Get More from Your Software The Genuine Windows Vista™ Experience.

Slides:



Advertisements
Similar presentations
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
Advertisements

Exchange Online Archiving (EOA) was added as a new service to ECAL to replace FPS and UAG EOA was highest rated product among options tested with customers.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Which would you choose? Filled with air. Possibly filled with air.
LeadManager™- Internet Marketing Lead Management Solution May, 2009.
What is Digital Piracy? Digital piracy is a form of online piracy and includes the unauthorized online distribution of electronic copies of copyrighted.
How to guard against dealing in pirated or unlicensed software Tony Chow.
3 Section C: Installing Software and Upgrades  Web Apps  Mobile Apps  Local Applications  Portable Software  Software Upgrades and Updates  Uninstalling.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
Chapter 3 Applications Software: Getting the Work Done.
Maintaining and Updating Windows Server 2008
HOMEWORK PAGE STAND ALONE PROGRAMS FUNCTION ON THEIR OWN AND SOMETIMES CANNOT SHARE DATA WITH OTHER PROGRAMS. INTEGRATED SOFTWARE COMBINES.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Are you Ready for the Big Game?. India is booming Businesses are going global. But opportunity also brings competition. Being a successful local business.
Top 7 Things to Know about Activation and Genuine Software with Windows 7 For computers with perpetual licensing obtained through Microsoft volume licensing.
Volume Licensing Service Center Overview Presentation V1.0 August 2007.
Are you Ready for the Big Game?. India is booming Businesses are going global. But opportunity also brings competition. Being a successful local business.
Chapter 4 Application Software: Programs that Let You Work and Play
Microsoft ® Official Course Module 9 Configuring Applications.
Windows Vista: Volume Activation 2.0
RBAP Confidential and Proprietary 1 Microsoft Licensing Know your options Eric Rivas Business Development Manager November 9, 2004.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
AtomPark Software is founded in The head office is located in Saint-Petersburg, Russia. Company is officially registered in the United States. AtomPark.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Introducing Windows Vista Lesson 1. Skills Matrix Technology SkillObjective DomainObjective # Understanding Windows Vista System Requirements Identify.
Team 1 Introduces…. Overview Faster More Aesthetically pleasing Improved File Organization Structure Improved security Enhanced Productivity.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Virtual techdays INDIA │ 9-11 February 2011 Security Discussion: Ask the Experts M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation Anirudh.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Troubleshooting Windows Vista Security Chapter 4.
1 © 2004, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL Using Internet Explorer 7.0 to Access Cisco Unity 5.0(1) Web Interfaces Unity 5.0(1)
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
C HAPTER 2 Introduction to Windows XP Professional.
Chapter 3 Installing and Learning Software. 2Practical PC 5 th Edition Chapter 3 Getting Started In this Chapter, you will learn: − What is in an application.
Home Use Program Productivity Skills Job Satisfaction.
Internet Safety Internet Safety LPM
Virtual Classes Provides an Innovative App for Education that Stimulates Engagement and Sharing Content and Experiences in Office 365 MICROSOFT OFFICE.
Well, sir, from the sounds of it, you've got yourself some pirated software. I'm afraid there's nothing we can do to help you.`
Internet safety By Suman Nazir
Vista Licensing Information University of Pennsylvania Office of Software Licensing Mary A. Griffin November 13, 2006.
Which would you choose? It seems obvious, right? With something so important, you need to know what you are getting. Surprisingly, many of your customers.
Software License Documentation These guidelines will help when looking for your software license documentation.
VLSC December 2009 Release Release Date: December 7th, 2009.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
1 Computer Technician Computer Software: Types, Setup, and Ethical Boundaries Copyright © Texas Education Agency, All rights reserved.
How Technology Can Help in Fighting Counterfeiting and Piracy David Finn Associate General Counsel World-wide Anti-Piracy and Anti-Counterfeiting Microsoft.
Internet Explorer 7 Updated Advice for the NHS 04 February 2008 Version 1.3.
Securing Tomorrow’s World Microsoft Security Roadmap Ed Gibson & Steve Lamb Microsoft Ltd.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
John Samuels October, Why Now?  Vista Problems  New Features  >4GB Memory Support  Experience.
Maintaining and Updating Windows Server 2008 Lesson 8.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Windows Vista Configuration MCTS : Network Security.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Windows Tutorial 5 Protecting Your Computer
BUILD SECURE PRODUCTS AND SERVICES
Managing Windows Security
Office 365 is cloud-based productivity, hosted by Microsoft.
Booklet365 Office 365 Outlook Add-In Makes Easy Work of Managing Schedules for Fitness Gyms, Sports Associations, Trainers, and Their Customers Partner.
WINDOWS VISTA.
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
 Security is a must today. If your device is not secure with updated antivirus then it is surely vulnerable to the attacks of dangerous viruses, spyware.
LP+365 App Transforms Office 365 into a Learning Management System That Promotes Digital Literacy and Encourages All Students to Develop Together OFFICE.
Working with Windows Vista
Reportin Integrates with Microsoft Office 365 to Provide an End-to-End Platform for Financial Teams That Simplifies Report Creation and Management OFFICE.
Securing Windows 7 Lesson 10.
Chapter 9: Configuring Internet Explorer
Presentation transcript:

Get More from Your Software The Genuine Windows Vista™ Experience

2 Benefits of Genuine Windows Confidence and Peace of Mind –Access to Microsoft support –Assurance that your original version comes with built-in malware and spyware protection Capabilities You Expect Improved user interface and innovative visuals with Windows ® Aero™ Improved PC performance with Windows ReadyBoost™ Ongoing Improvements On-going access to important updates on Microsoft.com Hundreds of new downloads and latest versions, such as Windows Media ® Player and Internet Explorer ® 7

