![]() This activator is a 'Franzenfuilde' Loader, meaning it swaps out files in order to activate. I plan on using this.iso for experimental software just to test the same, not for any personal uses that contain my personalinformation, so I really don't care if there is a rootkit virus on the 'activation loader'. So the 'activator loader'-which in theory can be a rootkit virus-calls Windows and somehow givesit a legal activation key each time, and without destroying whatever user data the user has on their hard drive (like in user/MyDocuments), is that it? Any advice appreciated. Note it is not the 'original boot loader', which is deemed the 'unsafe' mode (meaning it's likely to be blocked by Microsoft in the sometime immediate future for Windows updates once a lot of people startusing it-at least that's what I think it means). UnSafe - the boot sector calls the activator loader, the activator loader calls the original boot loader I don't understand what 'activation loader' is-but I reckon it is a shell that calls Windows. Safe - the activator loader calls the original boot loader. ![]() A: Safest - the activator loader calls Windows. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |