Knowledge

Keygen

Source 📝

43: 225:
which would otherwise be returned by an activation server. If the software offers phone activation then the keygen could generate the correct activation code to finish activation. Another method that has been used is activation server emulation, which patches the program memory to "see" the keygen as the
224:
Many programs attempt to verify or validate licensing keys over the Internet by establishing a session with a licensing application of the software publisher. Advanced keygens bypass this mechanism, and include additional features for key verification, for example by generating the validation data
169:. Keygens may be legitimately distributed by software manufacturers for licensing software in commercial environments where software has been licensed in bulk for an entire site or enterprise, or they may be developed and distributed illegitimately in circumstances of 196:, sampled loops or anything that the programmer desires. Chiptunes are often preferred due to their small size. Keygens can have artistic user interfaces or kept simple and display only a cracking group or cracker's logo. 472: 374:
A key changer or keychan is a variation of a keygen. A keychan is a small piece of software that changes the license key or serial number of a particular piece of proprietary software installed on a computer.
237:
A multi-keygen is a keygen that offers key generation for multiple software applications. Multi-keygens are sometimes released over singular keygens if a series of products requires the same
216:(DRM) mechanism, seeking to prevent unauthorized use of the software by issuing a code sequence that must be entered into the application when prompted or stored in its configuration. 531: 564: 465: 414: 432: 505: 615: 342:, its first known detection dates back to 16 July 2009. The following security threats were most often found on PCs that have been related to these tools: 300:. These key generators may or may not generate a valid key, but the embedded malware loaded invisibly at the same time may, for example, be a version of 208:
is a legal instrument that governs the usage and distribution of computer software. Often, such licenses are enforced by implementing in the software a
389: 527: 556: 335: 314:
may discover malware embedded in keygens; such software often also identifies unauthorized keygens which do not contain a payload as
126: 620: 418: 64: 590: 315: 440: 384: 107: 497: 605: 327: 79: 270: 213: 394: 253:
Unauthorized keygens that typically violate software licensing terms are written by programmers who engage in
86: 60: 53: 170: 347: 93: 166: 254: 75: 311: 209: 162: 258: 177: 205: 150: 266: 610: 331: 433:"Why product activation for software is becoming widespread – a knol by Dominic Haigh" 599: 158: 31: 17: 100: 301: 285: 242: 181: 154: 42: 305: 274: 238: 193: 318:, often labelling them with a name such as Win32/Keygen or Win32/Gendows. 185: 176:
Illegitimate key generators are typically programmed and distributed by
297: 189: 296:
Keygens, available through P2P networks or otherwise, can contain
281: 330:
is defined as HackTool.Win32.HackAV or not-a-virus:Keygen from
184:. These keygens often play music (taking from the tradition of 36: 27:
Computer program that can generate a product licensing key
466:"Microsoft Security Intelligence Report Volume 13, p14" 30:
For programs which generate cryptographic keys, see
67:. Unsourced material may be challenged and removed. 591:Business Software Alliance and Software Patents 528:"New CryptoLocker Spreads via Removable Drives" 498:"Cryptolocker 2.0 – new version, or copycat?" 8: 557:"HackTool:Win32/Keygen threat description" 127:Learn how and when to remove this message 460: 458: 390:Canadian Alliance Against Software Theft 406: 280:Keygens are available for download on 551: 549: 508:from the original on 22 November 2016 7: 534:from the original on 4 November 2016 65:adding citations to reliable sources 567:from the original on 18 August 2022 478:from the original on 19 August 2024 340:Microsoft Malware Protection Center 336:Microsoft Malware Protection Center 616:Copyright infringement of software 25: 530:. Trend Micro. 26 December 2013. 188:), which may include the genres 41: 561:Microsoft Security Intelligence 334:or as HackTool:Win32/Keygen by 52:needs additional citations for 1: 415:"What is Software licensing?" 326:A program designed to assist 316:potentially unwanted software 563:. Microsoft. 16 July 2009. 