[HN Gopher] 111-1111111 is a valid Windows 95 key (2021) [video]
       ___________________________________________________________________
        
       111-1111111 is a valid Windows 95 key (2021) [video]
        
       Author : hexadec
       Score  : 45 points
       Date   : 2023-02-26 02:53 UTC (20 hours ago)
        
 (HTM) web link (www.youtube.com)
 (TXT) w3m dump (www.youtube.com)
        
       | zerr wrote:
       | It was valid for Visual Studio 97 as well.
        
         | JoshGlazebrook wrote:
         | Yup, I remember using this key for visual studio 6.0 when I was
         | like ten years old.
        
       | snotrockets wrote:
       | This video could've been a textual content.
        
       | jeroenhd wrote:
       | MS activation mechanisms always remind me of this video:
       | https://youtu.be/rXHu9OmLd8Y; how Microsoft Bob was used to
       | initialize a chunk of random data used with the cryptographic
       | activation mechanism of Windows XP.
        
       | toasteros wrote:
       | It's valid for Quake 3, too!
        
       | apprenticemason wrote:
       | 000-0000000 was the key I kept in my memory in case I needed to
       | install Visual Basic 6.0 on a new computer back in my middle
       | school days :) great memory I forgot about, thank you for sharing
       | the link.
        
         | eclipxe wrote:
         | FCKGW
        
           | tim-- wrote:
           | I probably am overthinking this; I always wondered if that
           | key was purposely leaked by someone who didn't like Bill
           | Gates.
        
       | twawaaay wrote:
       | It may sound strange to people who were born later.
       | 
       | But in 90s these mechanisms were in infancy. It was normal for
       | computers to auto-login and have no password at all, processes
       | could each read entire memory on the machine. Software was
       | cracked the moment it came out and it was assumed people bought
       | any software because they feared legal action rather than because
       | they had no other way to get their hands on it -- late 90s and
       | early 2000s you could download pretty much anything you wanted,
       | immediately, for no cost.
       | 
       | There really wasn't much possibility to protect your piece of
       | software. If it was put on a CD somebody will either extract the
       | key or modify your software to accept any key.
       | 
       | Windows security mechanism was no better and there were copies
       | distributed so much that probably many people remember "standard"
       | CD Keys even to this day.
       | 
       | And it was pretty much safe because most software did not have
       | ability to phone home so the software developer would have no way
       | of knowing that somebody used an illegal copy.
       | 
       | The business model was mostly companies paying for software
       | (fearing an ex-employee reported illegal use). I remember most
       | teens and young adults (which is most people who used computers)
       | would never buy any kind of software, music or video. The only
       | exception was sometimes people bought OEM software with their
       | hardware.
        
         | forinti wrote:
         | One mechanism which was sometimes used for more expensive
         | software was a dongle connected to the parallel port.
        
           | RedShift1 wrote:
           | This still exists today, only now with USB dongles.
        
             | PapaSpaceDelta wrote:
             | I've heard stories about high end recording studios, with
             | shrink wrapped boxes of expensive audio software, that used
             | cracked versions on their workstations because they don't
             | want to deal with the inevitable iLok hassles...
        
           | georgemcbay wrote:
           | These were generally useless at the time, at least as it
           | pertains to online piracy.
           | 
           | Enough to keep honest people honest and not copy the software
           | to their immediate friends, but if the software had people
           | interested in pirating it someone would disassemble it and
           | just jump over the part that looked for the dongle while
           | keeping all the software functionality intact and these
           | patched versions would be readily available online to anyone
           | who knew where to look.
           | 
           | At the end of the day not really any more secure than various
           | software-based copy protection schemes, just more wasteful
           | due to the extra hardware.
        
         | londons_explore wrote:
         | FCKGW-...
        
           | pxx wrote:
           | It's _FCKGW_, not what you have. It's easier to remember this
           | way...
        
         | vidanay wrote:
         | And your biggest fear was that an outgoing employee would drop
         | a dime and report you to the BSA (not the Boy Scouts of
         | America).
        
           | zaps wrote:
           | Don't copy that floppy
        
         | amiga386 wrote:
         | That didn't stop people creating hard-to-crack copy-protected
         | software.
         | 
         | Since disk drives existed, games makers created floppy disks
         | that industrial disk duplicators that standard computers could
         | read, but couldn't write, and ensured their games had code to
         | check for that. It generally wasn't feasible to replicate these
         | special tracks with a normal floppy drive, so instead people
         | had to reverse engineer the game and remove the copy protection
         | checks.
         | 
         | This could be easy or hard, depending on how devious the
         | programmers were. One of the legendary games for this was
         | Dungeon Master on the Amiga or Atari ST which took crackers
         | about a year to find _all_ the copy protection checks [0]
         | 
         | This wasn't the only form of copy protection.
         | 
         | * Games since their earliest day had things like "enter word 7
         | on page 5 of the manual". Some games had a red-on-red "copy
         | protection sheet", designed so that it would be very difficult
         | to replicate with a standard black-and-white photocopier.
         | Monkey Island came with a two-piece "Dial-a-pirate" code wheel
         | [1]
         | 
         | * To thwart third party software developers, and to distort
         | fair trade and give themselves lucrative pricing monopolies,
         | the Nintendo NES had a "lockout chip", the 10NES [2]
         | 
         | * Sony Playstation games had a "wobble" built into the groove
         | of their pressed discs that normal CD-Rs didn't have, and the
         | frequency of the wobble indicated which region the game was
         | sold to, preventing free and fair international trade by foul
         | means [3]
         | 
         | * Products like AutoCAD came with a dongle, [4] it connected to
         | the parallel port because USB hadn't been invented.
         | 
         | But yes, for software like Windows, where the entire product
         | has to be installed on a hard drive, it wasn't within customer
         | expectations to have to permanently attach a dongle or have
         | media in a drive, and there wasn't commonplace network access
         | with which to "phone home", the serial key or CD key was used
         | to limit distribution. As you say, Microsoft enforced this
         | mainly with licence audits - the BSA not only offered a reward
         | for employees to rat out their companies [5] but they also
         | generally acted as a front for Microsoft; Microsoft would drop
         | their lawsuit for your minor infringement of some of their
         | software, if you agreed to stop using Microsoft's competitors'
         | software and convert your business to becoming a Microsoft-only
         | shop.
         | 
         | Microsoft also got paid by doing deals with OEMs. If you bought
         | a PC in the 1990s, you likely paid a "Windows tax", where every
         | PC sold, even ones which will only run Linux, gave a portion of
         | the sales price to Microsoft. They illegally used their
         | exclusive agreements with OEMs to prevent BeOS entering the PC
         | operating system market. Microsoft was found guilty of using
         | illegal anticompetitive tactics to crush their rivals in the
         | x86 operating system market. [7]
         | 
         | [0] https://www.youtube.com/watch?v=VheNpiSZxf0&t=489s
         | 
         | [1] https://oldgames.sk/codewheel/secret-of-monkey-island-
         | dial-a...
         | 
         | [2] https://en.wikipedia.org/wiki/CIC_(Nintendo)#10NES
         | 
         | [3]
         | https://en.wikipedia.org/wiki/PlayStation_(console)#Copy_pro...
         | 
         | [4] https://en.wikipedia.org/wiki/Software_protection_dongle
         | 
         | [5] https://en.wikipedia.org/wiki/Software_Alliance
         | 
         | [6]
         | https://en.wikipedia.org/wiki/Bundling_of_Microsoft_Windows#...
         | 
         | [7] https://law.justia.com/cases/federal/district-
         | courts/FSupp2/...
        
           | wkat4242 wrote:
           | Yeah elite on pc had such a copy protection mechanism.
           | 
           | But they picked any word in the book, even simple ones like
           | "the". So just entering that 20x or so would get you in.
        
