Walker News

Is there A Reliable Cracked Software? Why Use Genuine Software?

Why using pirated software?

About 10 years ago, I spent all money on my first DIY computer, but almost zero cost on all Windows software installed onto it.

Obviously, I used pirated program, with installers borrowed from friends or bought them myself from pirated software booth at a flat price of 3 – 5 buck per CD.

Why I did that?

First, I was about to start the 1st semester of computer study in college on my own limited finance. As you may know, the hardware was not cheap at that time, so I couldn’t afford to spent additional on genuine software.

Second, none of the people I knew in college or friends were using Linux or open source software. As a novice at that time, learning Linux on my own could be a great challenge. In order to learn from peer and “masters” around me, I had no choice to go for Windows. Since all of them were using pirated Windows and also my limited finance disallowed me to have genuine software, I just followed the “culture”.

Why using Genuine software now?

Before Windows XP released, most of the pirated software were actually “cracked” by using a genuine product key or serial number.

By using this method, there is no worry of Trojan or virus, so long as you install the software with a genuine installer and activate it with “pirated” product key that is actually a genuine license key shared by millions of people around the world.

However, software activation changes after Microsoft introduced Microsoft Product Activation or Windows Product Activation, started with Windows XP.

Many other software follow the way of Microsoft licensing Windows XP, i.e. to install the software with a valid product key and then activate it within grace period, by connecting to the software vendor server or phone the call center to get an activation key for this purpose.

Therefore, most of the pirated software nowadays are not simply a result of cracking with genuine product key. Indeed, these are really “cracked” software that done by repackaging genuinely installed and activated software, fooling the software with a locally installed activator, etc.

I don’t kinda like these kind of “cracked” software as I am worry about risk of Trojan or virus that might have built into the activator or repackaged installer.

Custom Search

2014  •  Privacy Policy