385:BSA (The Software Alliance) 637: 504:. ESET. 19 December 2013. 29: 577:Updated 15 September 2017 271:digital rights management 214:digital rights management 395:Free Software Foundation 249:Authors and distribution 621:Cryptographic software 171:copyright infringement 348:Blackhole exploit kit 322:HackTool.Win32.HackAV 155:product licensing key 18:HackTool.Win32.HackAV 173:or software piracy. 167:software application 61:improve this article 443:on 21 November 2011 338:. According to the 255:reverse engineering 229:activation server. 312:Antivirus software 298:malicious payloads 210:product activation 200:Software licensing 606:Software cracking 284:sites or through 259:software cracking 178:software crackers 153:that generates a 137: 136: 129: 111: 16:(Redirected from 628: 578: 576: 574: 572: 553: 544: 543: 541: 539: 524: 518: 517: 515: 513: 494: 488: 487: 485: 483: 477: 470: 462: 453: 452: 450: 448: 439:. Archived from 429: 423: 422: 417:. Archived from 411: 364:Win32/Obfuscator 288:(P2P) networks. 265:, to circumvent 220:Key verification 206:software license 151:computer program 132: 125: 121: 118: 112: 110: 69: 45: 37: 21: 636: 635: 631: 630: 629: 627: 626: 625: 596: 595: 587: 582: 581: 570: 568: 555: 554: 547: 537: 535: 526: 525: 521: 511: 509: 496: 495: 491: 481: 479: 475: 468: 464: 463: 456: 446: 444: 437:knol.google.com 431: 430: 426: 421:on 14 May 2011. 413: 412: 408: 403: 381: 372: 324: 294: 292:Malware keygens 269:of software or 267:copy protection 261:, often called 251: 241:for generating 235: 222: 202: 161:, necessary to 133: 122: 116: 113: 70: 68: 58: 46: 35: 28: 23: 22: 15: 12: 11: 5: 634: 632: 624: 623: 618: 613: 608: 598: 597: 594: 593: 586: 585:External links 583: 580: 579: 545: 519: 502:WeLiveSecurity 489: 454: 424: 405: 404: 402: 399: 398: 397: 392: 387: 380: 377: 371: 368: 367: 366: 361: 356: 351: 332:Kaspersky Labs 323: 320: 293: 290: 250: 247: 234: 231: 221: 218: 201: 198: 135: 134: 49: 47: 40: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 633: 622: 619: 617: 614: 612: 609: 607: 604: 603: 601: 592: 589: 588: 584: 566: 562: 558: 552: 550: 546: 533: 529: 523: 520: 507: 503: 499: 493: 490: 474: 467: 461: 459: 455: 442: 438: 434: 428: 425: 420: 416: 410: 407: 400: 396: 393: 391: 388: 386: 383: 382: 378: 376: 369: 365: 362: 360: 359:Win32/Dorkbot 357: 355: 354:Win32/Autorun 352: 350: 349: 345: 344: 343: 341: 337: 333: 329: 321: 319: 317: 313: 309: 307: 303: 299: 291: 289: 287: 283: 278: 276: 272: 268: 264: 260: 256: 248: 246: 244: 240: 232: 230: 228: 219: 217: 215: 211: 207: 199: 197: 195: 191: 187: 183: 179: 174: 172: 168: 165:for use of a 164: 160: 159:serial number 156: 152: 148: 144: 143:key generator 139: 131: 128: 120: 109: 106: 102: 99: 95: 92: 88: 85: 81: 78: –  77: 73: 72:Find sources: 66: 62: 56: 55: 50:This article 48: 44: 39: 38: 33: 32:Key generator 19: 569:. Retrieved 560: 536:. Retrieved 522: 510:. Retrieved 501: 492: 480:. Retrieved 445:. Retrieved 441:the original 436: 427: 419:the original 409: 373: 363: 358: 353: 346: 339: 325: 310: 302:CryptoLocker 295: 286:peer-to-peer 279: 262: 252: 243:product keys 236: 233:Multi-keygen 226: 223: 203: 175: 157:, such as a 146: 142: 140: 138: 123: 114: 104: 97: 90: 83: 71: 59:Please help 54:verification 51: 182:warez scene 600:Categories 538:18 January 512:18 January 447:11 January 401:References 306:ransomware 275:multimedia 87:newspapers 571:18 August 482:19 August 239:algorithm 194:chiptunes 186:cracktros 117:June 2014 565:Archived 532:Archived 506:Archived 473:Archived 379:See also 263:crackers 227:de facto 163:activate 76:"Keygen" 370:Keychan 328:hacking 190:dubstep 180:in the 149:) is a 147:key-gen 101:scholar 103:  96:  89:  82:  74:  611:Warez 476:(PDF) 469:(PDF) 282:warez 108:JSTOR 94:books 573:2022 540:2014 514:2014 484:2024 449:2022 273:for 257:and 80:news 308:). 245:. 212:or 63:by 602:: 559:. 548:^ 500:. 471:. 457:^ 435:. 277:. 204:A 192:, 141:A 575:. 542:. 516:. 486:. 451:. 304:( 145:( 130:) 124:( 119:) 115:( 105:· 98:· 91:· 84:· 57:. 34:. 20:)

Index

HackTool.Win32.HackAV
Key generator

verification
improve this article
adding citations to reliable sources
"Keygen"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
computer program
product licensing key
serial number
activate
software application
copyright infringement
software crackers
warez scene
cracktros
dubstep
chiptunes
software license
product activation
digital rights management
algorithm
product keys
reverse engineering

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.