
Of course, the main drawback of such an installation - other than it being illegal - is that hackers can use corrupt instances of Windows 7 to build code across network bridges and also create a veil of anonymity. Now, My Digital Life and other sites are reporting that so-called bypass commands such as "RemoveWAT" and "ChewWGA" are spreading on the Internet and could help users install Windows 7 without a product key.

WAT is the activation requirement for an installed Windows 7 system, conceived by Microsoft's anti-piracy team as a means to curtail rogue installations of the OS on unlicensed PCs. This latest exploit is of the denial-of-service variety and, if effective, would deny a user or administrator entry, or change or delete access into the program.Īccording to the blog My Digital Life, hackers have been trying to figure out how to bypass Windows Activation Technologies (WAT) in Windows 7. In the last three months, there've been instances of exploits affecting the program through different attack vectors, with different implications.

This isn't the first time SMB issues have popped up. Microsoft has issued a security advisory describing workarounds, but says most users would be protected from attacks by blocking two ports at the firewall. The bug touches on Microsoft's Server Message Block (SMB) program - specifically, SMBv1 and SMBv2 on Windows 7 and Windows Server 2008 R2. In an inauspicious beginning to the week, the first zero-day bug for Windows 7 has emerged. Plus: hackers try to bypass Windows 7's WAT Internet Explorer attack can hurt the kernel. Security Watch Windows 7 Gets Its First Bug