3 Genuine Windows Vista Experience

4 Only genuine Windows Vista provides customers performance and peace of mind New features More protection* Software updates *Only genuine versions receive the full functionality of Windows Defender

5 Innovative visuals and navigation New features and benefits available only on genuine Windows Vista Windows Aero* Windows ReadyBoostMore protection *Not available on Windows Vista Starter version or Windows Vista Home Basic version

6 Speeds up PC performance with readily available USB devices. Windows Aero Windows ReadyBoostMore protection New features and benefits available only on genuine Windows Vista

7 25% of Web sites offering counterfeit product keys, pirated software, key generators or crack tools attempted to install either malicious or unwanted software*. Windows Aero Windows ReadyBoostMore protection *Third party research performed by International Data Corporation (IDC) New features and benefits available only on genuine Windows Vista

8 Piracy: It Hurts Everyone

9 Piracy: It is a problem for All of Us  Reliability and stability of business customers computer systems at risk  Malicious and unwanted software rampant in pirated versions Low-GradeMid-GradeHigh-Grade It’s easy to be fooled!

10 Piracy: How to protect yourself 1.Are you buying from a reputable reseller? 2.Is a Certificate of Authenticity (COA) included? 3.Is a hologram CD, DVD, or recovery media included? 4.Are the product packaging and documentation high quality? 5.Is an End-user License Agreement (EULA) included? 5 questions to ask:

11 Activation and Validation Process

12 Genuine Windows Vista activation If initial activation fails, there is a 30- day grace period. If initial activation does not occur, Windows Vista will go into a reduced functionality mode. Initial product activation requires a valid product key.

13 Genuine Windows Vista validation From time to time, users may be required to validate the software is genuine using an online process. Access to certain content, downloads, and updates are reserved for genuine versions. If validation fails, Windows Vista will go into a “non-genuine” state with a 30-day grace period. At the end of the 30-day grace period, failure to successfully validate will result in a reduced functionality mode.

14 Non-genuine User Experience

15 Non-genuine user experience Users have 30 days to activate with a valid product key. Constant desktop reminder of a count-down of the 30-day period and non-genuine status. Permanent notification “This copy of Windows is not genuine.” If activation or validation fails, the system will go into a “non-genuine” state.

16 Non-genuine user experience Many features are disabled, such as Windows Aero and Windows ReadyBoost. If activation or validation fails, the system will go into a “non-genuine” state.

17 Access to downloads on the Microsoft Download Center marked with a star require genuine validation and are denied when using non-genuine software. Non-genuine user experience If activation or validation fails, the system will go into a “non-genuine” state.

18 At end of 30-day period, if the user fails to activate with a valid product key, the system will go into a reduced functionality mode. If activation or validation fails, the system will go into a “non-genuine” state. Non-genuine user experience

19 Failure to activate within the 30-day grace period, will result in Windows Vista going into a reduced functionality mode. No desktop No start menu or task bar Windows Vista functionality limited to the default web browser for 1 hour periods Non-genuine user experience

20 Make sure you experience the performance and peace of mind you expect and deserve from genuine Windows Vista Be sure to ask for and receive genuine Microsoft software!

21 APPENDIX

22 Microsoft Respects Your Privacy –For more details, visit: Use of genuine software will not compromise your privacy or become a method for marketing pitches, spyware, etc. Microsoft’s WGA does not use any information collected for purposes to identify or contact you

23 Windows Vista Genuine by Design Features & Services In-box Features Aero Windows Ready Boost Windows Defender Post- Purchase Non-critical Security Updates Ultimate Extras Small Business Plus OOB releases (IE7.next, WMP.next) Local Offers

24 It’s a fact: Counterfeit software is risky Research by IDC (sponsored by Microsoft) shows that acquiring and using counterfeit software can pose real risks. The research examined websites that offer counterfeit software as well as hacks, cracks and ‘keygen’ tools available on websites and P2P networks that enable the illegal use of software. The research found there is a significant amount of malicious or unwanted code present on websites that offer counterfeit and in key generators and crack tools. Specifically malicious or unwanted software was found in: 25% of the Web sites (25 of 98 sites) offering counterfeit product keys, pirated software, key generators or crack tools 11% of key generators and crack tools (13 out of 116) from websites 59% of key generators and crack tools (55 of 94) downloaded from P2P networks

25 Microsoft Genuine Software Initiative (GSI) The Microsoft Genuine Software Initiative focuses the many activities and investments directed at combating software counterfeiting and other forms of software piracy into a single initiative. The initiative will drive increasing investments across three strategic areas: Education, Engineering, and Enforcement. EducationEngineeringEnforcement Microsoft marketing campaigns on genuine software and websites like provide detailed information and examples of counterfeit software. Example Programs and Activities Genuine Microsoft Software’ logo and reseller logo program (below) Support of industry associations (Business Software Alliance, ICC BASCAP, AGMA) Microsoft is continuing to invest in anti-counterfeiting technologies and product features that alert consumers to the presences of counterfeit software. Example Programs and Activities Microsoft Genuine Advantage platform Anti-counterfeiting features such as new Certificates of Authenticity and Holographic CDs Microsoft actively supports government officials and law enforcement in taking action against software counterfeiters. Thousands of reports have been filed with Microsoft. These reports have contributed directly to numerous civil actions that have been filed against software pirates. Example Programs and Activities New cooperation with online auction providers (Ebay) to crack down on sales of counterfeit Increased work with anti-spam services to filter and prevent distribution of illegal spam advertising illegal MS software