What is KMS activation?

  

A lot of people, I really don’t know how to be good. Knowing that piracy is illegal, it is still illegal to know the law. So since you asked, I, as the peace messenger of the software department, in order to avoid everyone's mentality of "do not understand", to explain, what is your mouth "KMS activation" .

First, answer the questions of most people: key, pronunciation (mì yà o), which refers to the special code needed for decryption.

KMS, the full name of Key Management Service. Many people may not know that KMS is actually a system activation method officially recognized by Microsoft. This activation method is mainly used for batch activation of enterprise computers. For example, your company bought 3,000 identical desktops, but there are no built-in OEM systems. What should I do? So, you need a System Administrator, who will use your company's ticket to purchase a volume activation key (that is, the Volume Key, Volkey, which you often see), must be especially expensive. . However, it is not enough to have this key. It is not always possible to activate 3,000 machines and one set-up input key. At this time, the advantages of KMS are reflected. The administrator needs to set up an activation server (Activation Server) and install the KMS client on each client to perform volume activation and management. In other words, administrators can not only remotely activate your computer, but also remotely deactivate and even control your computer.

We use the diagram to explain:


Well, this is probably the case.

So what do you do with the software that claims to be able to activate Windows for free (such as KMS Pico, Pony, etc.)? I did some searching and found that the software used three kinds of algorithms:

1. Create a virtual task in the local computer, unlimited trial system (low level, easy to be blocked)

2. Activate with the software developer's activation server (advanced, not easily blocked)

3. Create a virtual activation server (service) in the local computer and send the activated analog signal (intermediate) )

However, every algorithm has its drawbacks. The first type of infinite trial, Microsoft can easily give you a patch, you will be finished, no difficulty; the second, if Microsoft finds that the violating use of your activation server will also directly block the key, activated from the server All computers will be inactive; the last one, Microsoft has taken steps to not only let Windows Defender report poison, but also delete the task directly when the system is updated.

Someone said that these are temporary problems, and if you activate it, you can re-crack it. Let's take a look at the more serious problem: When your computer is activated remotely, it usually shows up like this:

What do you mean? In other words, your system is no longer yours —— becomes a team or administrator. Don't take it easy. —— The administrator can do much more. Copying a piece of data to collect information is a piece of cake. Even more powerful, you can directly reset your system and retain KMS permissions. Maybe, the developer of KMS Pico is not happy, and the red button ……

is pressed, so it is not superior, not brainless. With genuine, use with confidence, my heart is also practical.

Copyright © Windows knowledge All Rights Reserved