           | JeanMarcS wrote:
           | I remember a text adventure game on Amstrad CPC ("Le passager
           | du temps" in french, roughly translating as "Time passenger")
           | which I had a pirated copy.
           | 
           | You could play the adventure until you found the time travel
           | machine (could take 1 to 3 hours depending).
           | 
           | You start the machine and then it went on infinite loop text
           | : "tired of piracy tired of piracy tired of piracy..." !
           | 
           | Highly frustrating, but you couldn't help to admire the
           | developper.
           | 
           | If I remember correctly, it was something about the way that
           | a floppy track was formated, with the wrong number of
           | sectors, which was readable by the disk drive, but it
           | couldn't write it using normal copy mode.
        
             | lloeki wrote:
             | Could also be something like that:
             | 
             | https://scarybeastsecurity.blogspot.com/2020/12/the-
             | cleveres...
             | 
             | I remember reading some article I can't find again about a
             | very unusual floppy protection that involved nonstandard
             | floppy format, something like non standard sector sizes
             | that could be read by the hardware but not written, and the
             | protected software implemented some direct access to the
             | floppy hardware to read data.
        
           | VBprogrammer wrote:
           | I'm pretty sure I remember a pirated version of Metal Gear
           | solid on the original play station where the fact you where
           | using a pirated version came up in the gameplay at some
           | point.
        
         | SpaceL10n wrote:
         | It's weird reading about my life as if it's history.
         | 
         | Everyone was doing it. I remember my teachers, friends, and
         | family all giving me pirated software at some point. I remember
         | my friends and I getting excited when someone got a ripped copy
         | of some game and we couldn't wait to burn new CD-ROMs to share.
         | If one of us got our hands on the copy of some game, we all got
         | copies. It was kind of like a free-for-all in the world was
         | starving for cool applications. Computers were starting to live
         | up to their promises and software was just like recipe cards.
        
           | treeman79 wrote:
           | Linus from Tech Tips still pirates windows. He even has a
           | whole video on why.
           | 
           | https://youtu.be/M3bezYerYxQ
        
           | vidanay wrote:
           | I remember the days of cracked software on Apple II systems.
           | The crackers would add custom splash screens advertising
           | themselves.
           | 
           | http://artscene.textfiles.com/intros/APPLEII/
        
             | LocalH wrote:
             | The related C64 cracking scene also begat the demo scene.
             | The flashy crack intros with sprites, scrollers, and raster
             | bars became the flashy demo intros, and from there they
             | learned about a wonderful thing called "design".
        
           | washadjeffmad wrote:
           | In many cases, disassembling and modding was often necessary
           | to get software working on your system. We all shared
           | executables that patched bugs, added features, and improved
           | performance back in the 90s and 00s.
        
           | KronisLV wrote:
           | > It's weird reading about my life as if it's history.
           | Everyone was doing it.
           | 
           | Here in Latvia that's still somewhat the case, at least
           | according to statistics like these:
           | https://eng.lsm.lv/article/society/society/latvia-leading-
           | in...
           | 
           | I've personally seen people who choose to pirate everything
           | from movies, to OSes and IDEs, and have no problem with doing
           | that whatsoever. That said, I can kind of understand it, due
           | to many not exactly having lots of money to throw around.
           | 
           | Personally, I live a bit more ethically, but it kind of
           | sucks: I'm not sure what I'd do without JetBrains offering
           | student licenses, followed by a graduation discount and
           | recurring discounts. I've also not bought a AAA game on
           | release in years, it's always sometime later on sale etc. The
           | same goes for server hosting, most PaaS solutions are too
           | expensive and vendors like AWS and GCP are outside of my
           | price point.
           | 
           | But hey, OSes like Linux and software like LibreOffice are a
           | godsend. As are free IDEs and text editors as well,
           | sometimes.
        
