Volume license key
Encyclopedia
Volume License Key is a term used by many computer software
Computer
A computer is a programmable machine designed to sequentially and automatically carry out a sequence of arithmetic or logical operations. The particular sequence of operations can be changed readily, allowing the computer to solve more than one kind of problem...

 companies to denote the product key
CD key
A product key, also known as a Software key, is a specific software-based key for a computer program. It certifies that the copy of the program is original. Activation is sometimes done offline by entering the key, or with software like Windows XP online activation is required to prevent multiple...

 used when installing software licensed under volume licensing, which allows a single product key to be used for multiple installations.

This form of licensing is typically used in business, government and educational institutions, with prices for volume licensing varying depending on the type, quantity and applicable subscription term. For example, Microsoft
Microsoft
Microsoft Corporation is an American public multinational corporation headquartered in Redmond, Washington, USA that develops, manufactures, licenses, and supports a wide range of products and services predominantly related to computing through its various product divisions...

 software available through volume licensing programs includes Windows Vista
Windows Vista
Windows Vista is an operating system released in several variations developed by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs, and media center PCs...

, Windows 7 Enterprise, Windows Server 2008
Windows Server
Windows Server is a brand name for a group of server operating systems released by Microsoft Corporation. All are part of Microsoft Servers.- Members :This brand includes the following software:* Windows 2000 Server* Windows Server 2003...

, Microsoft Office 2007
Microsoft Office
Microsoft Office is a non-free commercial office suite of inter-related desktop applications, servers and services for the Microsoft Windows and Mac OS X operating systems, introduced by Microsoft in August 1, 1989. Initially a marketing term for a bundled set of applications, the first version of...

 and many others.

Use of volume license keys

Volume license keys can be used to activate multiple installations of the software without any mechanism (such as a product activation
Product activation
Product activation is a license validation procedure required by some proprietary computer software programs. In one form, product activation refers to a method invented by Ric Richardson and patented by Uniloc where a software application hashes hardware serial numbers and an ID number specific...

 mechanism) checking the total number of installations. The license for the software will place restrictions on the use of the key. Typically the license will limit the key to a fixed number of installations which must only be within the licensee's organization and also place the licensee under an obligation to keep a record of the number of installations, keep the key confidential and possibly even require that the licensee organisation makes itself available for a software licensing audit
Software licensing audit
Software Asset Management is an organization process, which is outlined in ISO/IEC 19770-1. It is also now embraced within # ISO 27001:2005 Information Technology - Security Techniques - Information Security Management Systems - Requirements and ISO/IEC 17799:2005 Information Technology - Security...

 to verify that its use of the key is within the terms of the license. If a volume license key becomes known and used outside of the organisation it is licensed to then this is regarded as software piracy.

Volume license keys are not generally transferable between organisations; however, this can occur if the associated license agreement is transferred. If this happens, then the original licensee is required to cease all use of the key, and any software installed using it. This may occur when a company reorganises its structure, or when it sells unneeded software licences. Volume licenses are not always transferable; however, some types of Microsoft volume license can be transferred provided a formal transfer process is completed which enables Microsoft to register the new owner. A very small number of software vendors specialise in brokering such transfers in order to allow volume licenses and keys to be sold. The most notable of these is Discount-licensing.com
Discount-licensing.com
Discount-licensing.com is a Burton-upon-Trent, UK-based vendor or broker of second hand Microsoft software licences...

, who were the first to establish that Microsoft volume licenses could be sold in this way.

Volume Activation 2.0

Starting with Windows Vista
Windows Vista
Windows Vista is an operating system released in several variations developed by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs, and media center PCs...

, Microsoft replaced VLKs with Multiple Activation Keys (MAK) or with Key Management Server (KMS) keys.
  • MAK Activation may occur independently (by means of connection to Microsoft through internet or telephone activation) or through a proxy using Microsoft's Volume Activation Management Tool (VAMT).

  • Hosts activated via a KMS have to report back to that key server
    Key server (software licensing)
    Key server for software licensing is a colloquial or generic description that refers to a centralized computer software system which provides tokens, or keys, to client computers in order to enable licensed software to run on them....

     once every 180 days.

Unauthorized use

Since Volume Licensing sometimes bypasses activation
Product activation
Product activation is a license validation procedure required by some proprietary computer software programs. In one form, product activation refers to a method invented by Ric Richardson and patented by Uniloc where a software application hashes hardware serial numbers and an ID number specific...

 and has no technical limits on the number of possible activations, some software pirates
Copyright infringement of software
Copyright infringement of software=The copyright infringement of software refers to several practices which involve the unauthorized copying of computer software. Copyright infringement of this kind varies globally...

 have exploited VLKs. Windows XP installations will bypass product activation when using a volume license key. However the product activation system will be on the system but it will say it is already activated. The FCKGW key (see below) is the most prominent example of VLK exploitation. Although to some this may seem like an easy way to circumvent Microsoft
Microsoft
Microsoft Corporation is an American public multinational corporation headquartered in Redmond, Washington, USA that develops, manufactures, licenses, and supports a wide range of products and services predominantly related to computing through its various product divisions...

