Disclaimer: I’ve written this article for educational purpose only! Introduction While using a duplicate or a cracked copy of operating systems or some application softwares, some time we get a message from the software vendor that “You Are Using A Duplicate Copy of XXXX Software!” and then the cracked SW or OS gets blocked or some features of the software gets blocked or the particular application software stops working! Now what to do? For solving this problem you may re-install the application software or you can re-install you OS, but if you maintain some simple steps, you may avoid this type of duplicate software detection! What’s the matter? Actually, now-a-days, all the application software has a feature that allows updating it automatically! For this job, every time you connect to the internet, the SW connects it self to its server, so while it contacts with its server, every time it check the serial number or the registration info with the server’s database! Now, the server holds two type of serial’s database, one is of the original serials and another is of blacklisted serials which have detected previously by itself as fake serial! And if your serial or registration info belongs to the blacklisted database or not matched with the original database, then the software gives the message “You Are Using A Duplicate Copy of XXXX Software!” What To Do? Simply, you have to turn off the automatic updating feature, which is available at the ‘options’ of the SW! Now, here is another process to stop contacting the server of the SW, you need to re-configure your operating system’s host file, which is a small database of website addresses and their IPs! To do so [In Windows] Go “My Computer -> C: -> Windows -> System32 -> Drivers -> Etc -> Open The “Host” File Using Notepad” Now, in every line, write the targeted web address and then give a tab and write IP 127.0.0.1 – this will block this particular websites on your PC! Now in case of operating systems, simply turn off the firewall and the automatic updating feature!
This will fail in case of Antivirus,where in u have to update the database. for other programs its a nice trick.
Yes they can. But the antivirus creators had done it in a different way to detect fake keys. I'll just tell about kaspersky AV. I don't know whether all Av's has similar things like this. In case of Kaspersky AV, even if u download the database manually and update it, it will show "You are using a Blacklisted key, Please purchase Kaspersky". they have mechanisms like this. They are integrating it with updates too.
I am sure many have you have read about "Hacked / Defaced with shells", So I am pretty sure that the first thing that comes to your mind is "What the heck are these shells?" . So this article would give you complete idea about shells and its use.
I am sure many have you have read about "Hacked / Defaced with shells", So I am pretty sure that the first thing that comes to your mind is "What the heck are these shells?" . So this article would give you complete idea about shells and its use.
Yeah I agree wit you. And I think by implementation of the following tips, one can do it effectively.
WOW! with this I will be able to use some more hacked software. Just kidding. Nice information you have shared mate.