             | wkat4242 wrote:
             | I used to copy like crazy but now that I have a good job I
             | pay for most of my software. Mainly because I like to keep
             | my computer clean from malware. If I ever need to run
             | something pirated because it's ridiculously expensive (like
             | Adobe stuff or IDA pro) I run it in a VM or an isolated
             | machine.
             | 
             | It's less out of an ethical sense though. Video I still
             | pirate by the terabyte. Most of that comes from large media
             | concerns that I don't really have much care for. The small
             | games industry I support as much as I can on GOG.
             | 
             | Latvia and Bulgaria are great for torrent sites indeed,
             | there seems to be nobody even trying to take them down
             | unlike in western europe.
        
             | [deleted]
        
         | ta1243 wrote:
         | Everyone took software from the office and installed it at
         | home, that's why everyone uses microsoft at home, you got it
         | for free from work.
         | 
         | Worked for microsoft, worked for the people taking it home.
         | Everyone was happy.
        
         | johannes1234321 wrote:
         | > it was assumed people bought any software because they feared
         | legal action rather than because they had no other way to get
         | their hands on it
         | 
         | With windows specifically a factor is that it is/was almost
         | impossible to get a computer (PC/Desktop) without Windows
         | license. Compared to that the number of potentially illegal
         | copies was neglectable. And even for Office it was probably
         | better that people use a copy from dubious source than a
         | competitor so they don't find out that alternatives are good
         | enough.
        
         | seydor wrote:
         | > late 90s and early 2000s you could download pretty much
         | anything you wanted, immediately, for no cost.
         | 
         | This is still true today btw, but the broader user base
         | includes a lot more people willing to pay
        
           | toss1 wrote:
           | What may prevent more of it today is that "cracked" software
           | has been found to be a handy delivery mechanism for malware
           | so, especially after the spread of cryptocurrency and
           | ransomware utilizing it for payment, there is a reasonable
           | fear of your download coming with an extremely costly
           | payload.
           | 
           | So, oddly enough, the transnational criminal gangs are
           | helping the corporations in a way they never could do for
           | themselves.
        
         | voidfunc wrote:
         | I really really miss the 90s computing environment. I was young
         | but it was a total wild west and the internet was beautiful and
         | totally open. For a curious kid without a lot of friends it was
         | amazing.
        
           | boredemployee wrote:
           | That really was me in the 90s. Made all my real and best
           | friends using mIRC and ICQ. the good old days.
        
         | YPPH wrote:
         | >was normal for computers to auto-login and have no password
         | 
         | This persisted for longer than it should have on Windows! I
         | remember on Windows XP Home Edition, you could just press Ctrl
         | Alt Delete to drop to the classic winlogon.exe screen and then
         | log in as "Administrator" with no password!
         | 
         | By that time, though, Microsoft had implemented product
         | activation. To my knowledge, no one ever cracked the telephone
         | activation algorithm. That is, there were no tools to get a
         | confirmation ID from an install ID. At the very least, no tools
         | were ever made widely available, and don't seem to be even to
         | this day. I suppose there wasn't a lot of need, since pirates
         | just distributed volume licenced versions that did not require
         | product activation (FCKGW).
        
           | metadat wrote:
           | Devils0wn Windows XP Final serial key, yeah baby! Seared into
           | my mind forever after entering it so much:
           | 
           | FCKGW-RHQQ2-YXKRT-8TG6W-2B7Q8
           | 
           | I used to reinstall windows anytime anything got weird, which
           | was often because I was always messing with disabling
           | combinations of system services in attempts to reduce OS
           | memory consumption. Wtf is svchost.exe doing? I don't want
           | it! Wireless Zero Config? I don't have Wi-Fi, too flaky and
           | slow (remember, it's 2003). Distributed Link Tracker? Sounds
           | cool, but what distributed links am I tracking? I don't think
           | this is part of Napster or KaZaa.. DCOM Sockets.. <disable>,
           | and so on, until the eventual: Oops, the network is messed
           | up. What was this originally set to? Haha. Oh well, time to
           | refresh and start anew..
           | 
           |  _Sigh._ Those were good times. Eventually I got more memory
           | and gave it all up and devolved all the way to allowing Win10
           | to indulge in it 's wasteful memory ways and report it's
           | telemetry about me or whatever the fuck else creepy shit it
           | wants to do. It also helps that now we tend to have a bit
           | more than 512MB total RAM.
        