's product activation
Product activation
Product activation is a license validation procedure required by some proprietary computer software programs. In one form, product activation refers to a method invented by Ric Richardson and patented by Uniloc where a software application hashes hardware serial numbers and an ID number specific...

 feature, each VLK is uniquely linked to the company for which it was purchased. Therefore, should the software be installed on more computers than it was licensed, Microsoft can hold the company responsible, and blacklist
Blacklist (computing)
In computing, a blacklist or block list is a basic access control mechanism that allows everyone access, except for the members of the black list . The opposite is a whitelist, which means allow nobody, except members of the white list...

 the product key in extreme cases.

Volume license keys have also been used incorrectly on Windows XP installations where the owner had a retail or OEM license to Windows XP but the person doing the installation (such as a computer repair shop) did not want to bother with activation, used disk cloning
Disk cloning
Disk cloning is the process of copying the contents of one computer hard disk to another disk or to an "image" file. Often, the contents of the first disk are written to an image file as an intermediate step, and the second disk is loaded with the contents of the image...

 software, or did not have access to the original license.

Volume license keys that have been abused have been blocked by Microsoft, starting with Windows XP Service Pack 1. Microsoft argues that it does not need to cater to the needs of those who did not pay for their software. Microsoft even developed a new key verification engine for Windows XP Service Pack 2 that could detect illicit keys, even those that had never been used before. Several security
Computer security
Computer security is a branch of computer technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to...

 consultants have condemned the move by Microsoft, saying that leaving a large install base unpatched from various security holes is irresponsible because this unpatched install base can be leveraged in large scale Internet attacks, such as trojan horses
Trojan horse (computing)
A Trojan horse, or Trojan, is software that appears to perform a desirable function for the user prior to run or install, but steals information or harms the system. The term is derived from the Trojan Horse story in Greek mythology.-Malware:A destructive program that masquerades as a benign...

 used to send spam e-mail. Others have come to Microsoft's defence, arguing that Microsoft should not have to provide support for illegal users. After much public outcry, Microsoft elected to disable the new key verification engine. Service Pack 2 only checks for the same small list of commonly used keys as Service Pack 1. This method does not completely prevent piracy, as users can generate new VLKs that will not be detected as pirated. Users of existing installations of Windows XP can also change their product key by following instructions from Microsoft.

A small number of keys have been completely banned by Microsoft and cannot be used with any CD that has been slipstreamed
Slipstream (computing)
In computer jargon, to slipstream updates, patches or service packs means to integrate them into the installation files of their original software, so that the resulting files will allow a direct installation of the updated software....

 with Service Pack 2. If an original Windows XP CD (or a slipstreamed copy with Service Pack 1) is used to install Windows XP, the key is accepted; however, the system will not allow any newer updates (including Service Pack 2 and 3) to be installed. Microsoft has also released the Windows Genuine Advantage
Windows Genuine Advantage
Windows Genuine Advantage is an anti-piracy system created by Microsoft that enforces online validation of the licensing of several recent Microsoft Windows operating systems when accessing several services, such as Windows Update, and downloading Windows components from the Microsoft Download...

 (WGA) program, which requires users of Windows XP (and other recent operating systems) to verify their copy before downloading updates and certain programs from Microsoft's website.

Notable keys

A volume license key that was commonly used to bypass product activation
Product activation
Product activation is a license validation procedure required by some proprietary computer software programs. In one form, product activation refers to a method invented by Ric Richardson and patented by Uniloc where a software application hashes hardware serial numbers and an ID number specific...

 in early versions of Microsoft's Windows XP operating system started with FCKGW. This key was part of the first warez
Warez
Warez refers primarily to copyrighted works distributed without fees or royalties, and may be traded, in general violation of copyright law. The term generally refers to unauthorized releases by organized groups, as opposed to file sharing between friends or large groups of people with similar...

 release of the final version of Windows XP by a group called devils0wn, 35 days before the official retail release on August 28, 2001. The key is now obsolete, as it has been blacklisted by Microsoft since August 2004, and affected computers will display a WGA notification
Windows Genuine Advantage
Windows Genuine Advantage is an anti-piracy system created by Microsoft that enforces online validation of the licensing of several recent Microsoft Windows operating systems when accessing several services, such as Windows Update, and downloading Windows components from the Microsoft Download...

. It was made famous partly because it featured in a popular image circulated on the Internet before the retail launch of Windows XP. In the image, the key is written on a CD-R containing the leaked operating system and held in front of a digital Microsoft sign counting down the days until the release of Windows XP.

Similarly, the key starting with YFKBB is a DVD key
CD key
A product key, also known as a Software key, is a specific software-based key for a computer program. It certifies that the copy of the program is original. Activation is sometimes done offline by entering the key, or with software like Windows XP online activation is required to prevent multiple...

 that was commonly used to activate Windows Vista
Windows Vista
Windows Vista is an operating system released in several variations developed by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs, and media center PCs...

 over illegitimate Key Management Service servers or the GWH28 key for Office 2003. These keys have been obsolete since Q1 2008.

The key starting with V2C47 had been circulating as a "student" Windows XP product key that passed WGA for two years until it became blacklisted by the WGA notification applet.

Users using these keys will receive an error message when they install the latest service pack, and such users are told to obtain a legitimate license and change their product key.

External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK