that’s 10 megabytes, not gigabytes. About the same size as a modern desktop computer CD-ROM drive, and with a slower seek time.
  • TRS-80 Model 16 (wonderful piece of hardware) for just $8499: 128K of RAM, dual-processors (one MC68000, one Z-80), multi-processing, page-capable memory model, optional 8MB HDD, two serial and one parallel port, and an 80×24 character 30.5cm green screen. Add a second floppy drive for just $500 more!

Those offers sound fresh! I think I’ll see if I can get a trade in against Duality…

64-Bit Columbine

Toy… Phill from work has gotten himself a sweet new AMD64 processor; I went round to help him install it after he thought he’d broken it during assembly (turns out he’d missed a power lead and hadn’t fully locked the processor into it’s socket). Jeez; those 64-bit processors have a heap of pins (as one might expect). Runs pretty cool, though.

Claire, Paul, Bryn, and I watched Bowling For Columbine yesterday evening. Most of us’d seen it before, but it’s worth a second look. We came to the eventual conclusion that Michael Moore‘s films are all about the shock value, and that his books carry a far more meaningful (and less biased) examination of the topics… and that this choice was made because to get through to the “stereotypical American white male”, he feels that you need to shock them with a film. Would his books get to the people who he felt needed them without the films to ‘get the foot in the door’.

Gonna be a long week at work.

Reb’s Back

Looks like I am making a regular reader out of Reb, my ex-. She posted another comment today. This time I’d improved the trace algorithm already (mostly out of curiosity). She’s connecting from her Tiscali IP (80.40.255.212). There’s no (meaningful) firewall running on the connection, and ports 439 (DASP), 445 (Microsoft-DS) [that could be interesting], 1723 (PPTP), 2001 (DC), and 6001 (X11:1) are open for incoming traffic (although the first two are filtered). Interesting that there’s a PPTP and X11 server running at that IP… looks like it’s probably a business server. Might see if I can probe it a little further… that wide-open port 445 looks like an interesting entrance…