             | JackGreyhat wrote:
             | Oh...my...god...
             | 
             | That CD key. I remember that one as well. Good times :)
             | Thanks for bringing up these memories.
        
             | gvx wrote:
             | I killed so many instances of svchost.exe back in the day!
             | Never ran into anything bad that a reboot wouldn't fix. I
             | remember figuring out by trial-and-error which instances
             | were safe to kill by looking at their memory usage.
             | 
             | There was something exciting about stripping Windows XP to
             | its bare essentials, and also it seemed necessary at the
             | time, if you wanted to run it smoothly on an ageing laptop
             | that was basically obsolete when it was new. Especially if
             | you wanted to run such RAM and CPU hogs like The Sims 2!
             | (Not to mention the 40 GiB disk space that just filled up
             | so fast with save games and expansion packs.)
             | 
             | I wonder if Windows 10 still lets you use an alternative to
             | explorer.exe for its desktop shell? I used to write my own
             | little launchers and spotlight-esque programs.
        
           | recursive wrote:
           | I wish you still could. I resent being required to create a
           | user account to use my own computer.
        
           | winsid wrote:
           | The activation process relies on public key cryptography. The
           | private keys, held by Microsoft, are amongst their most well-
           | protected assets. Much more so than their source code, for
           | instance, which is developed with the expectation that it
           | will be leaked in part or in whole.
        
             | metadat wrote:
             | Given the length of Windows serial keys is not that long,
             | why couldn't one extract the check function and run an
             | iteration attack to generate valid keys?
             | 
             | Edit: @ale42: makes sense, thanks for putting this one to
             | rest. 36^25 is approximately 8 x 10^38 which is a really,
             | really big number.
        
               | ale42 wrote:
               | There are 25 characters, each of which has 36 possible
               | values. So 36^25 possibilities, and log2(36^25) = 129.2.
               | There are basically 129 bits of entropy in there, so good
               | luck bruteforcing it.
               | 
               | This makes me think of a shareware app (I think an icon
               | editor) for Windows 3.1 back in 1994 or so... I could
               | find a valid registration key by entering random numbers
               | by hand in around 2 minutes. And I wasn't lucky as I
               | tried and succeeded several times ;-) But the rule
               | (figured out after I had 10 or so valid keys) was simple
               | maths with the digits, no crypto behind.
        
               | AlotOfReading wrote:
               | Not if their cryptography is done properly. Cryptosystems
               | are designed to maintain their security even if the
               | complete algorithm is known to the adversary. You'll
               | commonly see this phrased as "don't rely on security
               | through obscurity".
        
             | mschuster91 wrote:
             | What stops people from just exchanging the public key that
             | is used for verification?
             | 
             | (Not that it matters in a world where kmspico and dazloader
             | exist, but still)
        
             | LocalH wrote:
             | Imagine the shitshow that would happen if those keys leaked
             | lmao. They've got to have a ton of them, across all their
             | services.
             | 
             | It'd be cool to be able to build "legitimate" LIVE packages
             | that would be usable on unmodified 360s lol
        
         | msla wrote:
         | > But in 90s these mechanisms were in infancy. It was normal
         | for computers to auto-login and have no password at all,
         | processes could each read entire memory on the machine.
         | 
         | Only in the home computing world, which is why people on Real
         | Computers thought home computers were toys back then. Real
         | Computers, running Unix and VMS and MVS, damn well did have the
         | protections Wintendo didn't, and didn't mandate a reboot every
         | forty-odd days, either. Microsoft didn't even begin to achieve
         | parity until Windows XP or later, and Apple didn't until MacOS
         | X.
        
         | stevekemp wrote:
         | Very true, there are a lot of sites out there back in the day
         | that a lot of oldtimers would remember.
         | 
         | My personal favourite was astalavista, named in relation to the
         | legit search-site altavista I guess.
         | 
         | Actually I take that back, my favourite site was +fravia's
         | reverse engineering pages. Mostly because the legitimate crack-
         | sites were safe, but there was always a risk of downloading
         | something with a virus, or a trojan instead. So it was more
         | rewarding to read up on the reversing techniques and do the job
         | myself.
         | 
         | Happy days using Numega's soft-ice (kernel mode debugger) to
         | remove the protection it shipped with.
         | 
         | When I switched to Linux one of the first "problems" was that
         | there were few commercial binaries which required a license
         | key, so there were fewer reasons to actual get into reverse
         | engineering / decompiling & patching linux binaries.
        
           | strictnein wrote:
           | Wow astalavista brings back some great memories. Hadn't
           | thought about that site for a long, long time.
        
         | bunabhucan wrote:
         | Prior to W95/NT4 windows didn't even have a license key, scary
         | warning text was the upper limit of enforcement. In some
         | companies part of the IT departments job was to find unlicensed
         | software and delete or pay for it.
        
           | kivlad wrote:
           | I know that a few pieces of software distributed on floppy
           | showed a warning if it detected it was previously installed
           | (which wrote to some file on the disk, given it wasn't write
           | protected). Which basically amounted to a sternly-written
           | paragraph to say that they're using honor system to make sure
           | you follow the rules.
        
           | popcalc wrote:
           | Letting people pirate your software early on is a valid
           | business strategy. Enterprise users pay, students/hobbyists
           | find a simple crack. Once those students enter the workforce
           | they decide the market.
        
         | LocalH wrote:
         | And in the Windows 9x days, even if the user _did_ have a
         | password, you could bypass that with the novel method of...
         | pressing Escape.
        
           | dividuum wrote:
           | Couldn't that be disabled? I vaguely remember bypassing the
           | login using the little help icon, then opening the help
           | and/or (not sure) printer dialog and finally using the file
           | open dialog to run explorer.exe :-)
        
           | hyperman1 wrote:
           | I always thought the password was for the network shares
           | only. You could perfectly log in without a username and
           | password, except networking partially fails. The login dialog
           | only appeared after installing win9x networking components.
           | 
           | A windows password would have been silly, pressing F8 at boot
           | would drop you in msdos
        
             | lloeki wrote:
             | > A windows password would have been silly, pressing F8 at
             | boot would drop you in msdos
             | 
             | As it is to this day with many many Linux installs (unless
             | some disk encryption is set up): edit the kernel command in
             | GRUB and add init=/bin/bash. boom, you're root without any
             | password.
        
               | mschuster91 wrote:
               | Yeah but as with Windows, in a decent environment you'd
               | still need credentials for access to networked resources.
        
               | wkat4242 wrote:
               | That's why one sets up disk encryption :3
        
               | merb wrote:
               | good idea on computers with 100 mhz, an encryption
               | algorithm would've probably not slowed down anything at
               | all, especially not because there was no encryption
               | extension.
        
       | prettyStandard wrote:
       | TLDW: First three digits are ignored, The remaining are mod 7.
       | 
       | Reminds me of this classic.
       | 
       | https://xkcd.com/424/
        
       | morninglight wrote:
       | Software Piracy
       | 
       | That is the reason Microsoft went bankrupt, and
       | 
       | Bill Gates is living in a mobile home in the Ozarks.
       | 
       | You should be ashamed!
        
       | aaronmdjones wrote:
       | I was reinstalling Win95 and Win98 so much in my youth that, to
       | this day, I still have my Windows 95 OEM number and Windows 98SE
       | CDKEY memorised and can recall them with no effort. 20 and 25
       | alphanumerics respectively.
       | 
       | I didn't know about the much smaller 10-digit Win95 keys.
        
       | vocram wrote:
       | I wish more YouTube videos were like this: no intro, outro, ads,
       | annoying music, please like and sub, captivating voice.
        
         | [deleted]
        
         | LeoPanthera wrote:
         | Some recommendations of this type:
         | 
         | VWestlife: https://www.youtube.com/@vwestlife
         | 
         | Big Clive: https://www.youtube.com/@bigclivedotcom
         | 
         | Posy: https://www.youtube.com/@PosyMusic
         | 
         | Techmoan: https://www.youtube.com/@Techmoan
         | 
         | Technology Connections:
         | https://www.youtube.com/@TechnologyConnections
        
         | ecliptik wrote:
         | Ask me 5 years ago if I'd regularly watch someone play Doom on
         | youtube and I would have laughed. Then I discovered Decino and
         | their Doom deep dive and playthrough channel [1].
         | 
         | Similar thing, no intro or self-promotion, not even a Patron.
         | Just someone playing Doom levels with a calm and even tone
         | explaining things about the game I never would have guessed and
         | it's strangely relaxing.
         | 
         | 1.
         | https://m.youtube.com/channel/UCJ8V9aiz50m6NVn0ix5v8RQ#botto...
        
         | teddyh wrote:
         | Behold, salvation is near: https://sponsor.ajay.app/
        
         | danrl wrote:
         | there are tons of these videos on all kinds of topics.
         | Unfortunately, without a captivating thumbnail view counts are
         | extremely low and click through rate is laughable. Yet some
         | creators refuse to A/B test crafted thumbnails that have often
         | nothing to do with the video but drive views. Similarly, I keep
         | my videos short and concise as I see viewer time as at least as
         | valuable as mine and so do plenty of other creators.
         | Unfortunately, viewers don't appreciate this en mass. My sad
         | conclusion is that people don't value their time high enough to
         | immediately leave a video that is wasting their time or, as so
         | often, has almost nothing to do with the title or thumbnail.
         | People forget why they clicked on a video within seconds of
         | watching it.
         | 
         | Source: I am a creator myself, releasing a mew video every
         | Friday. I have read the engagement guides from YouTube and
         | other creators and decided to not take part in this landgrab
         | for viewer time. People have more important things in their
         | life than my videos and I should be mindful of how I use their
         | time.
        
           | nayuki wrote:
           | A mew video, you say? stacksmashing has one ;-) :
           | https://www.youtube.com/watch?v=U8fWTDUdWGA "Exploring the
           | Mew Glitch"
        
       | Logans_Run wrote:
       | If memory serves (and it was a long time ago) Win98, Office 97
       | and NT4 all had an easy to guess key. As long as the ABC (product
       | type eg. Pro, Home) followed by the -xxx (first two digits added
       | up to 9 as the last digit eg 639) -xxxx and the last 4 digits
       | also added up to 9 as the last digit) all would be good and
       | passed all the validation checks. A product key of xyz-000-0000
       | _would_ work although it was a bit obvious where as something
       | like fgh-729-32139 would sail through.... Ah, the good ol ' days
        
       | skipkey wrote:
       | So my last name is Key, and my initials are C D, so in the mid-
       | late 90s any time I was prompted to enter a CD Key I would always
       | try "yes". It worked at least half a dozen times.
        
         | mdip wrote:
         | Thanks for that, it brought me back to my teens.
         | 
         | In the Renegade BBS system, for like one minor version or so,
         | you could authenticate to any account, including SysOp, by
         | hitting Enter instead of providing a password. Of course, in
         | Renegade and many BBSes, you could login with either your
         | account name or ID, which was an auto-incrementing (the manual
         | way) integer starting at "0", the Sysop. And I'm fairly certain
         | that the problem wasn't triggered _unless_ you logged in by ID,
         | which few ever did.
         | 
         | On one Saturday nearly every BBS in my area code running that
         | software was restoring from backup.
         | 
         | I stumbled upon it because I was "1" on another BBS[0] and
         | accidentally popped "Enter" aiming for Shift when typing my
         | password. After picking my jaw up from the table I called my
         | buddy and told him to unplug the phone line. :)
         | 
         | [0] Actually, I had hacked up and substantially re-written from
         | the leaked Telegard 2.5 source (whichever was the origin of
         | Renegade's code) and the password validation code was
         | _insanity_ -- I was young enough to see hacking as mystical and
         | suspected I 'd found a cleverly hidden back-door so I rewrote
         | the entire thing to be as "dumb as the rest of the password
         | handling logic was"; I had heard, later, that there was
         | something funny going on but I stopped playing with that code
         | by then and the Internet quickly ended that world. In all
         | likelihood, the original developers were doing something novel
         | that I was totally unfamiliar with and I made it worse, but I
         | like to think I "locked that up". :)
        
       | vxxzy wrote:
       | Interesting! I once lost my original StarCraft CD Key. In a
       | desperate attempt to simply install and play the game I tried
       | converting "StarCraft" to numbers using A1Z26 cipher. Honesty
       | didn't know it at the time what to call what I was doing. I was
       | just a kid! But, guess what? It worked! It only worked for local
       | play. BattleNet did not see it as a valid key. I like to think
       | some SWE somewhere hid that in there on purpose. Whoever you are,
       | if you see this, thank you!
        
         | Waterluvian wrote:
         | There's also a valid key pre-brood war that was something like
         | "1234567890123"
        
           | pxx wrote:
           | Brood war didn't have its own keys. Both 1234567890123 and
           | 3333333333333 worked for StarCraft.
        
             | hadlock wrote:
             | All 'G' was valid for Quake 3. I was surprised to find this
             | out from my friend's 11 year old little sibling.
        
               | flatiron wrote:
               | I used a key gen for quake 3 when it came out. Was
               | surprised when I was able to play online. Told my friends
               | who were not able to play online. I guess I was just
               | lucky my key was an actual key!
        
         | gandalfian wrote:
         | I once used the example key shown in a software manuals how to
         | register section. It worked. I was rather chuffed at the time.
        
         | noAnswer wrote:
         | My brother bought CorelDRAW for Win95 and only kept the CD,
         | forgetting how important the paper with the key was. On a
         | reinstall he than entered 11223344556677889900 and it worked. I
         | used that method multiple times as a teen on software from
         | different manufacturers. It worked quite often. Though
         | sometimes you had to play with the numbers at the end.
         | (sometimes 000 other times 011 etc.)
        
           | boredemployee wrote:
           | wtf. he entered that number just out of nowhere and it
           | worked? what a wizard!
        
       | pimlottc wrote:
       | It took me a while to realize this meant "license key", my first
       | thought was about keyboard codes.
        
         | vidanay wrote:
         | The "111-1111111" key is right next to the "any" key on your
         | keyboard.
        
       | tastysandwich wrote:
       | I recently wanted to use a program for a short amount of time for
       | personal use, but the trial period was only 7 days.
       | 
       | I used strace to find that it kept the timestamp of its first run
       | in a text file, and would read that on startup. Deleting that
       | completely reset the trial period.
       | 
       | I was pretty amazed - I know most people aren't computer savvy to
       | bypass trial periods, but I figured there'd be third-party
       | libraries a developer could use to effortlessly guard against
       | this sort of thing?
       | 
       | (If I ever need it again I will buy it. I just literally needed
       | it a couple of times for something personal and will likely never
       | need it again)
        
       | mseepgood wrote:
       | Why were all triplets blacklisted except 000, 111 and 222? What
       | was the thought process behind it?
        
       ___________________________________________________________________
       (page generated 2023-02-26 23:00 UTC)